Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe
-
Size
520KB
-
MD5
e0fee78ce76860f7b3aad6feff2f926d
-
SHA1
93521b78a1f0f3fb83e3fa27af0e87e044b0def1
-
SHA256
58035bb8b52e5215b087851a73834d1d788064e72e0e31ab47333b69d3671bab
-
SHA512
4719b04e45d8312f41b93c874df2ed7e385ba791161633b0dfbf9cb414761ff985d00dbf2ca9fe5f250481628f1fea8f3e444ca4eb74148e9e7028a09e68a37e
-
SSDEEP
12288:gj8fuxR21t5i8ftv/djgiB3jt/0KwurNZ:gj8fuK1GYtHTsQrN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 452 7A50.tmp 3584 7B2B.tmp 3960 7BF6.tmp 4648 7D00.tmp 1520 7DEA.tmp 4884 7E77.tmp 1324 7F03.tmp 2020 7FA0.tmp 3324 804C.tmp 4000 8107.tmp 4480 81D2.tmp 828 827E.tmp 2360 83A7.tmp 2540 8462.tmp 2396 84C0.tmp 1064 858B.tmp 3984 8666.tmp 540 8731.tmp 2700 881C.tmp 1140 8B38.tmp 2176 8BE4.tmp 2696 8CBF.tmp 2836 8D9A.tmp 1580 8E94.tmp 2892 8F30.tmp 3128 8FBD.tmp 1004 9059.tmp 4156 90F5.tmp 4380 91A1.tmp 4708 92BA.tmp 4892 9599.tmp 4776 9625.tmp 440 96F0.tmp 3020 974E.tmp 208 9819.tmp 3604 9AF8.tmp 3164 9BD2.tmp 4376 9C6F.tmp 2548 9D1B.tmp 2520 9DA7.tmp 2024 9F7C.tmp 4200 9FF9.tmp 4464 A057.tmp 4784 A0D4.tmp 2480 A20C.tmp 3884 A299.tmp 1240 A364.tmp 732 A3E1.tmp 4828 A46E.tmp 4252 A4EB.tmp 472 A558.tmp 4472 A5F4.tmp 2536 A681.tmp 2896 A71D.tmp 736 A79A.tmp 1952 A817.tmp 4740 AD47.tmp 4664 AFB8.tmp 3812 B035.tmp 1116 B0A3.tmp 3132 B100.tmp 2540 B18D.tmp 556 B20A.tmp 2516 B297.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3348 wrote to memory of 452 3348 2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe 83 PID 3348 wrote to memory of 452 3348 2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe 83 PID 3348 wrote to memory of 452 3348 2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe 83 PID 452 wrote to memory of 3584 452 7A50.tmp 84 PID 452 wrote to memory of 3584 452 7A50.tmp 84 PID 452 wrote to memory of 3584 452 7A50.tmp 84 PID 3584 wrote to memory of 3960 3584 7B2B.tmp 85 PID 3584 wrote to memory of 3960 3584 7B2B.tmp 85 PID 3584 wrote to memory of 3960 3584 7B2B.tmp 85 PID 3960 wrote to memory of 4648 3960 7BF6.tmp 86 PID 3960 wrote to memory of 4648 3960 7BF6.tmp 86 PID 3960 wrote to memory of 4648 3960 7BF6.tmp 86 PID 4648 wrote to memory of 1520 4648 7D00.tmp 87 PID 4648 wrote to memory of 1520 4648 7D00.tmp 87 PID 4648 wrote to memory of 1520 4648 7D00.tmp 87 PID 1520 wrote to memory of 4884 1520 7DEA.tmp 88 PID 1520 wrote to memory of 4884 1520 7DEA.tmp 88 PID 1520 wrote to memory of 4884 1520 7DEA.tmp 88 PID 4884 wrote to memory of 1324 4884 7E77.tmp 89 PID 4884 wrote to memory of 1324 4884 7E77.tmp 89 PID 4884 wrote to memory of 1324 4884 7E77.tmp 89 PID 1324 wrote to memory of 2020 1324 7F03.tmp 90 PID 1324 wrote to memory of 2020 1324 7F03.tmp 90 PID 1324 wrote to memory of 2020 1324 7F03.tmp 90 PID 2020 wrote to memory of 3324 2020 7FA0.tmp 91 PID 2020 wrote to memory of 3324 2020 7FA0.tmp 91 PID 2020 wrote to memory of 3324 2020 7FA0.tmp 91 PID 3324 wrote to memory of 4000 3324 804C.tmp 92 PID 3324 wrote to memory of 4000 3324 804C.tmp 92 PID 3324 wrote to memory of 4000 3324 804C.tmp 92 PID 4000 wrote to memory of 4480 4000 8107.tmp 93 PID 4000 wrote to memory of 4480 4000 8107.tmp 93 PID 4000 wrote to memory of 4480 4000 8107.tmp 93 PID 4480 wrote to memory of 828 4480 81D2.tmp 94 PID 4480 wrote to memory of 828 4480 81D2.tmp 94 PID 4480 wrote to memory of 828 4480 81D2.tmp 94 PID 828 wrote to memory of 2360 828 827E.tmp 95 PID 828 wrote to memory of 2360 828 827E.tmp 95 PID 828 wrote to memory of 2360 828 827E.tmp 95 PID 2360 wrote to memory of 2540 2360 83A7.tmp 96 PID 2360 wrote to memory of 2540 2360 83A7.tmp 96 PID 2360 wrote to memory of 2540 2360 83A7.tmp 96 PID 2540 wrote to memory of 2396 2540 8462.tmp 97 PID 2540 wrote to memory of 2396 2540 8462.tmp 97 PID 2540 wrote to memory of 2396 2540 8462.tmp 97 PID 2396 wrote to memory of 1064 2396 84C0.tmp 98 PID 2396 wrote to memory of 1064 2396 84C0.tmp 98 PID 2396 wrote to memory of 1064 2396 84C0.tmp 98 PID 1064 wrote to memory of 3984 1064 858B.tmp 99 PID 1064 wrote to memory of 3984 1064 858B.tmp 99 PID 1064 wrote to memory of 3984 1064 858B.tmp 99 PID 3984 wrote to memory of 540 3984 8666.tmp 100 PID 3984 wrote to memory of 540 3984 8666.tmp 100 PID 3984 wrote to memory of 540 3984 8666.tmp 100 PID 540 wrote to memory of 2700 540 8731.tmp 101 PID 540 wrote to memory of 2700 540 8731.tmp 101 PID 540 wrote to memory of 2700 540 8731.tmp 101 PID 2700 wrote to memory of 1140 2700 881C.tmp 102 PID 2700 wrote to memory of 1140 2700 881C.tmp 102 PID 2700 wrote to memory of 1140 2700 881C.tmp 102 PID 1140 wrote to memory of 2176 1140 8B38.tmp 103 PID 1140 wrote to memory of 2176 1140 8B38.tmp 103 PID 1140 wrote to memory of 2176 1140 8B38.tmp 103 PID 2176 wrote to memory of 2696 2176 8BE4.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_e0fee78ce76860f7b3aad6feff2f926d_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\7A50.tmp"C:\Users\Admin\AppData\Local\Temp\7A50.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\7D00.tmp"C:\Users\Admin\AppData\Local\Temp\7D00.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\7F03.tmp"C:\Users\Admin\AppData\Local\Temp\7F03.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\8107.tmp"C:\Users\Admin\AppData\Local\Temp\8107.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\81D2.tmp"C:\Users\Admin\AppData\Local\Temp\81D2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\827E.tmp"C:\Users\Admin\AppData\Local\Temp\827E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\83A7.tmp"C:\Users\Admin\AppData\Local\Temp\83A7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\8462.tmp"C:\Users\Admin\AppData\Local\Temp\8462.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\84C0.tmp"C:\Users\Admin\AppData\Local\Temp\84C0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\858B.tmp"C:\Users\Admin\AppData\Local\Temp\858B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\8666.tmp"C:\Users\Admin\AppData\Local\Temp\8666.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\8731.tmp"C:\Users\Admin\AppData\Local\Temp\8731.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\881C.tmp"C:\Users\Admin\AppData\Local\Temp\881C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\8B38.tmp"C:\Users\Admin\AppData\Local\Temp\8B38.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"23⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"24⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"25⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\8F30.tmp"C:\Users\Admin\AppData\Local\Temp\8F30.tmp"26⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\8FBD.tmp"C:\Users\Admin\AppData\Local\Temp\8FBD.tmp"27⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\9059.tmp"C:\Users\Admin\AppData\Local\Temp\9059.tmp"28⤵
- Executes dropped EXE
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\90F5.tmp"C:\Users\Admin\AppData\Local\Temp\90F5.tmp"29⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\91A1.tmp"C:\Users\Admin\AppData\Local\Temp\91A1.tmp"30⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"31⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\9599.tmp"C:\Users\Admin\AppData\Local\Temp\9599.tmp"32⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\9625.tmp"C:\Users\Admin\AppData\Local\Temp\9625.tmp"33⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"34⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\974E.tmp"C:\Users\Admin\AppData\Local\Temp\974E.tmp"35⤵
- Executes dropped EXE
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\9819.tmp"C:\Users\Admin\AppData\Local\Temp\9819.tmp"36⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\9AF8.tmp"C:\Users\Admin\AppData\Local\Temp\9AF8.tmp"37⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"38⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"39⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"40⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"41⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"42⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"43⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\A057.tmp"C:\Users\Admin\AppData\Local\Temp\A057.tmp"44⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"45⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\A20C.tmp"C:\Users\Admin\AppData\Local\Temp\A20C.tmp"46⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"47⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"48⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"49⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\A46E.tmp"C:\Users\Admin\AppData\Local\Temp\A46E.tmp"50⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"51⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"52⤵
- Executes dropped EXE
PID:472 -
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"53⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\A681.tmp"C:\Users\Admin\AppData\Local\Temp\A681.tmp"54⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\A71D.tmp"C:\Users\Admin\AppData\Local\Temp\A71D.tmp"55⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"56⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\A817.tmp"C:\Users\Admin\AppData\Local\Temp\A817.tmp"57⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\AD47.tmp"C:\Users\Admin\AppData\Local\Temp\AD47.tmp"58⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"59⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"60⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"61⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"62⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"63⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\B20A.tmp"C:\Users\Admin\AppData\Local\Temp\B20A.tmp"64⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"65⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\B621.tmp"C:\Users\Admin\AppData\Local\Temp\B621.tmp"66⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"67⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"68⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"69⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"70⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\BA38.tmp"C:\Users\Admin\AppData\Local\Temp\BA38.tmp"71⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"72⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"73⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"74⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"75⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"76⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"77⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"78⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\C004.tmp"C:\Users\Admin\AppData\Local\Temp\C004.tmp"79⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"80⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"81⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"82⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\C227.tmp"C:\Users\Admin\AppData\Local\Temp\C227.tmp"83⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"84⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"85⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"86⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\C488.tmp"C:\Users\Admin\AppData\Local\Temp\C488.tmp"87⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"88⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"89⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"90⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\D215.tmp"C:\Users\Admin\AppData\Local\Temp\D215.tmp"91⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\D30F.tmp"C:\Users\Admin\AppData\Local\Temp\D30F.tmp"92⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"93⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"94⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"95⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"96⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\D60D.tmp"C:\Users\Admin\AppData\Local\Temp\D60D.tmp"97⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\D6A9.tmp"C:\Users\Admin\AppData\Local\Temp\D6A9.tmp"98⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"99⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"100⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\D830.tmp"C:\Users\Admin\AppData\Local\Temp\D830.tmp"101⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"102⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\D987.tmp"C:\Users\Admin\AppData\Local\Temp\D987.tmp"103⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"104⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"105⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"106⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"107⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\DC37.tmp"C:\Users\Admin\AppData\Local\Temp\DC37.tmp"108⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"109⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\DD60.tmp"C:\Users\Admin\AppData\Local\Temp\DD60.tmp"110⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"111⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"112⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\DF15.tmp"C:\Users\Admin\AppData\Local\Temp\DF15.tmp"113⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"114⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"115⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\E09C.tmp"C:\Users\Admin\AppData\Local\Temp\E09C.tmp"116⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\E128.tmp"C:\Users\Admin\AppData\Local\Temp\E128.tmp"117⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"118⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"119⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"120⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"121⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"122⤵PID:1064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-