Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe
-
Size
486KB
-
MD5
1c4dacf55c2ad0797a6097e505a4c2a6
-
SHA1
c4e4c09a36731e57eefd4311c5500f0c322ff538
-
SHA256
ba04f0f0ee438dd8076218851b9b174c81f2c9c1d85b018eda80b90d3a0d7c18
-
SHA512
b8981c9ff2fecec826122a044f4a7a07c971e2aa2a25696d466c5826f2733f3eedc91413e33e7065c8de39f339999730360273ee70a811f7f205b8f559972221
-
SSDEEP
12288:/U5rCOTeiDmRIuvqjsvDVZFMqs3p1TGSNZ:/UQOJD19cVZFxs3p/N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4644 A21C.tmp 2096 A2A8.tmp 4340 A374.tmp 1632 A47D.tmp 1992 A50A.tmp 2900 A5B6.tmp 60 A662.tmp 3568 A6EE.tmp 1508 A77B.tmp 2448 A7E8.tmp 3064 A875.tmp 4072 A901.tmp 960 A9AD.tmp 1096 AA3A.tmp 432 AB05.tmp 3116 AB82.tmp 4168 AC2E.tmp 400 ACCA.tmp 1740 AD47.tmp 2332 ADF3.tmp 3800 AE8F.tmp 4296 AF4B.tmp 4048 AFE7.tmp 2744 B064.tmp 2212 B0F1.tmp 3212 B1AC.tmp 4080 B277.tmp 1380 B2F4.tmp 2364 B3A0.tmp 3608 B41D.tmp 1700 B49A.tmp 956 B508.tmp 2436 B5A4.tmp 3436 B650.tmp 3560 B6AD.tmp 2096 B74A.tmp 2012 B7C7.tmp 2256 B834.tmp 1284 B8A1.tmp 4504 B91E.tmp 2532 B99B.tmp 4344 BA28.tmp 3280 BAC4.tmp 1864 BB51.tmp 4856 BBDE.tmp 4760 BC6A.tmp 3620 BCF7.tmp 1908 BD55.tmp 2616 BE00.tmp 2664 BE9D.tmp 2776 BF29.tmp 316 BFB6.tmp 960 C052.tmp 4956 C0DF.tmp 1240 C17B.tmp 3116 C208.tmp 3368 C294.tmp 400 C2F2.tmp 528 C39E.tmp 1740 C40B.tmp 836 C4A8.tmp 4868 C534.tmp 4560 C5D0.tmp 4296 C65D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4644 3648 2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe 88 PID 3648 wrote to memory of 4644 3648 2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe 88 PID 3648 wrote to memory of 4644 3648 2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe 88 PID 4644 wrote to memory of 2096 4644 A21C.tmp 89 PID 4644 wrote to memory of 2096 4644 A21C.tmp 89 PID 4644 wrote to memory of 2096 4644 A21C.tmp 89 PID 2096 wrote to memory of 4340 2096 A2A8.tmp 90 PID 2096 wrote to memory of 4340 2096 A2A8.tmp 90 PID 2096 wrote to memory of 4340 2096 A2A8.tmp 90 PID 4340 wrote to memory of 1632 4340 A374.tmp 91 PID 4340 wrote to memory of 1632 4340 A374.tmp 91 PID 4340 wrote to memory of 1632 4340 A374.tmp 91 PID 1632 wrote to memory of 1992 1632 A47D.tmp 93 PID 1632 wrote to memory of 1992 1632 A47D.tmp 93 PID 1632 wrote to memory of 1992 1632 A47D.tmp 93 PID 1992 wrote to memory of 2900 1992 A50A.tmp 94 PID 1992 wrote to memory of 2900 1992 A50A.tmp 94 PID 1992 wrote to memory of 2900 1992 A50A.tmp 94 PID 2900 wrote to memory of 60 2900 A5B6.tmp 95 PID 2900 wrote to memory of 60 2900 A5B6.tmp 95 PID 2900 wrote to memory of 60 2900 A5B6.tmp 95 PID 60 wrote to memory of 3568 60 A662.tmp 96 PID 60 wrote to memory of 3568 60 A662.tmp 96 PID 60 wrote to memory of 3568 60 A662.tmp 96 PID 3568 wrote to memory of 1508 3568 A6EE.tmp 97 PID 3568 wrote to memory of 1508 3568 A6EE.tmp 97 PID 3568 wrote to memory of 1508 3568 A6EE.tmp 97 PID 1508 wrote to memory of 2448 1508 A77B.tmp 98 PID 1508 wrote to memory of 2448 1508 A77B.tmp 98 PID 1508 wrote to memory of 2448 1508 A77B.tmp 98 PID 2448 wrote to memory of 3064 2448 A7E8.tmp 99 PID 2448 wrote to memory of 3064 2448 A7E8.tmp 99 PID 2448 wrote to memory of 3064 2448 A7E8.tmp 99 PID 3064 wrote to memory of 4072 3064 A875.tmp 100 PID 3064 wrote to memory of 4072 3064 A875.tmp 100 PID 3064 wrote to memory of 4072 3064 A875.tmp 100 PID 4072 wrote to memory of 960 4072 A901.tmp 101 PID 4072 wrote to memory of 960 4072 A901.tmp 101 PID 4072 wrote to memory of 960 4072 A901.tmp 101 PID 960 wrote to memory of 1096 960 A9AD.tmp 102 PID 960 wrote to memory of 1096 960 A9AD.tmp 102 PID 960 wrote to memory of 1096 960 A9AD.tmp 102 PID 1096 wrote to memory of 432 1096 AA3A.tmp 103 PID 1096 wrote to memory of 432 1096 AA3A.tmp 103 PID 1096 wrote to memory of 432 1096 AA3A.tmp 103 PID 432 wrote to memory of 3116 432 AB05.tmp 104 PID 432 wrote to memory of 3116 432 AB05.tmp 104 PID 432 wrote to memory of 3116 432 AB05.tmp 104 PID 3116 wrote to memory of 4168 3116 AB82.tmp 105 PID 3116 wrote to memory of 4168 3116 AB82.tmp 105 PID 3116 wrote to memory of 4168 3116 AB82.tmp 105 PID 4168 wrote to memory of 400 4168 AC2E.tmp 106 PID 4168 wrote to memory of 400 4168 AC2E.tmp 106 PID 4168 wrote to memory of 400 4168 AC2E.tmp 106 PID 400 wrote to memory of 1740 400 ACCA.tmp 107 PID 400 wrote to memory of 1740 400 ACCA.tmp 107 PID 400 wrote to memory of 1740 400 ACCA.tmp 107 PID 1740 wrote to memory of 2332 1740 AD47.tmp 108 PID 1740 wrote to memory of 2332 1740 AD47.tmp 108 PID 1740 wrote to memory of 2332 1740 AD47.tmp 108 PID 2332 wrote to memory of 3800 2332 ADF3.tmp 109 PID 2332 wrote to memory of 3800 2332 ADF3.tmp 109 PID 2332 wrote to memory of 3800 2332 ADF3.tmp 109 PID 3800 wrote to memory of 4296 3800 AE8F.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_1c4dacf55c2ad0797a6097e505a4c2a6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\A374.tmp"C:\Users\Admin\AppData\Local\Temp\A374.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\A47D.tmp"C:\Users\Admin\AppData\Local\Temp\A47D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\A50A.tmp"C:\Users\Admin\AppData\Local\Temp\A50A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\A5B6.tmp"C:\Users\Admin\AppData\Local\Temp\A5B6.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\A77B.tmp"C:\Users\Admin\AppData\Local\Temp\A77B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\A7E8.tmp"C:\Users\Admin\AppData\Local\Temp\A7E8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\A901.tmp"C:\Users\Admin\AppData\Local\Temp\A901.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\AB05.tmp"C:\Users\Admin\AppData\Local\Temp\AB05.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\AD47.tmp"C:\Users\Admin\AppData\Local\Temp\AD47.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"23⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"24⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"25⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"26⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"27⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\B277.tmp"C:\Users\Admin\AppData\Local\Temp\B277.tmp"28⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"29⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"30⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\B41D.tmp"C:\Users\Admin\AppData\Local\Temp\B41D.tmp"31⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\B49A.tmp"C:\Users\Admin\AppData\Local\Temp\B49A.tmp"32⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"33⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"34⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\B650.tmp"C:\Users\Admin\AppData\Local\Temp\B650.tmp"35⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"36⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"37⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"38⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"39⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"40⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"41⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"42⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"43⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"44⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"45⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"46⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\BC6A.tmp"C:\Users\Admin\AppData\Local\Temp\BC6A.tmp"47⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"48⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"49⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\BE00.tmp"C:\Users\Admin\AppData\Local\Temp\BE00.tmp"50⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"51⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"52⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"53⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\C052.tmp"C:\Users\Admin\AppData\Local\Temp\C052.tmp"54⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"55⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\C17B.tmp"C:\Users\Admin\AppData\Local\Temp\C17B.tmp"56⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"57⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\C294.tmp"C:\Users\Admin\AppData\Local\Temp\C294.tmp"58⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"59⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\C39E.tmp"C:\Users\Admin\AppData\Local\Temp\C39E.tmp"60⤵
- Executes dropped EXE
PID:528 -
C:\Users\Admin\AppData\Local\Temp\C40B.tmp"C:\Users\Admin\AppData\Local\Temp\C40B.tmp"61⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"62⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"63⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\C5D0.tmp"C:\Users\Admin\AppData\Local\Temp\C5D0.tmp"64⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"65⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"66⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"67⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\C803.tmp"C:\Users\Admin\AppData\Local\Temp\C803.tmp"68⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"69⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\C91C.tmp"C:\Users\Admin\AppData\Local\Temp\C91C.tmp"70⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"71⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\CA26.tmp"C:\Users\Admin\AppData\Local\Temp\CA26.tmp"72⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"73⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"74⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"75⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\CC87.tmp"C:\Users\Admin\AppData\Local\Temp\CC87.tmp"76⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"77⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"78⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"79⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"80⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"81⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"82⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"83⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"84⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"85⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\D13A.tmp"C:\Users\Admin\AppData\Local\Temp\D13A.tmp"86⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"87⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"88⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"89⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\D30F.tmp"C:\Users\Admin\AppData\Local\Temp\D30F.tmp"90⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"91⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"92⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\D486.tmp"C:\Users\Admin\AppData\Local\Temp\D486.tmp"93⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"94⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"95⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"96⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"97⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"98⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"99⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\D83F.tmp"C:\Users\Admin\AppData\Local\Temp\D83F.tmp"100⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"101⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"102⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"103⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"104⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\DA52.tmp"C:\Users\Admin\AppData\Local\Temp\DA52.tmp"105⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"106⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"107⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\DC08.tmp"C:\Users\Admin\AppData\Local\Temp\DC08.tmp"108⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"109⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"110⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\DD50.tmp"C:\Users\Admin\AppData\Local\Temp\DD50.tmp"111⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"112⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"113⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"114⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"115⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"116⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\E04E.tmp"C:\Users\Admin\AppData\Local\Temp\E04E.tmp"117⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"118⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"119⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"120⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\E251.tmp"C:\Users\Admin\AppData\Local\Temp\E251.tmp"121⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"122⤵PID:2708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-