Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe
-
Size
520KB
-
MD5
34e98456277e6b574880b400222133b5
-
SHA1
9086fa9085d896a478d09d23579f03c8ab7c8524
-
SHA256
12b6809eb9982fbbaaca0363143b69609bffb480f69904c03e6aa9de7e3afb2b
-
SHA512
164717aceb33860eb08ac63f080df43aac9b05affb415fe1ff1e4924d28b1dd8527c183ba3096835b377d24cc3a493f8895e12c611dccee6fc72175a318cbf57
-
SSDEEP
12288:gj8fuxR21t5i8fqQqRAjLZXQ1vjoyp0WUQWmRjpWV32lNZ:gj8fuK1GYqXA/JQ1s00KIV3QN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4136 5F37.tmp 3448 61B7.tmp 3664 6409.tmp 3168 662C.tmp 2372 6716.tmp 2784 6939.tmp 920 6AD0.tmp 1772 701F.tmp 1812 71E4.tmp 4092 73D8.tmp 2016 754F.tmp 3972 76C6.tmp 4496 781E.tmp 3888 7985.tmp 1792 7B2B.tmp 1072 7CE1.tmp 1948 7E58.tmp 2308 801D.tmp 3700 81C3.tmp 2356 8397.tmp 852 8628.tmp 764 87DD.tmp 1584 8954.tmp 2700 8AEA.tmp 2912 8D1D.tmp 1572 8E46.tmp 3936 902A.tmp 1000 920E.tmp 3904 9308.tmp 4548 93C4.tmp 1452 94DD.tmp 2148 96D1.tmp 2004 98E4.tmp 400 9A1D.tmp 4424 9BD2.tmp 4132 9CEC.tmp 1608 9E72.tmp 3304 9F5D.tmp 3028 A066.tmp 4168 A141.tmp 4908 A21C.tmp 3628 A2B8.tmp 2312 A383.tmp 920 A44E.tmp 2792 A529.tmp 1848 A613.tmp 2580 A6FE.tmp 4516 A7E8.tmp 4808 A8B3.tmp 2504 A9BD.tmp 1080 AAB7.tmp 3172 ABE0.tmp 924 ACBB.tmp 548 ADB5.tmp 2308 AEAF.tmp 5008 AF6A.tmp 2356 B093.tmp 540 B1EB.tmp 3040 B314.tmp 4428 B40E.tmp 2640 B4D9.tmp 4468 B5D3.tmp 1000 B6AD.tmp 4968 B788.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 4136 1236 2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe 83 PID 1236 wrote to memory of 4136 1236 2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe 83 PID 1236 wrote to memory of 4136 1236 2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe 83 PID 4136 wrote to memory of 3448 4136 5F37.tmp 84 PID 4136 wrote to memory of 3448 4136 5F37.tmp 84 PID 4136 wrote to memory of 3448 4136 5F37.tmp 84 PID 3448 wrote to memory of 3664 3448 61B7.tmp 86 PID 3448 wrote to memory of 3664 3448 61B7.tmp 86 PID 3448 wrote to memory of 3664 3448 61B7.tmp 86 PID 3664 wrote to memory of 3168 3664 6409.tmp 87 PID 3664 wrote to memory of 3168 3664 6409.tmp 87 PID 3664 wrote to memory of 3168 3664 6409.tmp 87 PID 3168 wrote to memory of 2372 3168 662C.tmp 89 PID 3168 wrote to memory of 2372 3168 662C.tmp 89 PID 3168 wrote to memory of 2372 3168 662C.tmp 89 PID 2372 wrote to memory of 2784 2372 6716.tmp 90 PID 2372 wrote to memory of 2784 2372 6716.tmp 90 PID 2372 wrote to memory of 2784 2372 6716.tmp 90 PID 2784 wrote to memory of 920 2784 6939.tmp 91 PID 2784 wrote to memory of 920 2784 6939.tmp 91 PID 2784 wrote to memory of 920 2784 6939.tmp 91 PID 920 wrote to memory of 1772 920 6AD0.tmp 93 PID 920 wrote to memory of 1772 920 6AD0.tmp 93 PID 920 wrote to memory of 1772 920 6AD0.tmp 93 PID 1772 wrote to memory of 1812 1772 701F.tmp 94 PID 1772 wrote to memory of 1812 1772 701F.tmp 94 PID 1772 wrote to memory of 1812 1772 701F.tmp 94 PID 1812 wrote to memory of 4092 1812 71E4.tmp 95 PID 1812 wrote to memory of 4092 1812 71E4.tmp 95 PID 1812 wrote to memory of 4092 1812 71E4.tmp 95 PID 4092 wrote to memory of 2016 4092 73D8.tmp 96 PID 4092 wrote to memory of 2016 4092 73D8.tmp 96 PID 4092 wrote to memory of 2016 4092 73D8.tmp 96 PID 2016 wrote to memory of 3972 2016 754F.tmp 97 PID 2016 wrote to memory of 3972 2016 754F.tmp 97 PID 2016 wrote to memory of 3972 2016 754F.tmp 97 PID 3972 wrote to memory of 4496 3972 76C6.tmp 98 PID 3972 wrote to memory of 4496 3972 76C6.tmp 98 PID 3972 wrote to memory of 4496 3972 76C6.tmp 98 PID 4496 wrote to memory of 3888 4496 781E.tmp 99 PID 4496 wrote to memory of 3888 4496 781E.tmp 99 PID 4496 wrote to memory of 3888 4496 781E.tmp 99 PID 3888 wrote to memory of 1792 3888 7985.tmp 100 PID 3888 wrote to memory of 1792 3888 7985.tmp 100 PID 3888 wrote to memory of 1792 3888 7985.tmp 100 PID 1792 wrote to memory of 1072 1792 7B2B.tmp 101 PID 1792 wrote to memory of 1072 1792 7B2B.tmp 101 PID 1792 wrote to memory of 1072 1792 7B2B.tmp 101 PID 1072 wrote to memory of 1948 1072 7CE1.tmp 102 PID 1072 wrote to memory of 1948 1072 7CE1.tmp 102 PID 1072 wrote to memory of 1948 1072 7CE1.tmp 102 PID 1948 wrote to memory of 2308 1948 7E58.tmp 146 PID 1948 wrote to memory of 2308 1948 7E58.tmp 146 PID 1948 wrote to memory of 2308 1948 7E58.tmp 146 PID 2308 wrote to memory of 3700 2308 801D.tmp 104 PID 2308 wrote to memory of 3700 2308 801D.tmp 104 PID 2308 wrote to memory of 3700 2308 801D.tmp 104 PID 3700 wrote to memory of 2356 3700 81C3.tmp 149 PID 3700 wrote to memory of 2356 3700 81C3.tmp 149 PID 3700 wrote to memory of 2356 3700 81C3.tmp 149 PID 2356 wrote to memory of 852 2356 8397.tmp 106 PID 2356 wrote to memory of 852 2356 8397.tmp 106 PID 2356 wrote to memory of 852 2356 8397.tmp 106 PID 852 wrote to memory of 764 852 8628.tmp 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_34e98456277e6b574880b400222133b5_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\6716.tmp"C:\Users\Admin\AppData\Local\Temp\6716.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\6939.tmp"C:\Users\Admin\AppData\Local\Temp\6939.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\71E4.tmp"C:\Users\Admin\AppData\Local\Temp\71E4.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\73D8.tmp"C:\Users\Admin\AppData\Local\Temp\73D8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\7E58.tmp"C:\Users\Admin\AppData\Local\Temp\7E58.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\81C3.tmp"C:\Users\Admin\AppData\Local\Temp\81C3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\8397.tmp"C:\Users\Admin\AppData\Local\Temp\8397.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"23⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"24⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\8AEA.tmp"C:\Users\Admin\AppData\Local\Temp\8AEA.tmp"25⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"26⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\8E46.tmp"C:\Users\Admin\AppData\Local\Temp\8E46.tmp"27⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\902A.tmp"C:\Users\Admin\AppData\Local\Temp\902A.tmp"28⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\920E.tmp"C:\Users\Admin\AppData\Local\Temp\920E.tmp"29⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\9308.tmp"C:\Users\Admin\AppData\Local\Temp\9308.tmp"30⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\93C4.tmp"C:\Users\Admin\AppData\Local\Temp\93C4.tmp"31⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"32⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\96D1.tmp"C:\Users\Admin\AppData\Local\Temp\96D1.tmp"33⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\98E4.tmp"C:\Users\Admin\AppData\Local\Temp\98E4.tmp"34⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"35⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"36⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"37⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\9E72.tmp"C:\Users\Admin\AppData\Local\Temp\9E72.tmp"38⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"39⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\A066.tmp"C:\Users\Admin\AppData\Local\Temp\A066.tmp"40⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"41⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"42⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"43⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\A383.tmp"C:\Users\Admin\AppData\Local\Temp\A383.tmp"44⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\A44E.tmp"C:\Users\Admin\AppData\Local\Temp\A44E.tmp"45⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\A529.tmp"C:\Users\Admin\AppData\Local\Temp\A529.tmp"46⤵
- Executes dropped EXE
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\A613.tmp"C:\Users\Admin\AppData\Local\Temp\A613.tmp"47⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"48⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\A7E8.tmp"C:\Users\Admin\AppData\Local\Temp\A7E8.tmp"49⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"50⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"51⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"52⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"53⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"54⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\ADB5.tmp"C:\Users\Admin\AppData\Local\Temp\ADB5.tmp"55⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"56⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"57⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\B093.tmp"C:\Users\Admin\AppData\Local\Temp\B093.tmp"58⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"59⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"60⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\B40E.tmp"C:\Users\Admin\AppData\Local\Temp\B40E.tmp"61⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"62⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"63⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"64⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\B788.tmp"C:\Users\Admin\AppData\Local\Temp\B788.tmp"65⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\B844.tmp"C:\Users\Admin\AppData\Local\Temp\B844.tmp"66⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"67⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\BA38.tmp"C:\Users\Admin\AppData\Local\Temp\BA38.tmp"68⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"69⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"70⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"71⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"72⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"73⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\BF58.tmp"C:\Users\Admin\AppData\Local\Temp\BF58.tmp"74⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"75⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"76⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\C217.tmp"C:\Users\Admin\AppData\Local\Temp\C217.tmp"77⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\C311.tmp"C:\Users\Admin\AppData\Local\Temp\C311.tmp"78⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"79⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"80⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"81⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\C68C.tmp"C:\Users\Admin\AppData\Local\Temp\C68C.tmp"82⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"83⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\C832.tmp"C:\Users\Admin\AppData\Local\Temp\C832.tmp"84⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\C93B.tmp"C:\Users\Admin\AppData\Local\Temp\C93B.tmp"85⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"86⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"87⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"88⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\CC87.tmp"C:\Users\Admin\AppData\Local\Temp\CC87.tmp"89⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\CD33.tmp"C:\Users\Admin\AppData\Local\Temp\CD33.tmp"90⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"91⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\CED9.tmp"C:\Users\Admin\AppData\Local\Temp\CED9.tmp"92⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"93⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\D07F.tmp"C:\Users\Admin\AppData\Local\Temp\D07F.tmp"94⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\D14A.tmp"C:\Users\Admin\AppData\Local\Temp\D14A.tmp"95⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\D205.tmp"C:\Users\Admin\AppData\Local\Temp\D205.tmp"96⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"97⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\D36D.tmp"C:\Users\Admin\AppData\Local\Temp\D36D.tmp"98⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"99⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"100⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"101⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"102⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"103⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"104⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\D745.tmp"C:\Users\Admin\AppData\Local\Temp\D745.tmp"105⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"106⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\D84F.tmp"C:\Users\Admin\AppData\Local\Temp\D84F.tmp"107⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"108⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\D92A.tmp"C:\Users\Admin\AppData\Local\Temp\D92A.tmp"109⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"110⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"111⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"112⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\DC27.tmp"C:\Users\Admin\AppData\Local\Temp\DC27.tmp"113⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"114⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"115⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\DE98.tmp"C:\Users\Admin\AppData\Local\Temp\DE98.tmp"116⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"117⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\E02E.tmp"C:\Users\Admin\AppData\Local\Temp\E02E.tmp"118⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"119⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\E138.tmp"C:\Users\Admin\AppData\Local\Temp\E138.tmp"120⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"121⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"122⤵PID:2484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-