Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe
-
Size
486KB
-
MD5
a5e106150d93f52c6556d04d21165c0f
-
SHA1
11682fb1a0b1f70f2a02d44fdc5734852f7946d4
-
SHA256
fde1888f9d6cbc184f44125eebb163381fc67f6e3b15a75d3aef02c2497313f1
-
SHA512
9da6bf72dd52490bc981bf99819224a2fd4514be93fc372f5c9873d87d62b4ce316b383bf44755f5f692af3aeb0863cbdc1b67f53a611e29d514eb30e69b2b84
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7hc8bk9xaEM3rt1fahHgDG4xEY4itG5ny9sHT:/U5rCOTeiDBbkJMbvf0AtxHT2ySNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 936 B054.tmp 1648 B1BC.tmp 1228 B277.tmp 2872 B314.tmp 3396 B40E.tmp 1208 B4AA.tmp 3412 B575.tmp 4656 B779.tmp 4980 B834.tmp 2604 B8C1.tmp 2292 B97C.tmp 3620 BA57.tmp 3744 BAE4.tmp 2836 BBCE.tmp 2692 BC6A.tmp 1928 BD55.tmp 4968 BDE1.tmp 1600 BE7D.tmp 4456 BF29.tmp 2320 BFF4.tmp 4400 C0A0.tmp 4892 C19A.tmp 3624 C265.tmp 2680 C331.tmp 492 C3CD.tmp 1428 C4D6.tmp 1064 C5A2.tmp 740 C65D.tmp 3124 C6F9.tmp 216 C7C4.tmp 4344 C861.tmp 4784 C91C.tmp 3676 C9E7.tmp 3320 CA55.tmp 2084 CB01.tmp 3576 CBAC.tmp 3484 CC78.tmp 4668 CCF5.tmp 4596 CD52.tmp 1336 CDEF.tmp 3640 CE9A.tmp 4044 CF37.tmp 3392 D06F.tmp 3680 D1B7.tmp 2952 D234.tmp 2484 D2D1.tmp 2396 D37C.tmp 2464 D428.tmp 1648 D4C5.tmp 4952 D542.tmp 4188 D5AF.tmp 1784 D63C.tmp 1880 D6D8.tmp 212 D755.tmp 3288 D7D2.tmp 1208 D85E.tmp 2196 D8EB.tmp 1512 D968.tmp 2248 D9D5.tmp 3800 DA52.tmp 648 DADF.tmp 3132 DB6C.tmp 1016 DBF8.tmp 4992 DC85.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 936 3728 2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe 88 PID 3728 wrote to memory of 936 3728 2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe 88 PID 3728 wrote to memory of 936 3728 2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe 88 PID 936 wrote to memory of 1648 936 B054.tmp 89 PID 936 wrote to memory of 1648 936 B054.tmp 89 PID 936 wrote to memory of 1648 936 B054.tmp 89 PID 1648 wrote to memory of 1228 1648 B1BC.tmp 91 PID 1648 wrote to memory of 1228 1648 B1BC.tmp 91 PID 1648 wrote to memory of 1228 1648 B1BC.tmp 91 PID 1228 wrote to memory of 2872 1228 B277.tmp 92 PID 1228 wrote to memory of 2872 1228 B277.tmp 92 PID 1228 wrote to memory of 2872 1228 B277.tmp 92 PID 2872 wrote to memory of 3396 2872 B314.tmp 93 PID 2872 wrote to memory of 3396 2872 B314.tmp 93 PID 2872 wrote to memory of 3396 2872 B314.tmp 93 PID 3396 wrote to memory of 1208 3396 B40E.tmp 94 PID 3396 wrote to memory of 1208 3396 B40E.tmp 94 PID 3396 wrote to memory of 1208 3396 B40E.tmp 94 PID 1208 wrote to memory of 3412 1208 B4AA.tmp 95 PID 1208 wrote to memory of 3412 1208 B4AA.tmp 95 PID 1208 wrote to memory of 3412 1208 B4AA.tmp 95 PID 3412 wrote to memory of 4656 3412 B575.tmp 96 PID 3412 wrote to memory of 4656 3412 B575.tmp 96 PID 3412 wrote to memory of 4656 3412 B575.tmp 96 PID 4656 wrote to memory of 4980 4656 B779.tmp 97 PID 4656 wrote to memory of 4980 4656 B779.tmp 97 PID 4656 wrote to memory of 4980 4656 B779.tmp 97 PID 4980 wrote to memory of 2604 4980 B834.tmp 98 PID 4980 wrote to memory of 2604 4980 B834.tmp 98 PID 4980 wrote to memory of 2604 4980 B834.tmp 98 PID 2604 wrote to memory of 2292 2604 B8C1.tmp 100 PID 2604 wrote to memory of 2292 2604 B8C1.tmp 100 PID 2604 wrote to memory of 2292 2604 B8C1.tmp 100 PID 2292 wrote to memory of 3620 2292 B97C.tmp 101 PID 2292 wrote to memory of 3620 2292 B97C.tmp 101 PID 2292 wrote to memory of 3620 2292 B97C.tmp 101 PID 3620 wrote to memory of 3744 3620 BA57.tmp 102 PID 3620 wrote to memory of 3744 3620 BA57.tmp 102 PID 3620 wrote to memory of 3744 3620 BA57.tmp 102 PID 3744 wrote to memory of 2836 3744 BAE4.tmp 104 PID 3744 wrote to memory of 2836 3744 BAE4.tmp 104 PID 3744 wrote to memory of 2836 3744 BAE4.tmp 104 PID 2836 wrote to memory of 2692 2836 BBCE.tmp 105 PID 2836 wrote to memory of 2692 2836 BBCE.tmp 105 PID 2836 wrote to memory of 2692 2836 BBCE.tmp 105 PID 2692 wrote to memory of 1928 2692 BC6A.tmp 106 PID 2692 wrote to memory of 1928 2692 BC6A.tmp 106 PID 2692 wrote to memory of 1928 2692 BC6A.tmp 106 PID 1928 wrote to memory of 4968 1928 BD55.tmp 107 PID 1928 wrote to memory of 4968 1928 BD55.tmp 107 PID 1928 wrote to memory of 4968 1928 BD55.tmp 107 PID 4968 wrote to memory of 1600 4968 BDE1.tmp 108 PID 4968 wrote to memory of 1600 4968 BDE1.tmp 108 PID 4968 wrote to memory of 1600 4968 BDE1.tmp 108 PID 1600 wrote to memory of 4456 1600 BE7D.tmp 109 PID 1600 wrote to memory of 4456 1600 BE7D.tmp 109 PID 1600 wrote to memory of 4456 1600 BE7D.tmp 109 PID 4456 wrote to memory of 2320 4456 BF29.tmp 110 PID 4456 wrote to memory of 2320 4456 BF29.tmp 110 PID 4456 wrote to memory of 2320 4456 BF29.tmp 110 PID 2320 wrote to memory of 4400 2320 BFF4.tmp 111 PID 2320 wrote to memory of 4400 2320 BFF4.tmp 111 PID 2320 wrote to memory of 4400 2320 BFF4.tmp 111 PID 4400 wrote to memory of 4892 4400 C0A0.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_a5e106150d93f52c6556d04d21165c0f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\B054.tmp"C:\Users\Admin\AppData\Local\Temp\B054.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\B277.tmp"C:\Users\Admin\AppData\Local\Temp\B277.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\B40E.tmp"C:\Users\Admin\AppData\Local\Temp\B40E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\B779.tmp"C:\Users\Admin\AppData\Local\Temp\B779.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\BC6A.tmp"C:\Users\Admin\AppData\Local\Temp\BC6A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"23⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"24⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"25⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"26⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"27⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"28⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"29⤵
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"30⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"31⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\C861.tmp"C:\Users\Admin\AppData\Local\Temp\C861.tmp"32⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\C91C.tmp"C:\Users\Admin\AppData\Local\Temp\C91C.tmp"33⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"34⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\CA55.tmp"C:\Users\Admin\AppData\Local\Temp\CA55.tmp"35⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\CB01.tmp"C:\Users\Admin\AppData\Local\Temp\CB01.tmp"36⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"37⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"38⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"39⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"40⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"41⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"42⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\CF37.tmp"C:\Users\Admin\AppData\Local\Temp\CF37.tmp"43⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"44⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"45⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"46⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"47⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"48⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\D37C.tmp"C:\Users\Admin\AppData\Local\Temp\D37C.tmp"49⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\D428.tmp"C:\Users\Admin\AppData\Local\Temp\D428.tmp"50⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"51⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\D542.tmp"C:\Users\Admin\AppData\Local\Temp\D542.tmp"52⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"53⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"54⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"55⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"56⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"57⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"58⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"59⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\D968.tmp"C:\Users\Admin\AppData\Local\Temp\D968.tmp"60⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"61⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\DA52.tmp"C:\Users\Admin\AppData\Local\Temp\DA52.tmp"62⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"63⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"64⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"65⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"66⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"67⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"68⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"69⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"70⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"71⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"72⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\E02E.tmp"C:\Users\Admin\AppData\Local\Temp\E02E.tmp"73⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"74⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"75⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"76⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\E222.tmp"C:\Users\Admin\AppData\Local\Temp\E222.tmp"77⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\E29F.tmp"C:\Users\Admin\AppData\Local\Temp\E29F.tmp"78⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"79⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"80⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"81⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\E501.tmp"C:\Users\Admin\AppData\Local\Temp\E501.tmp"82⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\E59D.tmp"C:\Users\Admin\AppData\Local\Temp\E59D.tmp"83⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"84⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"85⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"86⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\182.tmp"C:\Users\Admin\AppData\Local\Temp\182.tmp"87⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"88⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\29B.tmp"C:\Users\Admin\AppData\Local\Temp\29B.tmp"89⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"90⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"91⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\402.tmp"C:\Users\Admin\AppData\Local\Temp\402.tmp"92⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"93⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\4DD.tmp"C:\Users\Admin\AppData\Local\Temp\4DD.tmp"94⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\54A.tmp"C:\Users\Admin\AppData\Local\Temp\54A.tmp"95⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\5D7.tmp"C:\Users\Admin\AppData\Local\Temp\5D7.tmp"96⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\673.tmp"C:\Users\Admin\AppData\Local\Temp\673.tmp"97⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"98⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"99⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\17F8.tmp"C:\Users\Admin\AppData\Local\Temp\17F8.tmp"100⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"101⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\1911.tmp"C:\Users\Admin\AppData\Local\Temp\1911.tmp"102⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"103⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\1A88.tmp"C:\Users\Admin\AppData\Local\Temp\1A88.tmp"104⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"105⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"106⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"107⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"108⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"109⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"110⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"111⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"112⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\34F6.tmp"C:\Users\Admin\AppData\Local\Temp\34F6.tmp"113⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3573.tmp"C:\Users\Admin\AppData\Local\Temp\3573.tmp"114⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"115⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\3757.tmp"C:\Users\Admin\AppData\Local\Temp\3757.tmp"116⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\37E4.tmp"C:\Users\Admin\AppData\Local\Temp\37E4.tmp"117⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\3861.tmp"C:\Users\Admin\AppData\Local\Temp\3861.tmp"118⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"119⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"120⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"121⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"122⤵PID:3744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-