Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe
-
Size
765KB
-
MD5
8ad0cac94adf5a6691860f781996c73b
-
SHA1
248ce8cd93bae0c5a19a49b8ea7bd0364e6b497c
-
SHA256
864653388804dbf8c32164b025c506500f6d07817fbf99650a0ac2d398ce6c40
-
SHA512
7ace08ea216ece2dc24631b2d7a3488d5632824b68c5e674e89dae510eaf4e9fcbee10ffd2cad9200e78a9d58966da31b0c91b6e601d574e3ec269d243cc85b8
-
SSDEEP
12288:ZU5rCOTeiD9N+ZH79/nWtxTg1EiY3ZF5rn5rLOa54U5w5A:ZUQOJDLObkHTqEb3vh5Oa+UOS
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 724 2882.tmp 3284 29CA.tmp 1620 2AA5.tmp 1816 36CA.tmp 3716 37B5.tmp 2544 3870.tmp 2532 397A.tmp 3768 3A93.tmp 1724 4EA8.tmp 3732 4F82.tmp 4084 51E4.tmp 2292 5280.tmp 2516 54C2.tmp 1144 5FCE.tmp 3172 6F20.tmp 3492 70F5.tmp 3228 71B0.tmp 3388 726C.tmp 1000 7395.tmp 4952 7441.tmp 2896 8102.tmp 3212 81BE.tmp 2680 8B72.tmp 2408 8C7C.tmp 3636 98D0.tmp 3092 A3BD.tmp 5052 B159.tmp 1640 B8CC.tmp 2228 B977.tmp 1268 BA71.tmp 4728 D1A3.tmp 4904 DBA5.tmp 3400 EAF7.tmp 1884 EB84.tmp 3060 F519.tmp 4872 F5E4.tmp 2352 323.tmp 1732 42C.tmp 5040 71A.tmp 3284 1515.tmp 2324 1D04.tmp 3584 23BB.tmp 3180 2754.tmp 1236 2DBD.tmp 2544 2EC7.tmp 4316 3118.tmp 4088 3668.tmp 4704 3F70.tmp 1828 4107.tmp 3480 44C0.tmp 2820 45C9.tmp 1208 4ABB.tmp 4084 51DF.tmp 1456 5356.tmp 4468 54CD.tmp 4480 58C5.tmp 3268 5A8A.tmp 1900 5B16.tmp 4808 5F1E.tmp 876 6095.tmp 2948 649C.tmp 2928 6557.tmp 4120 6A39.tmp 1000 6C0E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 560 wrote to memory of 724 560 2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe 84 PID 560 wrote to memory of 724 560 2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe 84 PID 560 wrote to memory of 724 560 2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe 84 PID 724 wrote to memory of 3284 724 2882.tmp 85 PID 724 wrote to memory of 3284 724 2882.tmp 85 PID 724 wrote to memory of 3284 724 2882.tmp 85 PID 3284 wrote to memory of 1620 3284 29CA.tmp 86 PID 3284 wrote to memory of 1620 3284 29CA.tmp 86 PID 3284 wrote to memory of 1620 3284 29CA.tmp 86 PID 1620 wrote to memory of 1816 1620 2AA5.tmp 87 PID 1620 wrote to memory of 1816 1620 2AA5.tmp 87 PID 1620 wrote to memory of 1816 1620 2AA5.tmp 87 PID 1816 wrote to memory of 3716 1816 36CA.tmp 88 PID 1816 wrote to memory of 3716 1816 36CA.tmp 88 PID 1816 wrote to memory of 3716 1816 36CA.tmp 88 PID 3716 wrote to memory of 2544 3716 37B5.tmp 89 PID 3716 wrote to memory of 2544 3716 37B5.tmp 89 PID 3716 wrote to memory of 2544 3716 37B5.tmp 89 PID 2544 wrote to memory of 2532 2544 3870.tmp 90 PID 2544 wrote to memory of 2532 2544 3870.tmp 90 PID 2544 wrote to memory of 2532 2544 3870.tmp 90 PID 2532 wrote to memory of 3768 2532 397A.tmp 91 PID 2532 wrote to memory of 3768 2532 397A.tmp 91 PID 2532 wrote to memory of 3768 2532 397A.tmp 91 PID 3768 wrote to memory of 1724 3768 3A93.tmp 92 PID 3768 wrote to memory of 1724 3768 3A93.tmp 92 PID 3768 wrote to memory of 1724 3768 3A93.tmp 92 PID 1724 wrote to memory of 3732 1724 4EA8.tmp 94 PID 1724 wrote to memory of 3732 1724 4EA8.tmp 94 PID 1724 wrote to memory of 3732 1724 4EA8.tmp 94 PID 3732 wrote to memory of 4084 3732 4F82.tmp 95 PID 3732 wrote to memory of 4084 3732 4F82.tmp 95 PID 3732 wrote to memory of 4084 3732 4F82.tmp 95 PID 4084 wrote to memory of 2292 4084 51E4.tmp 96 PID 4084 wrote to memory of 2292 4084 51E4.tmp 96 PID 4084 wrote to memory of 2292 4084 51E4.tmp 96 PID 2292 wrote to memory of 2516 2292 5280.tmp 97 PID 2292 wrote to memory of 2516 2292 5280.tmp 97 PID 2292 wrote to memory of 2516 2292 5280.tmp 97 PID 2516 wrote to memory of 1144 2516 54C2.tmp 98 PID 2516 wrote to memory of 1144 2516 54C2.tmp 98 PID 2516 wrote to memory of 1144 2516 54C2.tmp 98 PID 1144 wrote to memory of 3172 1144 5FCE.tmp 99 PID 1144 wrote to memory of 3172 1144 5FCE.tmp 99 PID 1144 wrote to memory of 3172 1144 5FCE.tmp 99 PID 3172 wrote to memory of 3492 3172 6F20.tmp 100 PID 3172 wrote to memory of 3492 3172 6F20.tmp 100 PID 3172 wrote to memory of 3492 3172 6F20.tmp 100 PID 3492 wrote to memory of 3228 3492 70F5.tmp 101 PID 3492 wrote to memory of 3228 3492 70F5.tmp 101 PID 3492 wrote to memory of 3228 3492 70F5.tmp 101 PID 3228 wrote to memory of 3388 3228 71B0.tmp 102 PID 3228 wrote to memory of 3388 3228 71B0.tmp 102 PID 3228 wrote to memory of 3388 3228 71B0.tmp 102 PID 3388 wrote to memory of 1000 3388 726C.tmp 103 PID 3388 wrote to memory of 1000 3388 726C.tmp 103 PID 3388 wrote to memory of 1000 3388 726C.tmp 103 PID 1000 wrote to memory of 4952 1000 7395.tmp 104 PID 1000 wrote to memory of 4952 1000 7395.tmp 104 PID 1000 wrote to memory of 4952 1000 7395.tmp 104 PID 4952 wrote to memory of 2896 4952 7441.tmp 105 PID 4952 wrote to memory of 2896 4952 7441.tmp 105 PID 4952 wrote to memory of 2896 4952 7441.tmp 105 PID 2896 wrote to memory of 3212 2896 8102.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_8ad0cac94adf5a6691860f781996c73b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\2882.tmp"C:\Users\Admin\AppData\Local\Temp\2882.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\36CA.tmp"C:\Users\Admin\AppData\Local\Temp\36CA.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\37B5.tmp"C:\Users\Admin\AppData\Local\Temp\37B5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\397A.tmp"C:\Users\Admin\AppData\Local\Temp\397A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\3A93.tmp"C:\Users\Admin\AppData\Local\Temp\3A93.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\51E4.tmp"C:\Users\Admin\AppData\Local\Temp\51E4.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\5280.tmp"C:\Users\Admin\AppData\Local\Temp\5280.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\54C2.tmp"C:\Users\Admin\AppData\Local\Temp\54C2.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\6F20.tmp"C:\Users\Admin\AppData\Local\Temp\6F20.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\70F5.tmp"C:\Users\Admin\AppData\Local\Temp\70F5.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\71B0.tmp"C:\Users\Admin\AppData\Local\Temp\71B0.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\726C.tmp"C:\Users\Admin\AppData\Local\Temp\726C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\7441.tmp"C:\Users\Admin\AppData\Local\Temp\7441.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\8102.tmp"C:\Users\Admin\AppData\Local\Temp\8102.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\81BE.tmp"C:\Users\Admin\AppData\Local\Temp\81BE.tmp"23⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\8B72.tmp"C:\Users\Admin\AppData\Local\Temp\8B72.tmp"24⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\8C7C.tmp"C:\Users\Admin\AppData\Local\Temp\8C7C.tmp"25⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\98D0.tmp"C:\Users\Admin\AppData\Local\Temp\98D0.tmp"26⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"27⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\B159.tmp"C:\Users\Admin\AppData\Local\Temp\B159.tmp"28⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\B8CC.tmp"C:\Users\Admin\AppData\Local\Temp\B8CC.tmp"29⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\B977.tmp"C:\Users\Admin\AppData\Local\Temp\B977.tmp"30⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\BA71.tmp"C:\Users\Admin\AppData\Local\Temp\BA71.tmp"31⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"32⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\DBA5.tmp"C:\Users\Admin\AppData\Local\Temp\DBA5.tmp"33⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\EAF7.tmp"C:\Users\Admin\AppData\Local\Temp\EAF7.tmp"34⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\EB84.tmp"C:\Users\Admin\AppData\Local\Temp\EB84.tmp"35⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\F519.tmp"C:\Users\Admin\AppData\Local\Temp\F519.tmp"36⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\F5E4.tmp"C:\Users\Admin\AppData\Local\Temp\F5E4.tmp"37⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\323.tmp"C:\Users\Admin\AppData\Local\Temp\323.tmp"38⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\42C.tmp"C:\Users\Admin\AppData\Local\Temp\42C.tmp"39⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\71A.tmp"C:\Users\Admin\AppData\Local\Temp\71A.tmp"40⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\1515.tmp"C:\Users\Admin\AppData\Local\Temp\1515.tmp"41⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\1D04.tmp"C:\Users\Admin\AppData\Local\Temp\1D04.tmp"42⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\23BB.tmp"C:\Users\Admin\AppData\Local\Temp\23BB.tmp"43⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\2754.tmp"C:\Users\Admin\AppData\Local\Temp\2754.tmp"44⤵
- Executes dropped EXE
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\2DBD.tmp"C:\Users\Admin\AppData\Local\Temp\2DBD.tmp"45⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\2EC7.tmp"C:\Users\Admin\AppData\Local\Temp\2EC7.tmp"46⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\3118.tmp"C:\Users\Admin\AppData\Local\Temp\3118.tmp"47⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\3668.tmp"C:\Users\Admin\AppData\Local\Temp\3668.tmp"48⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\3F70.tmp"C:\Users\Admin\AppData\Local\Temp\3F70.tmp"49⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\4107.tmp"C:\Users\Admin\AppData\Local\Temp\4107.tmp"50⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\44C0.tmp"C:\Users\Admin\AppData\Local\Temp\44C0.tmp"51⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\45C9.tmp"C:\Users\Admin\AppData\Local\Temp\45C9.tmp"52⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\4ABB.tmp"C:\Users\Admin\AppData\Local\Temp\4ABB.tmp"53⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\51DF.tmp"C:\Users\Admin\AppData\Local\Temp\51DF.tmp"54⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\5356.tmp"C:\Users\Admin\AppData\Local\Temp\5356.tmp"55⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\54CD.tmp"C:\Users\Admin\AppData\Local\Temp\54CD.tmp"56⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\58C5.tmp"C:\Users\Admin\AppData\Local\Temp\58C5.tmp"57⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\5A8A.tmp"C:\Users\Admin\AppData\Local\Temp\5A8A.tmp"58⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\5B16.tmp"C:\Users\Admin\AppData\Local\Temp\5B16.tmp"59⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\5F1E.tmp"C:\Users\Admin\AppData\Local\Temp\5F1E.tmp"60⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\6095.tmp"C:\Users\Admin\AppData\Local\Temp\6095.tmp"61⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\649C.tmp"C:\Users\Admin\AppData\Local\Temp\649C.tmp"62⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\6557.tmp"C:\Users\Admin\AppData\Local\Temp\6557.tmp"63⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\6A39.tmp"C:\Users\Admin\AppData\Local\Temp\6A39.tmp"64⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\6C0E.tmp"C:\Users\Admin\AppData\Local\Temp\6C0E.tmp"65⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\6CCA.tmp"C:\Users\Admin\AppData\Local\Temp\6CCA.tmp"66⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\70F0.tmp"C:\Users\Admin\AppData\Local\Temp\70F0.tmp"67⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\73FD.tmp"C:\Users\Admin\AppData\Local\Temp\73FD.tmp"68⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\7546.tmp"C:\Users\Admin\AppData\Local\Temp\7546.tmp"69⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\76EB.tmp"C:\Users\Admin\AppData\Local\Temp\76EB.tmp"70⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\794D.tmp"C:\Users\Admin\AppData\Local\Temp\794D.tmp"71⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\7CF6.tmp"C:\Users\Admin\AppData\Local\Temp\7CF6.tmp"72⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\81E8.tmp"C:\Users\Admin\AppData\Local\Temp\81E8.tmp"73⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\83FB.tmp"C:\Users\Admin\AppData\Local\Temp\83FB.tmp"74⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\861E.tmp"C:\Users\Admin\AppData\Local\Temp\861E.tmp"75⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\86E9.tmp"C:\Users\Admin\AppData\Local\Temp\86E9.tmp"76⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\87E3.tmp"C:\Users\Admin\AppData\Local\Temp\87E3.tmp"77⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\890C.tmp"C:\Users\Admin\AppData\Local\Temp\890C.tmp"78⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\8A54.tmp"C:\Users\Admin\AppData\Local\Temp\8A54.tmp"79⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\8D90.tmp"C:\Users\Admin\AppData\Local\Temp\8D90.tmp"80⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\8F75.tmp"C:\Users\Admin\AppData\Local\Temp\8F75.tmp"81⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\907E.tmp"C:\Users\Admin\AppData\Local\Temp\907E.tmp"82⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\9292.tmp"C:\Users\Admin\AppData\Local\Temp\9292.tmp"83⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\936C.tmp"C:\Users\Admin\AppData\Local\Temp\936C.tmp"84⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\9437.tmp"C:\Users\Admin\AppData\Local\Temp\9437.tmp"85⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\94D4.tmp"C:\Users\Admin\AppData\Local\Temp\94D4.tmp"86⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\9B0D.tmp"C:\Users\Admin\AppData\Local\Temp\9B0D.tmp"87⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\9B7B.tmp"C:\Users\Admin\AppData\Local\Temp\9B7B.tmp"88⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\9C07.tmp"C:\Users\Admin\AppData\Local\Temp\9C07.tmp"89⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\9C94.tmp"C:\Users\Admin\AppData\Local\Temp\9C94.tmp"90⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\9D21.tmp"C:\Users\Admin\AppData\Local\Temp\9D21.tmp"91⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\9DCD.tmp"C:\Users\Admin\AppData\Local\Temp\9DCD.tmp"92⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\9E4A.tmp"C:\Users\Admin\AppData\Local\Temp\9E4A.tmp"93⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\9ED6.tmp"C:\Users\Admin\AppData\Local\Temp\9ED6.tmp"94⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\9F72.tmp"C:\Users\Admin\AppData\Local\Temp\9F72.tmp"95⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\A02E.tmp"C:\Users\Admin\AppData\Local\Temp\A02E.tmp"96⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\A0DA.tmp"C:\Users\Admin\AppData\Local\Temp\A0DA.tmp"97⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\A166.tmp"C:\Users\Admin\AppData\Local\Temp\A166.tmp"98⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\A212.tmp"C:\Users\Admin\AppData\Local\Temp\A212.tmp"99⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\A2BE.tmp"C:\Users\Admin\AppData\Local\Temp\A2BE.tmp"100⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\A34B.tmp"C:\Users\Admin\AppData\Local\Temp\A34B.tmp"101⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\A3D7.tmp"C:\Users\Admin\AppData\Local\Temp\A3D7.tmp"102⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\A474.tmp"C:\Users\Admin\AppData\Local\Temp\A474.tmp"103⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\A510.tmp"C:\Users\Admin\AppData\Local\Temp\A510.tmp"104⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\A59D.tmp"C:\Users\Admin\AppData\Local\Temp\A59D.tmp"105⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\A89A.tmp"C:\Users\Admin\AppData\Local\Temp\A89A.tmp"106⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\A936.tmp"C:\Users\Admin\AppData\Local\Temp\A936.tmp"107⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\A9C3.tmp"C:\Users\Admin\AppData\Local\Temp\A9C3.tmp"108⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\AA50.tmp"C:\Users\Admin\AppData\Local\Temp\AA50.tmp"109⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\AAFC.tmp"C:\Users\Admin\AppData\Local\Temp\AAFC.tmp"110⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\AB88.tmp"C:\Users\Admin\AppData\Local\Temp\AB88.tmp"111⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\AC34.tmp"C:\Users\Admin\AppData\Local\Temp\AC34.tmp"112⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\ACE0.tmp"C:\Users\Admin\AppData\Local\Temp\ACE0.tmp"113⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\AD5D.tmp"C:\Users\Admin\AppData\Local\Temp\AD5D.tmp"114⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\ADF9.tmp"C:\Users\Admin\AppData\Local\Temp\ADF9.tmp"115⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\AE95.tmp"C:\Users\Admin\AppData\Local\Temp\AE95.tmp"116⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\AF22.tmp"C:\Users\Admin\AppData\Local\Temp\AF22.tmp"117⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\AFCE.tmp"C:\Users\Admin\AppData\Local\Temp\AFCE.tmp"118⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\B06A.tmp"C:\Users\Admin\AppData\Local\Temp\B06A.tmp"119⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\B0F7.tmp"C:\Users\Admin\AppData\Local\Temp\B0F7.tmp"120⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\B193.tmp"C:\Users\Admin\AppData\Local\Temp\B193.tmp"121⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\B22F.tmp"C:\Users\Admin\AppData\Local\Temp\B22F.tmp"122⤵PID:4652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-