Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 07:14 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe
-
Size
487KB
-
MD5
df9277c467166b0bfa733c34a7a83461
-
SHA1
8f2c0d3c09ccc9d34691d04f760cc6373afa9905
-
SHA256
71c07d93e52d5fa83b1117af54c8e6add87f2d650123bc4b1e31dea361d65a7e
-
SHA512
b2ed9bd3585ad5a80b7b0e55bf07065f78d352e5fc22efcc16616fe4f73dc495e3e4fc590dda06eaaf92169ab788e02b279b4994f0d0cb9f58631f419d42c7d1
-
SSDEEP
12288:yU5rCOTeiN6BW67Act0eSLMWT1kmURBugbZ:yUQOJN6BlZt0eSLZbxgb
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5008 C5F0.tmp 3224 C757.tmp 1948 C813.tmp 5064 C8CE.tmp 2056 C97A.tmp 5056 CA55.tmp 1792 CB7E.tmp 2964 CC1A.tmp 2008 CCB6.tmp 2484 CD43.tmp 572 CDDF.tmp 2592 CE6C.tmp 1612 CF37.tmp 1536 CFE3.tmp 4860 D07F.tmp 4576 D13A.tmp 3348 D1D7.tmp 4088 D273.tmp 2536 D32E.tmp 4996 D3BB.tmp 4752 D467.tmp 776 D4F3.tmp 2432 D5DE.tmp 3908 D6D8.tmp 2172 D774.tmp 1772 D7F1.tmp 4432 D90A.tmp 3436 D9D5.tmp 1608 DA91.tmp 3932 DB3D.tmp 4876 DBE9.tmp 4748 DC95.tmp 4012 DD31.tmp 2500 DDCD.tmp 4348 DE79.tmp 4124 DF34.tmp 416 DFD1.tmp 4800 E06D.tmp 1800 E0DA.tmp 1884 E157.tmp 1304 E1D4.tmp 1648 E251.tmp 1808 E2CE.tmp 4548 E36B.tmp 4700 E407.tmp 1980 E493.tmp 4408 E510.tmp 1284 E5AD.tmp 3596 E639.tmp 1224 E6D6.tmp 1708 E743.tmp 2296 E7B0.tmp 1496 E80E.tmp 4476 E87B.tmp 916 E8F8.tmp 3824 E966.tmp 2252 EA02.tmp 2720 EA8F.tmp 548 EB1B.tmp 3640 EB89.tmp 2552 EC92.tmp 5064 ED3E.tmp 4224 EDDA.tmp 1628 EE77.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 5008 4220 2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe 83 PID 4220 wrote to memory of 5008 4220 2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe 83 PID 4220 wrote to memory of 5008 4220 2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe 83 PID 5008 wrote to memory of 3224 5008 C5F0.tmp 84 PID 5008 wrote to memory of 3224 5008 C5F0.tmp 84 PID 5008 wrote to memory of 3224 5008 C5F0.tmp 84 PID 3224 wrote to memory of 1948 3224 C757.tmp 85 PID 3224 wrote to memory of 1948 3224 C757.tmp 85 PID 3224 wrote to memory of 1948 3224 C757.tmp 85 PID 1948 wrote to memory of 5064 1948 C813.tmp 86 PID 1948 wrote to memory of 5064 1948 C813.tmp 86 PID 1948 wrote to memory of 5064 1948 C813.tmp 86 PID 5064 wrote to memory of 2056 5064 C8CE.tmp 87 PID 5064 wrote to memory of 2056 5064 C8CE.tmp 87 PID 5064 wrote to memory of 2056 5064 C8CE.tmp 87 PID 2056 wrote to memory of 5056 2056 C97A.tmp 88 PID 2056 wrote to memory of 5056 2056 C97A.tmp 88 PID 2056 wrote to memory of 5056 2056 C97A.tmp 88 PID 5056 wrote to memory of 1792 5056 CA55.tmp 89 PID 5056 wrote to memory of 1792 5056 CA55.tmp 89 PID 5056 wrote to memory of 1792 5056 CA55.tmp 89 PID 1792 wrote to memory of 2964 1792 CB7E.tmp 90 PID 1792 wrote to memory of 2964 1792 CB7E.tmp 90 PID 1792 wrote to memory of 2964 1792 CB7E.tmp 90 PID 2964 wrote to memory of 2008 2964 CC1A.tmp 91 PID 2964 wrote to memory of 2008 2964 CC1A.tmp 91 PID 2964 wrote to memory of 2008 2964 CC1A.tmp 91 PID 2008 wrote to memory of 2484 2008 CCB6.tmp 92 PID 2008 wrote to memory of 2484 2008 CCB6.tmp 92 PID 2008 wrote to memory of 2484 2008 CCB6.tmp 92 PID 2484 wrote to memory of 572 2484 CD43.tmp 93 PID 2484 wrote to memory of 572 2484 CD43.tmp 93 PID 2484 wrote to memory of 572 2484 CD43.tmp 93 PID 572 wrote to memory of 2592 572 CDDF.tmp 94 PID 572 wrote to memory of 2592 572 CDDF.tmp 94 PID 572 wrote to memory of 2592 572 CDDF.tmp 94 PID 2592 wrote to memory of 1612 2592 CE6C.tmp 95 PID 2592 wrote to memory of 1612 2592 CE6C.tmp 95 PID 2592 wrote to memory of 1612 2592 CE6C.tmp 95 PID 1612 wrote to memory of 1536 1612 CF37.tmp 96 PID 1612 wrote to memory of 1536 1612 CF37.tmp 96 PID 1612 wrote to memory of 1536 1612 CF37.tmp 96 PID 1536 wrote to memory of 4860 1536 CFE3.tmp 97 PID 1536 wrote to memory of 4860 1536 CFE3.tmp 97 PID 1536 wrote to memory of 4860 1536 CFE3.tmp 97 PID 4860 wrote to memory of 4576 4860 D07F.tmp 98 PID 4860 wrote to memory of 4576 4860 D07F.tmp 98 PID 4860 wrote to memory of 4576 4860 D07F.tmp 98 PID 4576 wrote to memory of 3348 4576 D13A.tmp 99 PID 4576 wrote to memory of 3348 4576 D13A.tmp 99 PID 4576 wrote to memory of 3348 4576 D13A.tmp 99 PID 3348 wrote to memory of 4088 3348 D1D7.tmp 100 PID 3348 wrote to memory of 4088 3348 D1D7.tmp 100 PID 3348 wrote to memory of 4088 3348 D1D7.tmp 100 PID 4088 wrote to memory of 2536 4088 D273.tmp 101 PID 4088 wrote to memory of 2536 4088 D273.tmp 101 PID 4088 wrote to memory of 2536 4088 D273.tmp 101 PID 2536 wrote to memory of 4996 2536 D32E.tmp 102 PID 2536 wrote to memory of 4996 2536 D32E.tmp 102 PID 2536 wrote to memory of 4996 2536 D32E.tmp 102 PID 4996 wrote to memory of 4752 4996 D3BB.tmp 103 PID 4996 wrote to memory of 4752 4996 D3BB.tmp 103 PID 4996 wrote to memory of 4752 4996 D3BB.tmp 103 PID 4752 wrote to memory of 776 4752 D467.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_df9277c467166b0bfa733c34a7a83461_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\C813.tmp"C:\Users\Admin\AppData\Local\Temp\C813.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\C97A.tmp"C:\Users\Admin\AppData\Local\Temp\C97A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\CA55.tmp"C:\Users\Admin\AppData\Local\Temp\CA55.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\CB7E.tmp"C:\Users\Admin\AppData\Local\Temp\CB7E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\CCB6.tmp"C:\Users\Admin\AppData\Local\Temp\CCB6.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\CE6C.tmp"C:\Users\Admin\AppData\Local\Temp\CE6C.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\CF37.tmp"C:\Users\Admin\AppData\Local\Temp\CF37.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\D07F.tmp"C:\Users\Admin\AppData\Local\Temp\D07F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\D13A.tmp"C:\Users\Admin\AppData\Local\Temp\D13A.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"23⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"24⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"25⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"26⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"27⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"28⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"29⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"30⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"31⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"32⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"33⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"34⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"35⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"36⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"37⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"38⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\E06D.tmp"C:\Users\Admin\AppData\Local\Temp\E06D.tmp"39⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"40⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"41⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"42⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\E251.tmp"C:\Users\Admin\AppData\Local\Temp\E251.tmp"43⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"44⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"45⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\E407.tmp"C:\Users\Admin\AppData\Local\Temp\E407.tmp"46⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\E493.tmp"C:\Users\Admin\AppData\Local\Temp\E493.tmp"47⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"48⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"49⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\E639.tmp"C:\Users\Admin\AppData\Local\Temp\E639.tmp"50⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"51⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"52⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"53⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\E80E.tmp"C:\Users\Admin\AppData\Local\Temp\E80E.tmp"54⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"55⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"56⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\E966.tmp"C:\Users\Admin\AppData\Local\Temp\E966.tmp"57⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\EA02.tmp"C:\Users\Admin\AppData\Local\Temp\EA02.tmp"58⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"59⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"60⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\EB89.tmp"C:\Users\Admin\AppData\Local\Temp\EB89.tmp"61⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"62⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"63⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"64⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\EE77.tmp"C:\Users\Admin\AppData\Local\Temp\EE77.tmp"65⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"66⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"67⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"68⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"69⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"70⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"71⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\F25F.tmp"C:\Users\Admin\AppData\Local\Temp\F25F.tmp"72⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"73⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\F378.tmp"C:\Users\Admin\AppData\Local\Temp\F378.tmp"74⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"75⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"76⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"77⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"78⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"79⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\F712.tmp"C:\Users\Admin\AppData\Local\Temp\F712.tmp"80⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"81⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\F83B.tmp"C:\Users\Admin\AppData\Local\Temp\F83B.tmp"82⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"83⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\F944.tmp"C:\Users\Admin\AppData\Local\Temp\F944.tmp"84⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"85⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"86⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"87⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\FB77.tmp"C:\Users\Admin\AppData\Local\Temp\FB77.tmp"88⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\FC03.tmp"C:\Users\Admin\AppData\Local\Temp\FC03.tmp"89⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"90⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"91⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"92⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp"93⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"94⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"95⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"96⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\A7.tmp"C:\Users\Admin\AppData\Local\Temp\A7.tmp"97⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\124.tmp"C:\Users\Admin\AppData\Local\Temp\124.tmp"98⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\1A1.tmp"C:\Users\Admin\AppData\Local\Temp\1A1.tmp"99⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"100⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\2CA.tmp"C:\Users\Admin\AppData\Local\Temp\2CA.tmp"101⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\376.tmp"C:\Users\Admin\AppData\Local\Temp\376.tmp"102⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"103⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"104⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"105⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\599.tmp"C:\Users\Admin\AppData\Local\Temp\599.tmp"106⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"107⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\693.tmp"C:\Users\Admin\AppData\Local\Temp\693.tmp"108⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"109⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\7CB.tmp"C:\Users\Admin\AppData\Local\Temp\7CB.tmp"110⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"111⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\8A6.tmp"C:\Users\Admin\AppData\Local\Temp\8A6.tmp"112⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\942.tmp"C:\Users\Admin\AppData\Local\Temp\942.tmp"113⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"114⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"115⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\AC9.tmp"C:\Users\Admin\AppData\Local\Temp\AC9.tmp"116⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\B46.tmp"C:\Users\Admin\AppData\Local\Temp\B46.tmp"117⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"118⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"119⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\CFB.tmp"C:\Users\Admin\AppData\Local\Temp\CFB.tmp"120⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"121⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"122⤵PID:3640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-