Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe
-
Size
486KB
-
MD5
82e60cfc88c6cf2693b74246f759cbe7
-
SHA1
b8828969540b077f72818f7f6972d8800d7b18ea
-
SHA256
672596802aca2e4b031af66bd8c695c027df1acdcd2992d012edaf76ba982ba0
-
SHA512
4f3a67cded79631d7a01fd5e7e4cd7b542e0d53f5ccbadc2168729bde74c1d025c351b7048dbe5bd3333827f6fb3864d8262d253a5ebfd8503936020e5173da5
-
SSDEEP
12288:UU5rCOTeiD7Ec8+NkLBlVIuHwFD8klTGpNZ:UUQOJD7EF+iNIuQFDvTGpN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2260 54B3.tmp 4832 59B4.tmp 1848 5A6F.tmp 2872 5B0C.tmp 1536 5C83.tmp 3200 5DCB.tmp 336 5FCE.tmp 4284 623F.tmp 1012 65F8.tmp 3744 6915.tmp 1108 6AAC.tmp 4952 6CCE.tmp 3580 6F4F.tmp 2308 73A4.tmp 3552 7692.tmp 984 7AD8.tmp 5076 7C6E.tmp 1896 7E24.tmp 3088 7FAB.tmp 3336 822B.tmp 3248 82A8.tmp 2716 8335.tmp 1428 83C1.tmp 3624 843E.tmp 1520 86DE.tmp 3668 874C.tmp 2140 87F8.tmp 2316 8884.tmp 2012 8B24.tmp 1944 8BB1.tmp 4016 8C1E.tmp 2420 8CBA.tmp 2952 8D37.tmp 3532 91FA.tmp 1416 93FE.tmp 3956 95D2.tmp 4400 97B7.tmp 2832 992E.tmp 4772 9A09.tmp 1336 9C6A.tmp 4284 9F48.tmp 2516 A256.tmp 3744 A5EF.tmp 4700 A65D.tmp 1084 A6CA.tmp 2476 A8CE.tmp 1612 AAA3.tmp 2824 AB10.tmp 5056 ACF4.tmp 2816 AD62.tmp 2308 ADCF.tmp 3736 AE3C.tmp 984 AF36.tmp 1348 AF94.tmp 3316 B0FC.tmp 4504 B159.tmp 2800 B234.tmp 4600 B2B1.tmp 4132 B34D.tmp 2164 B3EA.tmp 3336 B457.tmp 4236 B4C4.tmp 3096 B532.tmp 3600 B968.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 2260 3652 2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe 91 PID 3652 wrote to memory of 2260 3652 2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe 91 PID 3652 wrote to memory of 2260 3652 2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe 91 PID 2260 wrote to memory of 4832 2260 54B3.tmp 92 PID 2260 wrote to memory of 4832 2260 54B3.tmp 92 PID 2260 wrote to memory of 4832 2260 54B3.tmp 92 PID 4832 wrote to memory of 1848 4832 59B4.tmp 93 PID 4832 wrote to memory of 1848 4832 59B4.tmp 93 PID 4832 wrote to memory of 1848 4832 59B4.tmp 93 PID 1848 wrote to memory of 2872 1848 5A6F.tmp 94 PID 1848 wrote to memory of 2872 1848 5A6F.tmp 94 PID 1848 wrote to memory of 2872 1848 5A6F.tmp 94 PID 2872 wrote to memory of 1536 2872 5B0C.tmp 95 PID 2872 wrote to memory of 1536 2872 5B0C.tmp 95 PID 2872 wrote to memory of 1536 2872 5B0C.tmp 95 PID 1536 wrote to memory of 3200 1536 5C83.tmp 96 PID 1536 wrote to memory of 3200 1536 5C83.tmp 96 PID 1536 wrote to memory of 3200 1536 5C83.tmp 96 PID 3200 wrote to memory of 336 3200 5DCB.tmp 97 PID 3200 wrote to memory of 336 3200 5DCB.tmp 97 PID 3200 wrote to memory of 336 3200 5DCB.tmp 97 PID 336 wrote to memory of 4284 336 5FCE.tmp 135 PID 336 wrote to memory of 4284 336 5FCE.tmp 135 PID 336 wrote to memory of 4284 336 5FCE.tmp 135 PID 4284 wrote to memory of 1012 4284 623F.tmp 100 PID 4284 wrote to memory of 1012 4284 623F.tmp 100 PID 4284 wrote to memory of 1012 4284 623F.tmp 100 PID 1012 wrote to memory of 3744 1012 65F8.tmp 137 PID 1012 wrote to memory of 3744 1012 65F8.tmp 137 PID 1012 wrote to memory of 3744 1012 65F8.tmp 137 PID 3744 wrote to memory of 1108 3744 6915.tmp 103 PID 3744 wrote to memory of 1108 3744 6915.tmp 103 PID 3744 wrote to memory of 1108 3744 6915.tmp 103 PID 1108 wrote to memory of 4952 1108 6AAC.tmp 104 PID 1108 wrote to memory of 4952 1108 6AAC.tmp 104 PID 1108 wrote to memory of 4952 1108 6AAC.tmp 104 PID 4952 wrote to memory of 3580 4952 6CCE.tmp 105 PID 4952 wrote to memory of 3580 4952 6CCE.tmp 105 PID 4952 wrote to memory of 3580 4952 6CCE.tmp 105 PID 3580 wrote to memory of 2308 3580 6F4F.tmp 145 PID 3580 wrote to memory of 2308 3580 6F4F.tmp 145 PID 3580 wrote to memory of 2308 3580 6F4F.tmp 145 PID 2308 wrote to memory of 3552 2308 73A4.tmp 107 PID 2308 wrote to memory of 3552 2308 73A4.tmp 107 PID 2308 wrote to memory of 3552 2308 73A4.tmp 107 PID 3552 wrote to memory of 984 3552 7692.tmp 147 PID 3552 wrote to memory of 984 3552 7692.tmp 147 PID 3552 wrote to memory of 984 3552 7692.tmp 147 PID 984 wrote to memory of 5076 984 7AD8.tmp 109 PID 984 wrote to memory of 5076 984 7AD8.tmp 109 PID 984 wrote to memory of 5076 984 7AD8.tmp 109 PID 5076 wrote to memory of 1896 5076 7C6E.tmp 110 PID 5076 wrote to memory of 1896 5076 7C6E.tmp 110 PID 5076 wrote to memory of 1896 5076 7C6E.tmp 110 PID 1896 wrote to memory of 3088 1896 7E24.tmp 111 PID 1896 wrote to memory of 3088 1896 7E24.tmp 111 PID 1896 wrote to memory of 3088 1896 7E24.tmp 111 PID 3088 wrote to memory of 3336 3088 7FAB.tmp 155 PID 3088 wrote to memory of 3336 3088 7FAB.tmp 155 PID 3088 wrote to memory of 3336 3088 7FAB.tmp 155 PID 3336 wrote to memory of 3248 3336 822B.tmp 113 PID 3336 wrote to memory of 3248 3336 822B.tmp 113 PID 3336 wrote to memory of 3248 3336 822B.tmp 113 PID 3248 wrote to memory of 2716 3248 82A8.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_82e60cfc88c6cf2693b74246f759cbe7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\54B3.tmp"C:\Users\Admin\AppData\Local\Temp\54B3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\59B4.tmp"C:\Users\Admin\AppData\Local\Temp\59B4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\5C83.tmp"C:\Users\Admin\AppData\Local\Temp\5C83.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\623F.tmp"C:\Users\Admin\AppData\Local\Temp\623F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\65F8.tmp"C:\Users\Admin\AppData\Local\Temp\65F8.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\6915.tmp"C:\Users\Admin\AppData\Local\Temp\6915.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\6AAC.tmp"C:\Users\Admin\AppData\Local\Temp\6AAC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\73A4.tmp"C:\Users\Admin\AppData\Local\Temp\73A4.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\7692.tmp"C:\Users\Admin\AppData\Local\Temp\7692.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\7AD8.tmp"C:\Users\Admin\AppData\Local\Temp\7AD8.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\7E24.tmp"C:\Users\Admin\AppData\Local\Temp\7E24.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\822B.tmp"C:\Users\Admin\AppData\Local\Temp\822B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\82A8.tmp"C:\Users\Admin\AppData\Local\Temp\82A8.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\8335.tmp"C:\Users\Admin\AppData\Local\Temp\8335.tmp"23⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\83C1.tmp"C:\Users\Admin\AppData\Local\Temp\83C1.tmp"24⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\843E.tmp"C:\Users\Admin\AppData\Local\Temp\843E.tmp"25⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\86DE.tmp"C:\Users\Admin\AppData\Local\Temp\86DE.tmp"26⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\874C.tmp"C:\Users\Admin\AppData\Local\Temp\874C.tmp"27⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\87F8.tmp"C:\Users\Admin\AppData\Local\Temp\87F8.tmp"28⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\8884.tmp"C:\Users\Admin\AppData\Local\Temp\8884.tmp"29⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\8B24.tmp"C:\Users\Admin\AppData\Local\Temp\8B24.tmp"30⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"31⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\8C1E.tmp"C:\Users\Admin\AppData\Local\Temp\8C1E.tmp"32⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\8CBA.tmp"C:\Users\Admin\AppData\Local\Temp\8CBA.tmp"33⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\8D37.tmp"C:\Users\Admin\AppData\Local\Temp\8D37.tmp"34⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\91FA.tmp"C:\Users\Admin\AppData\Local\Temp\91FA.tmp"35⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\93FE.tmp"C:\Users\Admin\AppData\Local\Temp\93FE.tmp"36⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\95D2.tmp"C:\Users\Admin\AppData\Local\Temp\95D2.tmp"37⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\97B7.tmp"C:\Users\Admin\AppData\Local\Temp\97B7.tmp"38⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\992E.tmp"C:\Users\Admin\AppData\Local\Temp\992E.tmp"39⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\9A09.tmp"C:\Users\Admin\AppData\Local\Temp\9A09.tmp"40⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\9C6A.tmp"C:\Users\Admin\AppData\Local\Temp\9C6A.tmp"41⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\9F48.tmp"C:\Users\Admin\AppData\Local\Temp\9F48.tmp"42⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\A256.tmp"C:\Users\Admin\AppData\Local\Temp\A256.tmp"43⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\A5EF.tmp"C:\Users\Admin\AppData\Local\Temp\A5EF.tmp"44⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\A65D.tmp"C:\Users\Admin\AppData\Local\Temp\A65D.tmp"45⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"46⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\A8CE.tmp"C:\Users\Admin\AppData\Local\Temp\A8CE.tmp"47⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\AAA3.tmp"C:\Users\Admin\AppData\Local\Temp\AAA3.tmp"48⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\AB10.tmp"C:\Users\Admin\AppData\Local\Temp\AB10.tmp"49⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\ACF4.tmp"C:\Users\Admin\AppData\Local\Temp\ACF4.tmp"50⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\AD62.tmp"C:\Users\Admin\AppData\Local\Temp\AD62.tmp"51⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\ADCF.tmp"C:\Users\Admin\AppData\Local\Temp\ADCF.tmp"52⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\AE3C.tmp"C:\Users\Admin\AppData\Local\Temp\AE3C.tmp"53⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\AF36.tmp"C:\Users\Admin\AppData\Local\Temp\AF36.tmp"54⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\AF94.tmp"C:\Users\Admin\AppData\Local\Temp\AF94.tmp"55⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"56⤵
- Executes dropped EXE
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\B159.tmp"C:\Users\Admin\AppData\Local\Temp\B159.tmp"57⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\B234.tmp"C:\Users\Admin\AppData\Local\Temp\B234.tmp"58⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"59⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\B34D.tmp"C:\Users\Admin\AppData\Local\Temp\B34D.tmp"60⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\B3EA.tmp"C:\Users\Admin\AppData\Local\Temp\B3EA.tmp"61⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\B457.tmp"C:\Users\Admin\AppData\Local\Temp\B457.tmp"62⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\B4C4.tmp"C:\Users\Admin\AppData\Local\Temp\B4C4.tmp"63⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\B532.tmp"C:\Users\Admin\AppData\Local\Temp\B532.tmp"64⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\B968.tmp"C:\Users\Admin\AppData\Local\Temp\B968.tmp"65⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"66⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\BA52.tmp"C:\Users\Admin\AppData\Local\Temp\BA52.tmp"67⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\BAC0.tmp"C:\Users\Admin\AppData\Local\Temp\BAC0.tmp"68⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\BB4C.tmp"C:\Users\Admin\AppData\Local\Temp\BB4C.tmp"69⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\BC17.tmp"C:\Users\Admin\AppData\Local\Temp\BC17.tmp"70⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\BC94.tmp"C:\Users\Admin\AppData\Local\Temp\BC94.tmp"71⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\BD02.tmp"C:\Users\Admin\AppData\Local\Temp\BD02.tmp"72⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\BD6F.tmp"C:\Users\Admin\AppData\Local\Temp\BD6F.tmp"73⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\BEB7.tmp"C:\Users\Admin\AppData\Local\Temp\BEB7.tmp"74⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\BF92.tmp"C:\Users\Admin\AppData\Local\Temp\BF92.tmp"75⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\C06D.tmp"C:\Users\Admin\AppData\Local\Temp\C06D.tmp"76⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"77⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\C1D4.tmp"C:\Users\Admin\AppData\Local\Temp\C1D4.tmp"78⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\C290.tmp"C:\Users\Admin\AppData\Local\Temp\C290.tmp"79⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\C4C2.tmp"C:\Users\Admin\AppData\Local\Temp\C4C2.tmp"80⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\C5EB.tmp"C:\Users\Admin\AppData\Local\Temp\C5EB.tmp"81⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\C697.tmp"C:\Users\Admin\AppData\Local\Temp\C697.tmp"82⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\C743.tmp"C:\Users\Admin\AppData\Local\Temp\C743.tmp"83⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\C7CF.tmp"C:\Users\Admin\AppData\Local\Temp\C7CF.tmp"84⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\C85C.tmp"C:\Users\Admin\AppData\Local\Temp\C85C.tmp"85⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\C8F8.tmp"C:\Users\Admin\AppData\Local\Temp\C8F8.tmp"86⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\CC15.tmp"C:\Users\Admin\AppData\Local\Temp\CC15.tmp"87⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\CD0F.tmp"C:\Users\Admin\AppData\Local\Temp\CD0F.tmp"88⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\CD9C.tmp"C:\Users\Admin\AppData\Local\Temp\CD9C.tmp"89⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\CE86.tmp"C:\Users\Admin\AppData\Local\Temp\CE86.tmp"90⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\CF80.tmp"C:\Users\Admin\AppData\Local\Temp\CF80.tmp"91⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\D1F1.tmp"C:\Users\Admin\AppData\Local\Temp\D1F1.tmp"92⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\D25E.tmp"C:\Users\Admin\AppData\Local\Temp\D25E.tmp"93⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\D2CC.tmp"C:\Users\Admin\AppData\Local\Temp\D2CC.tmp"94⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\D50E.tmp"C:\Users\Admin\AppData\Local\Temp\D50E.tmp"95⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\D6A4.tmp"C:\Users\Admin\AppData\Local\Temp\D6A4.tmp"96⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\D712.tmp"C:\Users\Admin\AppData\Local\Temp\D712.tmp"97⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\D925.tmp"C:\Users\Admin\AppData\Local\Temp\D925.tmp"98⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\DA00.tmp"C:\Users\Admin\AppData\Local\Temp\DA00.tmp"99⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\DA9C.tmp"C:\Users\Admin\AppData\Local\Temp\DA9C.tmp"100⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\DB19.tmp"C:\Users\Admin\AppData\Local\Temp\DB19.tmp"101⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\DBC5.tmp"C:\Users\Admin\AppData\Local\Temp\DBC5.tmp"102⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\DC51.tmp"C:\Users\Admin\AppData\Local\Temp\DC51.tmp"103⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\DCCE.tmp"C:\Users\Admin\AppData\Local\Temp\DCCE.tmp"104⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\DD6B.tmp"C:\Users\Admin\AppData\Local\Temp\DD6B.tmp"105⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\DE07.tmp"C:\Users\Admin\AppData\Local\Temp\DE07.tmp"106⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\DF20.tmp"C:\Users\Admin\AppData\Local\Temp\DF20.tmp"107⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\DFCC.tmp"C:\Users\Admin\AppData\Local\Temp\DFCC.tmp"108⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\E049.tmp"C:\Users\Admin\AppData\Local\Temp\E049.tmp"109⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\E0C6.tmp"C:\Users\Admin\AppData\Local\Temp\E0C6.tmp"110⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\E181.tmp"C:\Users\Admin\AppData\Local\Temp\E181.tmp"111⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\E24D.tmp"C:\Users\Admin\AppData\Local\Temp\E24D.tmp"112⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\E2D9.tmp"C:\Users\Admin\AppData\Local\Temp\E2D9.tmp"113⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\E375.tmp"C:\Users\Admin\AppData\Local\Temp\E375.tmp"114⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\E48F.tmp"C:\Users\Admin\AppData\Local\Temp\E48F.tmp"115⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\E52B.tmp"C:\Users\Admin\AppData\Local\Temp\E52B.tmp"116⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\E5B8.tmp"C:\Users\Admin\AppData\Local\Temp\E5B8.tmp"117⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\E635.tmp"C:\Users\Admin\AppData\Local\Temp\E635.tmp"118⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\E6D1.tmp"C:\Users\Admin\AppData\Local\Temp\E6D1.tmp"119⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\E73E.tmp"C:\Users\Admin\AppData\Local\Temp\E73E.tmp"120⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\E7CB.tmp"C:\Users\Admin\AppData\Local\Temp\E7CB.tmp"121⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\E848.tmp"C:\Users\Admin\AppData\Local\Temp\E848.tmp"122⤵PID:3532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-