Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe
-
Size
486KB
-
MD5
d059b967cbea6a44fc24477f99980dd6
-
SHA1
15972c7a7fe486795af0d2b6881fb3f167a3f97e
-
SHA256
bb739226a5bd440bd5620d3f3db8cbf1e25a97b5656c026ed6bd95412550d72a
-
SHA512
7122100fe85d630ed0a56371ecc18273579c60bb35f10885bb5d72f539ecf4ff5fe36dc897fa91fcdc0650b398a17d8546187cddab901f7d87b0f2552bd9d9a6
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7kFD8zjgBXqfdsc6hR6Hfq6MsQrjetwQHsH3j:/U5rCOTeiDkizjgBXqVsxk/qzswZNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2468 2EEB.tmp 3484 31F8.tmp 3644 32A4.tmp 4892 34A7.tmp 4868 362E.tmp 1808 3709.tmp 1404 37E4.tmp 548 38DE.tmp 220 3989.tmp 4344 3A55.tmp 4124 3B10.tmp 1040 3BBC.tmp 1660 3C87.tmp 4604 4159.tmp 1068 46B8.tmp 1960 483F.tmp 1248 4B9A.tmp 2224 4CD3.tmp 3340 4F92.tmp 1624 50DA.tmp 3184 51F3.tmp 4348 532C.tmp 380 53E7.tmp 1556 554F.tmp 3852 5724.tmp 904 583D.tmp 2804 5975.tmp 1708 5AEC.tmp 3732 5BB7.tmp 2060 5CC1.tmp 4308 5DBB.tmp 4456 5F03.tmp 4252 603C.tmp 1216 61A3.tmp 4844 6210.tmp 3864 63C6.tmp 2552 64D0.tmp 4444 6666.tmp 2280 67AE.tmp 2436 6A7D.tmp 2412 6C42.tmp 4952 6CFD.tmp 4908 6D8A.tmp 3092 6F4F.tmp 4568 70A7.tmp 2448 71C0.tmp 3176 723D.tmp 1868 7385.tmp 3352 74CD.tmp 4172 753B.tmp 4088 75E7.tmp 2688 7664.tmp 1756 772F.tmp 4100 77EA.tmp 4964 78E4.tmp 1896 7AA9.tmp 384 7B84.tmp 1808 7C01.tmp 4320 7CCC.tmp 4736 7D3A.tmp 1368 7E05.tmp 2252 7F5C.tmp 1552 7FE9.tmp 1384 8056.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2468 2208 2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe 89 PID 2208 wrote to memory of 2468 2208 2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe 89 PID 2208 wrote to memory of 2468 2208 2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe 89 PID 2468 wrote to memory of 3484 2468 2EEB.tmp 90 PID 2468 wrote to memory of 3484 2468 2EEB.tmp 90 PID 2468 wrote to memory of 3484 2468 2EEB.tmp 90 PID 3484 wrote to memory of 3644 3484 31F8.tmp 91 PID 3484 wrote to memory of 3644 3484 31F8.tmp 91 PID 3484 wrote to memory of 3644 3484 31F8.tmp 91 PID 3644 wrote to memory of 4892 3644 32A4.tmp 92 PID 3644 wrote to memory of 4892 3644 32A4.tmp 92 PID 3644 wrote to memory of 4892 3644 32A4.tmp 92 PID 4892 wrote to memory of 4868 4892 34A7.tmp 93 PID 4892 wrote to memory of 4868 4892 34A7.tmp 93 PID 4892 wrote to memory of 4868 4892 34A7.tmp 93 PID 4868 wrote to memory of 1808 4868 362E.tmp 94 PID 4868 wrote to memory of 1808 4868 362E.tmp 94 PID 4868 wrote to memory of 1808 4868 362E.tmp 94 PID 1808 wrote to memory of 1404 1808 3709.tmp 95 PID 1808 wrote to memory of 1404 1808 3709.tmp 95 PID 1808 wrote to memory of 1404 1808 3709.tmp 95 PID 1404 wrote to memory of 548 1404 37E4.tmp 96 PID 1404 wrote to memory of 548 1404 37E4.tmp 96 PID 1404 wrote to memory of 548 1404 37E4.tmp 96 PID 548 wrote to memory of 220 548 38DE.tmp 97 PID 548 wrote to memory of 220 548 38DE.tmp 97 PID 548 wrote to memory of 220 548 38DE.tmp 97 PID 220 wrote to memory of 4344 220 3989.tmp 98 PID 220 wrote to memory of 4344 220 3989.tmp 98 PID 220 wrote to memory of 4344 220 3989.tmp 98 PID 4344 wrote to memory of 4124 4344 3A55.tmp 99 PID 4344 wrote to memory of 4124 4344 3A55.tmp 99 PID 4344 wrote to memory of 4124 4344 3A55.tmp 99 PID 4124 wrote to memory of 1040 4124 3B10.tmp 100 PID 4124 wrote to memory of 1040 4124 3B10.tmp 100 PID 4124 wrote to memory of 1040 4124 3B10.tmp 100 PID 1040 wrote to memory of 1660 1040 3BBC.tmp 101 PID 1040 wrote to memory of 1660 1040 3BBC.tmp 101 PID 1040 wrote to memory of 1660 1040 3BBC.tmp 101 PID 1660 wrote to memory of 4604 1660 3C87.tmp 102 PID 1660 wrote to memory of 4604 1660 3C87.tmp 102 PID 1660 wrote to memory of 4604 1660 3C87.tmp 102 PID 4604 wrote to memory of 1068 4604 4159.tmp 103 PID 4604 wrote to memory of 1068 4604 4159.tmp 103 PID 4604 wrote to memory of 1068 4604 4159.tmp 103 PID 1068 wrote to memory of 1960 1068 46B8.tmp 104 PID 1068 wrote to memory of 1960 1068 46B8.tmp 104 PID 1068 wrote to memory of 1960 1068 46B8.tmp 104 PID 1960 wrote to memory of 1248 1960 483F.tmp 105 PID 1960 wrote to memory of 1248 1960 483F.tmp 105 PID 1960 wrote to memory of 1248 1960 483F.tmp 105 PID 1248 wrote to memory of 2224 1248 4B9A.tmp 106 PID 1248 wrote to memory of 2224 1248 4B9A.tmp 106 PID 1248 wrote to memory of 2224 1248 4B9A.tmp 106 PID 2224 wrote to memory of 3340 2224 4CD3.tmp 107 PID 2224 wrote to memory of 3340 2224 4CD3.tmp 107 PID 2224 wrote to memory of 3340 2224 4CD3.tmp 107 PID 3340 wrote to memory of 1624 3340 4F92.tmp 108 PID 3340 wrote to memory of 1624 3340 4F92.tmp 108 PID 3340 wrote to memory of 1624 3340 4F92.tmp 108 PID 1624 wrote to memory of 3184 1624 50DA.tmp 109 PID 1624 wrote to memory of 3184 1624 50DA.tmp 109 PID 1624 wrote to memory of 3184 1624 50DA.tmp 109 PID 3184 wrote to memory of 4348 3184 51F3.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_d059b967cbea6a44fc24477f99980dd6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\362E.tmp"C:\Users\Admin\AppData\Local\Temp\362E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\37E4.tmp"C:\Users\Admin\AppData\Local\Temp\37E4.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\3B10.tmp"C:\Users\Admin\AppData\Local\Temp\3B10.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\4159.tmp"C:\Users\Admin\AppData\Local\Temp\4159.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\46B8.tmp"C:\Users\Admin\AppData\Local\Temp\46B8.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\50DA.tmp"C:\Users\Admin\AppData\Local\Temp\50DA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\51F3.tmp"C:\Users\Admin\AppData\Local\Temp\51F3.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"23⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\53E7.tmp"C:\Users\Admin\AppData\Local\Temp\53E7.tmp"24⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\554F.tmp"C:\Users\Admin\AppData\Local\Temp\554F.tmp"25⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"26⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\583D.tmp"C:\Users\Admin\AppData\Local\Temp\583D.tmp"27⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"28⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"29⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"30⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"31⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"32⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"33⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\603C.tmp"C:\Users\Admin\AppData\Local\Temp\603C.tmp"34⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\61A3.tmp"C:\Users\Admin\AppData\Local\Temp\61A3.tmp"35⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"36⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\63C6.tmp"C:\Users\Admin\AppData\Local\Temp\63C6.tmp"37⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\64D0.tmp"C:\Users\Admin\AppData\Local\Temp\64D0.tmp"38⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"39⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"40⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"41⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\6C42.tmp"C:\Users\Admin\AppData\Local\Temp\6C42.tmp"42⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"43⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"44⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"45⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\70A7.tmp"C:\Users\Admin\AppData\Local\Temp\70A7.tmp"46⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"47⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\723D.tmp"C:\Users\Admin\AppData\Local\Temp\723D.tmp"48⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\7385.tmp"C:\Users\Admin\AppData\Local\Temp\7385.tmp"49⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\74CD.tmp"C:\Users\Admin\AppData\Local\Temp\74CD.tmp"50⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\753B.tmp"C:\Users\Admin\AppData\Local\Temp\753B.tmp"51⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\75E7.tmp"C:\Users\Admin\AppData\Local\Temp\75E7.tmp"52⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\7664.tmp"C:\Users\Admin\AppData\Local\Temp\7664.tmp"53⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\772F.tmp"C:\Users\Admin\AppData\Local\Temp\772F.tmp"54⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\77EA.tmp"C:\Users\Admin\AppData\Local\Temp\77EA.tmp"55⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\78E4.tmp"C:\Users\Admin\AppData\Local\Temp\78E4.tmp"56⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"57⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\7B84.tmp"C:\Users\Admin\AppData\Local\Temp\7B84.tmp"58⤵
- Executes dropped EXE
PID:384 -
C:\Users\Admin\AppData\Local\Temp\7C01.tmp"C:\Users\Admin\AppData\Local\Temp\7C01.tmp"59⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\7CCC.tmp"C:\Users\Admin\AppData\Local\Temp\7CCC.tmp"60⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\7D3A.tmp"C:\Users\Admin\AppData\Local\Temp\7D3A.tmp"61⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\7E05.tmp"C:\Users\Admin\AppData\Local\Temp\7E05.tmp"62⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"63⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"64⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\8056.tmp"C:\Users\Admin\AppData\Local\Temp\8056.tmp"65⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\8112.tmp"C:\Users\Admin\AppData\Local\Temp\8112.tmp"66⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\817F.tmp"C:\Users\Admin\AppData\Local\Temp\817F.tmp"67⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\81FC.tmp"C:\Users\Admin\AppData\Local\Temp\81FC.tmp"68⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\8279.tmp"C:\Users\Admin\AppData\Local\Temp\8279.tmp"69⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\83F0.tmp"C:\Users\Admin\AppData\Local\Temp\83F0.tmp"70⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\845E.tmp"C:\Users\Admin\AppData\Local\Temp\845E.tmp"71⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\84FA.tmp"C:\Users\Admin\AppData\Local\Temp\84FA.tmp"72⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\85A6.tmp"C:\Users\Admin\AppData\Local\Temp\85A6.tmp"73⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\8632.tmp"C:\Users\Admin\AppData\Local\Temp\8632.tmp"74⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\870D.tmp"C:\Users\Admin\AppData\Local\Temp\870D.tmp"75⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\87B9.tmp"C:\Users\Admin\AppData\Local\Temp\87B9.tmp"76⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\88D2.tmp"C:\Users\Admin\AppData\Local\Temp\88D2.tmp"77⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\895F.tmp"C:\Users\Admin\AppData\Local\Temp\895F.tmp"78⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\89EC.tmp"C:\Users\Admin\AppData\Local\Temp\89EC.tmp"79⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\8AE6.tmp"C:\Users\Admin\AppData\Local\Temp\8AE6.tmp"80⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\8B53.tmp"C:\Users\Admin\AppData\Local\Temp\8B53.tmp"81⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"82⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"83⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\8D47.tmp"C:\Users\Admin\AppData\Local\Temp\8D47.tmp"84⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\8DD4.tmp"C:\Users\Admin\AppData\Local\Temp\8DD4.tmp"85⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\8E41.tmp"C:\Users\Admin\AppData\Local\Temp\8E41.tmp"86⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\8EED.tmp"C:\Users\Admin\AppData\Local\Temp\8EED.tmp"87⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\8F79.tmp"C:\Users\Admin\AppData\Local\Temp\8F79.tmp"88⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\8FF6.tmp"C:\Users\Admin\AppData\Local\Temp\8FF6.tmp"89⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\9073.tmp"C:\Users\Admin\AppData\Local\Temp\9073.tmp"90⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\913F.tmp"C:\Users\Admin\AppData\Local\Temp\913F.tmp"91⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\91FA.tmp"C:\Users\Admin\AppData\Local\Temp\91FA.tmp"92⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\92A6.tmp"C:\Users\Admin\AppData\Local\Temp\92A6.tmp"93⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\9333.tmp"C:\Users\Admin\AppData\Local\Temp\9333.tmp"94⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\93B0.tmp"C:\Users\Admin\AppData\Local\Temp\93B0.tmp"95⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\944C.tmp"C:\Users\Admin\AppData\Local\Temp\944C.tmp"96⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\94C9.tmp"C:\Users\Admin\AppData\Local\Temp\94C9.tmp"97⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\9584.tmp"C:\Users\Admin\AppData\Local\Temp\9584.tmp"98⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\9630.tmp"C:\Users\Admin\AppData\Local\Temp\9630.tmp"99⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\96DC.tmp"C:\Users\Admin\AppData\Local\Temp\96DC.tmp"100⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\9788.tmp"C:\Users\Admin\AppData\Local\Temp\9788.tmp"101⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\99CA.tmp"C:\Users\Admin\AppData\Local\Temp\99CA.tmp"102⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\9A28.tmp"C:\Users\Admin\AppData\Local\Temp\9A28.tmp"103⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\9C0C.tmp"C:\Users\Admin\AppData\Local\Temp\9C0C.tmp"104⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\9C99.tmp"C:\Users\Admin\AppData\Local\Temp\9C99.tmp"105⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"106⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\9E9C.tmp"C:\Users\Admin\AppData\Local\Temp\9E9C.tmp"107⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\9F0A.tmp"C:\Users\Admin\AppData\Local\Temp\9F0A.tmp"108⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\9F96.tmp"C:\Users\Admin\AppData\Local\Temp\9F96.tmp"109⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\A042.tmp"C:\Users\Admin\AppData\Local\Temp\A042.tmp"110⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\A13C.tmp"C:\Users\Admin\AppData\Local\Temp\A13C.tmp"111⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"112⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\A256.tmp"C:\Users\Admin\AppData\Local\Temp\A256.tmp"113⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\A2D3.tmp"C:\Users\Admin\AppData\Local\Temp\A2D3.tmp"114⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\A340.tmp"C:\Users\Admin\AppData\Local\Temp\A340.tmp"115⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"116⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\A44A.tmp"C:\Users\Admin\AppData\Local\Temp\A44A.tmp"117⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\A505.tmp"C:\Users\Admin\AppData\Local\Temp\A505.tmp"118⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\A592.tmp"C:\Users\Admin\AppData\Local\Temp\A592.tmp"119⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\A60F.tmp"C:\Users\Admin\AppData\Local\Temp\A60F.tmp"120⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\A68C.tmp"C:\Users\Admin\AppData\Local\Temp\A68C.tmp"121⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\A709.tmp"C:\Users\Admin\AppData\Local\Temp\A709.tmp"122⤵PID:1560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-