Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe
-
Size
486KB
-
MD5
a50b45ffdc2f0d6857721e86252c0476
-
SHA1
d07ec961a8d44332e2eb3f55652ae6e7fb6702bb
-
SHA256
accc63f55b064e9e24cba8b187163aa6f8cbb62b0a93c6b9b6ae2eafa369262a
-
SHA512
b0b531bc81c2567495271b58974813aa2e132884e40662d6307d00e59c6d59000ef8ec4d490da3137dea1987a4b393c03a3324d12f7dd330e48482be8f5e9113
-
SSDEEP
12288:/U5rCOTeiDIUZhINnFaNBqlQO0LWINGJNZ:/UQOJDRZoGBuZybuN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1856 D5DE.tmp 984 D88D.tmp 2168 D958.tmp 3180 DA91.tmp 4080 DBF8.tmp 4012 DC85.tmp 3104 DD12.tmp 4920 DDBD.tmp 3440 DE89.tmp 3880 DFC1.tmp 3972 E0FA.tmp 700 E1D4.tmp 5060 E2DE.tmp 4464 E3C8.tmp 3376 E4C2.tmp 2216 E687.tmp 2984 E7A1.tmp 696 E985.tmp 2808 EACD.tmp 2860 EC06.tmp 1316 EC92.tmp 2184 EDDA.tmp 1416 EE86.tmp 4296 EF23.tmp 4872 F02C.tmp 3664 F117.tmp 4880 F1A3.tmp 1112 F2AD.tmp 2820 F3F5.tmp 1464 F53D.tmp 456 F5F9.tmp 1980 F6F3.tmp 2556 F7BE.tmp 2436 F84A.tmp 2540 F906.tmp 4944 FA1F.tmp 4356 FB19.tmp 5056 FC13.tmp 1256 FDA9.tmp 996 FE17.tmp 264 FF30.tmp 5008 97.tmp 3856 1A1.tmp 2292 22E.tmp 4444 337.tmp 2128 3C4.tmp 5116 49F.tmp 2408 6A2.tmp 3436 80A.tmp 3368 923.tmp 1804 9A0.tmp 1676 9FE.tmp 1856 BA3.tmp 1552 C40.tmp 4148 CAD.tmp 1916 F6C.tmp 4284 1076.tmp 4080 10F3.tmp 1324 117F.tmp 1236 12A8.tmp 4656 1316.tmp 4920 13A2.tmp 3440 1410.tmp 1132 150A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1856 1248 2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe 88 PID 1248 wrote to memory of 1856 1248 2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe 88 PID 1248 wrote to memory of 1856 1248 2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe 88 PID 1856 wrote to memory of 984 1856 D5DE.tmp 89 PID 1856 wrote to memory of 984 1856 D5DE.tmp 89 PID 1856 wrote to memory of 984 1856 D5DE.tmp 89 PID 984 wrote to memory of 2168 984 D88D.tmp 90 PID 984 wrote to memory of 2168 984 D88D.tmp 90 PID 984 wrote to memory of 2168 984 D88D.tmp 90 PID 2168 wrote to memory of 3180 2168 D958.tmp 91 PID 2168 wrote to memory of 3180 2168 D958.tmp 91 PID 2168 wrote to memory of 3180 2168 D958.tmp 91 PID 3180 wrote to memory of 4080 3180 DA91.tmp 92 PID 3180 wrote to memory of 4080 3180 DA91.tmp 92 PID 3180 wrote to memory of 4080 3180 DA91.tmp 92 PID 4080 wrote to memory of 4012 4080 DBF8.tmp 93 PID 4080 wrote to memory of 4012 4080 DBF8.tmp 93 PID 4080 wrote to memory of 4012 4080 DBF8.tmp 93 PID 4012 wrote to memory of 3104 4012 DC85.tmp 94 PID 4012 wrote to memory of 3104 4012 DC85.tmp 94 PID 4012 wrote to memory of 3104 4012 DC85.tmp 94 PID 3104 wrote to memory of 4920 3104 DD12.tmp 95 PID 3104 wrote to memory of 4920 3104 DD12.tmp 95 PID 3104 wrote to memory of 4920 3104 DD12.tmp 95 PID 4920 wrote to memory of 3440 4920 DDBD.tmp 96 PID 4920 wrote to memory of 3440 4920 DDBD.tmp 96 PID 4920 wrote to memory of 3440 4920 DDBD.tmp 96 PID 3440 wrote to memory of 3880 3440 DE89.tmp 97 PID 3440 wrote to memory of 3880 3440 DE89.tmp 97 PID 3440 wrote to memory of 3880 3440 DE89.tmp 97 PID 3880 wrote to memory of 3972 3880 DFC1.tmp 98 PID 3880 wrote to memory of 3972 3880 DFC1.tmp 98 PID 3880 wrote to memory of 3972 3880 DFC1.tmp 98 PID 3972 wrote to memory of 700 3972 E0FA.tmp 99 PID 3972 wrote to memory of 700 3972 E0FA.tmp 99 PID 3972 wrote to memory of 700 3972 E0FA.tmp 99 PID 700 wrote to memory of 5060 700 E1D4.tmp 100 PID 700 wrote to memory of 5060 700 E1D4.tmp 100 PID 700 wrote to memory of 5060 700 E1D4.tmp 100 PID 5060 wrote to memory of 4464 5060 E2DE.tmp 101 PID 5060 wrote to memory of 4464 5060 E2DE.tmp 101 PID 5060 wrote to memory of 4464 5060 E2DE.tmp 101 PID 4464 wrote to memory of 3376 4464 E3C8.tmp 102 PID 4464 wrote to memory of 3376 4464 E3C8.tmp 102 PID 4464 wrote to memory of 3376 4464 E3C8.tmp 102 PID 3376 wrote to memory of 2216 3376 E4C2.tmp 103 PID 3376 wrote to memory of 2216 3376 E4C2.tmp 103 PID 3376 wrote to memory of 2216 3376 E4C2.tmp 103 PID 2216 wrote to memory of 2984 2216 E687.tmp 104 PID 2216 wrote to memory of 2984 2216 E687.tmp 104 PID 2216 wrote to memory of 2984 2216 E687.tmp 104 PID 2984 wrote to memory of 696 2984 E7A1.tmp 105 PID 2984 wrote to memory of 696 2984 E7A1.tmp 105 PID 2984 wrote to memory of 696 2984 E7A1.tmp 105 PID 696 wrote to memory of 2808 696 E985.tmp 106 PID 696 wrote to memory of 2808 696 E985.tmp 106 PID 696 wrote to memory of 2808 696 E985.tmp 106 PID 2808 wrote to memory of 2860 2808 EACD.tmp 107 PID 2808 wrote to memory of 2860 2808 EACD.tmp 107 PID 2808 wrote to memory of 2860 2808 EACD.tmp 107 PID 2860 wrote to memory of 1316 2860 EC06.tmp 108 PID 2860 wrote to memory of 1316 2860 EC06.tmp 108 PID 2860 wrote to memory of 1316 2860 EC06.tmp 108 PID 1316 wrote to memory of 2184 1316 EC92.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_a50b45ffdc2f0d6857721e86252c0476_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\D88D.tmp"C:\Users\Admin\AppData\Local\Temp\D88D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\DE89.tmp"C:\Users\Admin\AppData\Local\Temp\DE89.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\EACD.tmp"C:\Users\Admin\AppData\Local\Temp\EACD.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\EC06.tmp"C:\Users\Admin\AppData\Local\Temp\EC06.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"23⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"24⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"25⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\F02C.tmp"C:\Users\Admin\AppData\Local\Temp\F02C.tmp"26⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\F117.tmp"C:\Users\Admin\AppData\Local\Temp\F117.tmp"27⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"28⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"29⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"30⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"31⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"32⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"33⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"34⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\F84A.tmp"C:\Users\Admin\AppData\Local\Temp\F84A.tmp"35⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"36⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"37⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\FB19.tmp"C:\Users\Admin\AppData\Local\Temp\FB19.tmp"38⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"39⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"40⤵
- Executes dropped EXE
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\FE17.tmp"C:\Users\Admin\AppData\Local\Temp\FE17.tmp"41⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\FF30.tmp"C:\Users\Admin\AppData\Local\Temp\FF30.tmp"42⤵
- Executes dropped EXE
PID:264 -
C:\Users\Admin\AppData\Local\Temp\97.tmp"C:\Users\Admin\AppData\Local\Temp\97.tmp"43⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\1A1.tmp"C:\Users\Admin\AppData\Local\Temp\1A1.tmp"44⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\22E.tmp"C:\Users\Admin\AppData\Local\Temp\22E.tmp"45⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"46⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"47⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"48⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\6A2.tmp"C:\Users\Admin\AppData\Local\Temp\6A2.tmp"49⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\80A.tmp"C:\Users\Admin\AppData\Local\Temp\80A.tmp"50⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\923.tmp"C:\Users\Admin\AppData\Local\Temp\923.tmp"51⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\9A0.tmp"C:\Users\Admin\AppData\Local\Temp\9A0.tmp"52⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"53⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\BA3.tmp"C:\Users\Admin\AppData\Local\Temp\BA3.tmp"54⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"55⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\CAD.tmp"C:\Users\Admin\AppData\Local\Temp\CAD.tmp"56⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"57⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\1076.tmp"C:\Users\Admin\AppData\Local\Temp\1076.tmp"58⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"59⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\117F.tmp"C:\Users\Admin\AppData\Local\Temp\117F.tmp"60⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"61⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\1316.tmp"C:\Users\Admin\AppData\Local\Temp\1316.tmp"62⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"63⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"64⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"65⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\16CF.tmp"C:\Users\Admin\AppData\Local\Temp\16CF.tmp"66⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"67⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\1A78.tmp"C:\Users\Admin\AppData\Local\Temp\1A78.tmp"68⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"69⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\1E12.tmp"C:\Users\Admin\AppData\Local\Temp\1E12.tmp"70⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\1EED.tmp"C:\Users\Admin\AppData\Local\Temp\1EED.tmp"71⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\1F89.tmp"C:\Users\Admin\AppData\Local\Temp\1F89.tmp"72⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\20B2.tmp"C:\Users\Admin\AppData\Local\Temp\20B2.tmp"73⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\211F.tmp"C:\Users\Admin\AppData\Local\Temp\211F.tmp"74⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"75⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"76⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\2333.tmp"C:\Users\Admin\AppData\Local\Temp\2333.tmp"77⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"78⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"79⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"80⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"81⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2611.tmp"C:\Users\Admin\AppData\Local\Temp\2611.tmp"82⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"83⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\26EC.tmp"C:\Users\Admin\AppData\Local\Temp\26EC.tmp"84⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\2769.tmp"C:\Users\Admin\AppData\Local\Temp\2769.tmp"85⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\2853.tmp"C:\Users\Admin\AppData\Local\Temp\2853.tmp"86⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"87⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"88⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\29AB.tmp"C:\Users\Admin\AppData\Local\Temp\29AB.tmp"89⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2A86.tmp"C:\Users\Admin\AppData\Local\Temp\2A86.tmp"90⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"91⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"92⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"93⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"94⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"95⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"96⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"97⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"98⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"99⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"100⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\31AA.tmp"C:\Users\Admin\AppData\Local\Temp\31AA.tmp"101⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"102⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"103⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"104⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"105⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"106⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\362E.tmp"C:\Users\Admin\AppData\Local\Temp\362E.tmp"107⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\37C4.tmp"C:\Users\Admin\AppData\Local\Temp\37C4.tmp"108⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\3841.tmp"C:\Users\Admin\AppData\Local\Temp\3841.tmp"109⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"110⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\395B.tmp"C:\Users\Admin\AppData\Local\Temp\395B.tmp"111⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"112⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"113⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"114⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"115⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\3D14.tmp"C:\Users\Admin\AppData\Local\Temp\3D14.tmp"116⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"117⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"118⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"119⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"120⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\406F.tmp"C:\Users\Admin\AppData\Local\Temp\406F.tmp"121⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"122⤵PID:4828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-