Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe
-
Size
487KB
-
MD5
37f7c693ee3c9a698de76bcaa7175016
-
SHA1
809812568d1a5bddc17f7e3f33fd66593a357705
-
SHA256
f11d8c66bf370a4282ae7cf935d1999f2d1b918b3d6e41105dc5719282607f20
-
SHA512
1b5c815a0fc1519ddced9622425a74f601fae660387337ae4fa4246dd03890bf3220de94d1fb3bb14f41d3ae1d5686f9fc971a08011ed744e8123f3ad56545a6
-
SSDEEP
6144:qorf3lPvovsgZnqG2C7mOTeiL9DUHAhMf3LaMD7U8IfoU3ayVz6/Ec4wVEJ6mcsz:HU5rCOTeiJWAhxMvU8Ifx3DG9EhNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1624 9422.tmp 1688 94CE.tmp 4416 9589.tmp 3588 9645.tmp 3408 9700.tmp 4636 97FA.tmp 744 98C5.tmp 1860 9990.tmp 3364 9A1D.tmp 2200 9AD8.tmp 2248 9B84.tmp 2236 9C21.tmp 4488 9CCC.tmp 3780 9D59.tmp 5008 9E34.tmp 2384 9EB1.tmp 4512 9F6C.tmp 2600 9FE9.tmp 2744 A0A5.tmp 3148 A170.tmp 4460 A1FD.tmp 3268 A2A8.tmp 3380 A3A2.tmp 736 A42F.tmp 932 A519.tmp 4596 A596.tmp 3396 A623.tmp 4600 A6BF.tmp 4884 A77B.tmp 1776 A836.tmp 2212 A921.tmp 4564 A9EC.tmp 4192 AA98.tmp 1828 AB44.tmp 464 ABC1.tmp 2200 AC2E.tmp 1172 ACBB.tmp 5108 AD18.tmp 1628 ADA5.tmp 3544 AE22.tmp 5100 AEBE.tmp 984 AF7A.tmp 1592 B016.tmp 4032 B0C2.tmp 4548 B15E.tmp 4628 B1CB.tmp 1012 B239.tmp 2948 B2B6.tmp 4980 B342.tmp 564 B3DF.tmp 4936 B46B.tmp 5004 B536.tmp 1796 B5D3.tmp 576 B640.tmp 4564 B6AD.tmp 4192 B788.tmp 1828 B834.tmp 464 B8D0.tmp 2992 B93E.tmp 964 B9AB.tmp 5108 BA18.tmp 2404 BAD4.tmp 3976 BB70.tmp 4900 BBED.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1624 632 2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe 94 PID 632 wrote to memory of 1624 632 2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe 94 PID 632 wrote to memory of 1624 632 2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe 94 PID 1624 wrote to memory of 1688 1624 9422.tmp 95 PID 1624 wrote to memory of 1688 1624 9422.tmp 95 PID 1624 wrote to memory of 1688 1624 9422.tmp 95 PID 1688 wrote to memory of 4416 1688 94CE.tmp 96 PID 1688 wrote to memory of 4416 1688 94CE.tmp 96 PID 1688 wrote to memory of 4416 1688 94CE.tmp 96 PID 4416 wrote to memory of 3588 4416 9589.tmp 98 PID 4416 wrote to memory of 3588 4416 9589.tmp 98 PID 4416 wrote to memory of 3588 4416 9589.tmp 98 PID 3588 wrote to memory of 3408 3588 9645.tmp 99 PID 3588 wrote to memory of 3408 3588 9645.tmp 99 PID 3588 wrote to memory of 3408 3588 9645.tmp 99 PID 3408 wrote to memory of 4636 3408 9700.tmp 101 PID 3408 wrote to memory of 4636 3408 9700.tmp 101 PID 3408 wrote to memory of 4636 3408 9700.tmp 101 PID 4636 wrote to memory of 744 4636 97FA.tmp 102 PID 4636 wrote to memory of 744 4636 97FA.tmp 102 PID 4636 wrote to memory of 744 4636 97FA.tmp 102 PID 744 wrote to memory of 1860 744 98C5.tmp 103 PID 744 wrote to memory of 1860 744 98C5.tmp 103 PID 744 wrote to memory of 1860 744 98C5.tmp 103 PID 1860 wrote to memory of 3364 1860 9990.tmp 104 PID 1860 wrote to memory of 3364 1860 9990.tmp 104 PID 1860 wrote to memory of 3364 1860 9990.tmp 104 PID 3364 wrote to memory of 2200 3364 9A1D.tmp 105 PID 3364 wrote to memory of 2200 3364 9A1D.tmp 105 PID 3364 wrote to memory of 2200 3364 9A1D.tmp 105 PID 2200 wrote to memory of 2248 2200 9AD8.tmp 106 PID 2200 wrote to memory of 2248 2200 9AD8.tmp 106 PID 2200 wrote to memory of 2248 2200 9AD8.tmp 106 PID 2248 wrote to memory of 2236 2248 9B84.tmp 107 PID 2248 wrote to memory of 2236 2248 9B84.tmp 107 PID 2248 wrote to memory of 2236 2248 9B84.tmp 107 PID 2236 wrote to memory of 4488 2236 9C21.tmp 108 PID 2236 wrote to memory of 4488 2236 9C21.tmp 108 PID 2236 wrote to memory of 4488 2236 9C21.tmp 108 PID 4488 wrote to memory of 3780 4488 9CCC.tmp 109 PID 4488 wrote to memory of 3780 4488 9CCC.tmp 109 PID 4488 wrote to memory of 3780 4488 9CCC.tmp 109 PID 3780 wrote to memory of 5008 3780 9D59.tmp 110 PID 3780 wrote to memory of 5008 3780 9D59.tmp 110 PID 3780 wrote to memory of 5008 3780 9D59.tmp 110 PID 5008 wrote to memory of 2384 5008 9E34.tmp 111 PID 5008 wrote to memory of 2384 5008 9E34.tmp 111 PID 5008 wrote to memory of 2384 5008 9E34.tmp 111 PID 2384 wrote to memory of 4512 2384 9EB1.tmp 112 PID 2384 wrote to memory of 4512 2384 9EB1.tmp 112 PID 2384 wrote to memory of 4512 2384 9EB1.tmp 112 PID 4512 wrote to memory of 2600 4512 9F6C.tmp 113 PID 4512 wrote to memory of 2600 4512 9F6C.tmp 113 PID 4512 wrote to memory of 2600 4512 9F6C.tmp 113 PID 2600 wrote to memory of 2744 2600 9FE9.tmp 114 PID 2600 wrote to memory of 2744 2600 9FE9.tmp 114 PID 2600 wrote to memory of 2744 2600 9FE9.tmp 114 PID 2744 wrote to memory of 3148 2744 A0A5.tmp 115 PID 2744 wrote to memory of 3148 2744 A0A5.tmp 115 PID 2744 wrote to memory of 3148 2744 A0A5.tmp 115 PID 3148 wrote to memory of 4460 3148 A170.tmp 116 PID 3148 wrote to memory of 4460 3148 A170.tmp 116 PID 3148 wrote to memory of 4460 3148 A170.tmp 116 PID 4460 wrote to memory of 3268 4460 A1FD.tmp 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_37f7c693ee3c9a698de76bcaa7175016_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\94CE.tmp"C:\Users\Admin\AppData\Local\Temp\94CE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\9645.tmp"C:\Users\Admin\AppData\Local\Temp\9645.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\9700.tmp"C:\Users\Admin\AppData\Local\Temp\9700.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\97FA.tmp"C:\Users\Admin\AppData\Local\Temp\97FA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\9990.tmp"C:\Users\Admin\AppData\Local\Temp\9990.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\9C21.tmp"C:\Users\Admin\AppData\Local\Temp\9C21.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\9D59.tmp"C:\Users\Admin\AppData\Local\Temp\9D59.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\A170.tmp"C:\Users\Admin\AppData\Local\Temp\A170.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"23⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"24⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"25⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\A519.tmp"C:\Users\Admin\AppData\Local\Temp\A519.tmp"26⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\A596.tmp"C:\Users\Admin\AppData\Local\Temp\A596.tmp"27⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"28⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"29⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\A77B.tmp"C:\Users\Admin\AppData\Local\Temp\A77B.tmp"30⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"31⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\A921.tmp"C:\Users\Admin\AppData\Local\Temp\A921.tmp"32⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"33⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\AA98.tmp"C:\Users\Admin\AppData\Local\Temp\AA98.tmp"34⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\AB44.tmp"C:\Users\Admin\AppData\Local\Temp\AB44.tmp"35⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"36⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"37⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"38⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"39⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"40⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"41⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"42⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"43⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\B016.tmp"C:\Users\Admin\AppData\Local\Temp\B016.tmp"44⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\B0C2.tmp"C:\Users\Admin\AppData\Local\Temp\B0C2.tmp"45⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\B15E.tmp"C:\Users\Admin\AppData\Local\Temp\B15E.tmp"46⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\B1CB.tmp"C:\Users\Admin\AppData\Local\Temp\B1CB.tmp"47⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"48⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"49⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\B342.tmp"C:\Users\Admin\AppData\Local\Temp\B342.tmp"50⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"51⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\B46B.tmp"C:\Users\Admin\AppData\Local\Temp\B46B.tmp"52⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\B536.tmp"C:\Users\Admin\AppData\Local\Temp\B536.tmp"53⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"54⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"55⤵
- Executes dropped EXE
PID:576 -
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"56⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\B788.tmp"C:\Users\Admin\AppData\Local\Temp\B788.tmp"57⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"58⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"59⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\B93E.tmp"C:\Users\Admin\AppData\Local\Temp\B93E.tmp"60⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"61⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"62⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"63⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\BB70.tmp"C:\Users\Admin\AppData\Local\Temp\BB70.tmp"64⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"65⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\BC89.tmp"C:\Users\Admin\AppData\Local\Temp\BC89.tmp"66⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"67⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"68⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\BE20.tmp"C:\Users\Admin\AppData\Local\Temp\BE20.tmp"69⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"70⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"71⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"72⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"73⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"74⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\C12D.tmp"C:\Users\Admin\AppData\Local\Temp\C12D.tmp"75⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\C1AA.tmp"C:\Users\Admin\AppData\Local\Temp\C1AA.tmp"76⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\C227.tmp"C:\Users\Admin\AppData\Local\Temp\C227.tmp"77⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\C294.tmp"C:\Users\Admin\AppData\Local\Temp\C294.tmp"78⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\C302.tmp"C:\Users\Admin\AppData\Local\Temp\C302.tmp"79⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\C3AE.tmp"C:\Users\Admin\AppData\Local\Temp\C3AE.tmp"80⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"81⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"82⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\C582.tmp"C:\Users\Admin\AppData\Local\Temp\C582.tmp"83⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"84⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\C68C.tmp"C:\Users\Admin\AppData\Local\Temp\C68C.tmp"85⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"86⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\C786.tmp"C:\Users\Admin\AppData\Local\Temp\C786.tmp"87⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\C813.tmp"C:\Users\Admin\AppData\Local\Temp\C813.tmp"88⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"89⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\C91C.tmp"C:\Users\Admin\AppData\Local\Temp\C91C.tmp"90⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"91⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\CA07.tmp"C:\Users\Admin\AppData\Local\Temp\CA07.tmp"92⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\CA74.tmp"C:\Users\Admin\AppData\Local\Temp\CA74.tmp"93⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"94⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"95⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\CF75.tmp"C:\Users\Admin\AppData\Local\Temp\CF75.tmp"96⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"97⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"98⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"99⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\D428.tmp"C:\Users\Admin\AppData\Local\Temp\D428.tmp"100⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"101⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"102⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"103⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\D64B.tmp"C:\Users\Admin\AppData\Local\Temp\D64B.tmp"104⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\D6A9.tmp"C:\Users\Admin\AppData\Local\Temp\D6A9.tmp"105⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\DBD9.tmp"C:\Users\Admin\AppData\Local\Temp\DBD9.tmp"106⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"107⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\DD60.tmp"C:\Users\Admin\AppData\Local\Temp\DD60.tmp"108⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"109⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"110⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\DF15.tmp"C:\Users\Admin\AppData\Local\Temp\DF15.tmp"111⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"112⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"113⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"114⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"115⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\E29F.tmp"C:\Users\Admin\AppData\Local\Temp\E29F.tmp"116⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"117⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"118⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"119⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\F378.tmp"C:\Users\Admin\AppData\Local\Temp\F378.tmp"120⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\F424.tmp"C:\Users\Admin\AppData\Local\Temp\F424.tmp"121⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"122⤵PID:3148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-