Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe
-
Size
529KB
-
MD5
82767c29c51f33c2a8ef7a459875c122
-
SHA1
ffb3ff7dba2416c61d0be399e0fef141d0b4f9d2
-
SHA256
9b27126dd5f8f06f72d0a3c1f7cd704371a9b3b28ed895b52ac60d708e42382e
-
SHA512
8875326e7a70c02878ce4cc9d3d35a111620870d33af9dfe2e4495b644be987c4415cf8097cb2ccb4f3d88d115e336750c027f62f49aca82db3d950c3494e654
-
SSDEEP
12288:NU5rCOTeij57By5tbdc5Qjk9qmdrLlTZwlH4Hp:NUQOJjF45fA9q2XlTSlH4Hp
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5004 8916.tmp 980 8973.tmp 3108 89E1.tmp 4364 8A6D.tmp 4928 8B0A.tmp 5040 8B96.tmp 3240 8BF4.tmp 3216 8C81.tmp 4824 8CDE.tmp 3816 8D3C.tmp 532 8D9A.tmp 3772 8DE8.tmp 2400 8E65.tmp 4700 8EF2.tmp 5000 8F5F.tmp 4296 8FCC.tmp 412 901A.tmp 1540 9097.tmp 1712 90E6.tmp 3904 9143.tmp 3808 91E0.tmp 1600 925D.tmp 1708 92CA.tmp 4092 9357.tmp 736 93C4.tmp 4156 9412.tmp 1228 948F.tmp 1940 94FC.tmp 3708 955A.tmp 3368 95C8.tmp 4300 9625.tmp 3040 9693.tmp 4372 96F0.tmp 2396 973F.tmp 2116 97AC.tmp 1588 97FA.tmp 3460 9858.tmp 1584 98C5.tmp 1604 9923.tmp 1020 9981.tmp 1184 99CF.tmp 3608 9A3C.tmp 3224 9A8A.tmp 2772 9B36.tmp 5016 9B84.tmp 3248 9BE2.tmp 3168 9C40.tmp 1388 9C8E.tmp 4568 9CDC.tmp 1980 9D3A.tmp 1636 9D98.tmp 3128 9DE6.tmp 428 9E34.tmp 1896 9E92.tmp 3624 9EEF.tmp 4776 9F3D.tmp 1328 9F8C.tmp 4980 9FDA.tmp 2604 A028.tmp 4380 A086.tmp 4884 A0E3.tmp 1672 A131.tmp 4612 A180.tmp 4100 A1CE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 5004 4808 2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe 82 PID 4808 wrote to memory of 5004 4808 2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe 82 PID 4808 wrote to memory of 5004 4808 2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe 82 PID 5004 wrote to memory of 980 5004 8916.tmp 83 PID 5004 wrote to memory of 980 5004 8916.tmp 83 PID 5004 wrote to memory of 980 5004 8916.tmp 83 PID 980 wrote to memory of 3108 980 8973.tmp 84 PID 980 wrote to memory of 3108 980 8973.tmp 84 PID 980 wrote to memory of 3108 980 8973.tmp 84 PID 3108 wrote to memory of 4364 3108 89E1.tmp 86 PID 3108 wrote to memory of 4364 3108 89E1.tmp 86 PID 3108 wrote to memory of 4364 3108 89E1.tmp 86 PID 4364 wrote to memory of 4928 4364 8A6D.tmp 88 PID 4364 wrote to memory of 4928 4364 8A6D.tmp 88 PID 4364 wrote to memory of 4928 4364 8A6D.tmp 88 PID 4928 wrote to memory of 5040 4928 8B0A.tmp 90 PID 4928 wrote to memory of 5040 4928 8B0A.tmp 90 PID 4928 wrote to memory of 5040 4928 8B0A.tmp 90 PID 5040 wrote to memory of 3240 5040 8B96.tmp 91 PID 5040 wrote to memory of 3240 5040 8B96.tmp 91 PID 5040 wrote to memory of 3240 5040 8B96.tmp 91 PID 3240 wrote to memory of 3216 3240 8BF4.tmp 92 PID 3240 wrote to memory of 3216 3240 8BF4.tmp 92 PID 3240 wrote to memory of 3216 3240 8BF4.tmp 92 PID 3216 wrote to memory of 4824 3216 8C81.tmp 93 PID 3216 wrote to memory of 4824 3216 8C81.tmp 93 PID 3216 wrote to memory of 4824 3216 8C81.tmp 93 PID 4824 wrote to memory of 3816 4824 8CDE.tmp 94 PID 4824 wrote to memory of 3816 4824 8CDE.tmp 94 PID 4824 wrote to memory of 3816 4824 8CDE.tmp 94 PID 3816 wrote to memory of 532 3816 8D3C.tmp 95 PID 3816 wrote to memory of 532 3816 8D3C.tmp 95 PID 3816 wrote to memory of 532 3816 8D3C.tmp 95 PID 532 wrote to memory of 3772 532 8D9A.tmp 96 PID 532 wrote to memory of 3772 532 8D9A.tmp 96 PID 532 wrote to memory of 3772 532 8D9A.tmp 96 PID 3772 wrote to memory of 2400 3772 8DE8.tmp 97 PID 3772 wrote to memory of 2400 3772 8DE8.tmp 97 PID 3772 wrote to memory of 2400 3772 8DE8.tmp 97 PID 2400 wrote to memory of 4700 2400 8E65.tmp 98 PID 2400 wrote to memory of 4700 2400 8E65.tmp 98 PID 2400 wrote to memory of 4700 2400 8E65.tmp 98 PID 4700 wrote to memory of 5000 4700 8EF2.tmp 99 PID 4700 wrote to memory of 5000 4700 8EF2.tmp 99 PID 4700 wrote to memory of 5000 4700 8EF2.tmp 99 PID 5000 wrote to memory of 4296 5000 8F5F.tmp 100 PID 5000 wrote to memory of 4296 5000 8F5F.tmp 100 PID 5000 wrote to memory of 4296 5000 8F5F.tmp 100 PID 4296 wrote to memory of 412 4296 8FCC.tmp 101 PID 4296 wrote to memory of 412 4296 8FCC.tmp 101 PID 4296 wrote to memory of 412 4296 8FCC.tmp 101 PID 412 wrote to memory of 1540 412 901A.tmp 102 PID 412 wrote to memory of 1540 412 901A.tmp 102 PID 412 wrote to memory of 1540 412 901A.tmp 102 PID 1540 wrote to memory of 1712 1540 9097.tmp 103 PID 1540 wrote to memory of 1712 1540 9097.tmp 103 PID 1540 wrote to memory of 1712 1540 9097.tmp 103 PID 1712 wrote to memory of 3904 1712 90E6.tmp 104 PID 1712 wrote to memory of 3904 1712 90E6.tmp 104 PID 1712 wrote to memory of 3904 1712 90E6.tmp 104 PID 3904 wrote to memory of 3808 3904 9143.tmp 106 PID 3904 wrote to memory of 3808 3904 9143.tmp 106 PID 3904 wrote to memory of 3808 3904 9143.tmp 106 PID 3808 wrote to memory of 1600 3808 91E0.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-10_82767c29c51f33c2a8ef7a459875c122_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\8916.tmp"C:\Users\Admin\AppData\Local\Temp\8916.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\8973.tmp"C:\Users\Admin\AppData\Local\Temp\8973.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\89E1.tmp"C:\Users\Admin\AppData\Local\Temp\89E1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\8B96.tmp"C:\Users\Admin\AppData\Local\Temp\8B96.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\8C81.tmp"C:\Users\Admin\AppData\Local\Temp\8C81.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\8E65.tmp"C:\Users\Admin\AppData\Local\Temp\8E65.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\901A.tmp"C:\Users\Admin\AppData\Local\Temp\901A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\9097.tmp"C:\Users\Admin\AppData\Local\Temp\9097.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\90E6.tmp"C:\Users\Admin\AppData\Local\Temp\90E6.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\9143.tmp"C:\Users\Admin\AppData\Local\Temp\9143.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\925D.tmp"C:\Users\Admin\AppData\Local\Temp\925D.tmp"23⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\92CA.tmp"C:\Users\Admin\AppData\Local\Temp\92CA.tmp"24⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\9357.tmp"C:\Users\Admin\AppData\Local\Temp\9357.tmp"25⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\93C4.tmp"C:\Users\Admin\AppData\Local\Temp\93C4.tmp"26⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\9412.tmp"C:\Users\Admin\AppData\Local\Temp\9412.tmp"27⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\948F.tmp"C:\Users\Admin\AppData\Local\Temp\948F.tmp"28⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\94FC.tmp"C:\Users\Admin\AppData\Local\Temp\94FC.tmp"29⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\955A.tmp"C:\Users\Admin\AppData\Local\Temp\955A.tmp"30⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\95C8.tmp"C:\Users\Admin\AppData\Local\Temp\95C8.tmp"31⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\9625.tmp"C:\Users\Admin\AppData\Local\Temp\9625.tmp"32⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\9693.tmp"C:\Users\Admin\AppData\Local\Temp\9693.tmp"33⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"34⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\973F.tmp"C:\Users\Admin\AppData\Local\Temp\973F.tmp"35⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\97AC.tmp"C:\Users\Admin\AppData\Local\Temp\97AC.tmp"36⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\97FA.tmp"C:\Users\Admin\AppData\Local\Temp\97FA.tmp"37⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\9858.tmp"C:\Users\Admin\AppData\Local\Temp\9858.tmp"38⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"39⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\9923.tmp"C:\Users\Admin\AppData\Local\Temp\9923.tmp"40⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\9981.tmp"C:\Users\Admin\AppData\Local\Temp\9981.tmp"41⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\99CF.tmp"C:\Users\Admin\AppData\Local\Temp\99CF.tmp"42⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\9A3C.tmp"C:\Users\Admin\AppData\Local\Temp\9A3C.tmp"43⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"44⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\9AE8.tmp"C:\Users\Admin\AppData\Local\Temp\9AE8.tmp"45⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\9B36.tmp"C:\Users\Admin\AppData\Local\Temp\9B36.tmp"46⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"47⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"48⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\9C40.tmp"C:\Users\Admin\AppData\Local\Temp\9C40.tmp"49⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"50⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"51⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"52⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"53⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"54⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"55⤵
- Executes dropped EXE
PID:428 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"56⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"57⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"58⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"59⤵
- Executes dropped EXE
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"60⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\A028.tmp"C:\Users\Admin\AppData\Local\Temp\A028.tmp"61⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\A086.tmp"C:\Users\Admin\AppData\Local\Temp\A086.tmp"62⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"63⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\A131.tmp"C:\Users\Admin\AppData\Local\Temp\A131.tmp"64⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\A180.tmp"C:\Users\Admin\AppData\Local\Temp\A180.tmp"65⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"66⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"67⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\A27A.tmp"C:\Users\Admin\AppData\Local\Temp\A27A.tmp"68⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"69⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\A325.tmp"C:\Users\Admin\AppData\Local\Temp\A325.tmp"70⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\A383.tmp"C:\Users\Admin\AppData\Local\Temp\A383.tmp"71⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"72⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"73⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\A48D.tmp"C:\Users\Admin\AppData\Local\Temp\A48D.tmp"74⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"75⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\A548.tmp"C:\Users\Admin\AppData\Local\Temp\A548.tmp"76⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"77⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"78⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"79⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\A690.tmp"C:\Users\Admin\AppData\Local\Temp\A690.tmp"80⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"81⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"82⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"83⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"84⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\A856.tmp"C:\Users\Admin\AppData\Local\Temp\A856.tmp"85⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"86⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\A901.tmp"C:\Users\Admin\AppData\Local\Temp\A901.tmp"87⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\A95F.tmp"C:\Users\Admin\AppData\Local\Temp\A95F.tmp"88⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"89⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"90⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"91⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"92⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\AB34.tmp"C:\Users\Admin\AppData\Local\Temp\AB34.tmp"93⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"94⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"95⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"96⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"97⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"98⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\AD57.tmp"C:\Users\Admin\AppData\Local\Temp\AD57.tmp"99⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\ADB5.tmp"C:\Users\Admin\AppData\Local\Temp\ADB5.tmp"100⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\AE12.tmp"C:\Users\Admin\AppData\Local\Temp\AE12.tmp"101⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"102⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"103⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"104⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"105⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"106⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\B006.tmp"C:\Users\Admin\AppData\Local\Temp\B006.tmp"107⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"108⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"109⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\B110.tmp"C:\Users\Admin\AppData\Local\Temp\B110.tmp"110⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\B15E.tmp"C:\Users\Admin\AppData\Local\Temp\B15E.tmp"111⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"112⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"113⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\B277.tmp"C:\Users\Admin\AppData\Local\Temp\B277.tmp"114⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"115⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\B323.tmp"C:\Users\Admin\AppData\Local\Temp\B323.tmp"116⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"117⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"118⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"119⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\B48B.tmp"C:\Users\Admin\AppData\Local\Temp\B48B.tmp"120⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"121⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\B536.tmp"C:\Users\Admin\AppData\Local\Temp\B536.tmp"122⤵PID:4508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-