Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe
-
Size
486KB
-
MD5
8701ad59930d47974860568287adeb34
-
SHA1
da4a0f31f2b25d3f88231ea0c04540164feb3fed
-
SHA256
d1d035eb60d6ddfcf1c289c78943fdc13faf8ee1a4c322c8056d2f184f3dde12
-
SHA512
a8cfd3eb69a0723b3d9ec03c6e89851643bad017fd48c748465e8e72e4e99e44d2657a6c5c3ad2392717c3f3f0fedd2e649a41a6722615b68d762e6f7800cc05
-
SSDEEP
12288:/U5rCOTeiDBcaI8W6gmsO+EhPQ2+M7NZ:/UQOJDeaI8W6gp7EJF57N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4512 4585.tmp 452 544A.tmp 1164 5498.tmp 4604 468E.tmp 4508 46DC.tmp 4220 472B.tmp 4060 4779.tmp 2296 47C7.tmp 4084 5592.tmp 1520 4882.tmp 4688 48D0.tmp 1392 492E.tmp 2788 497C.tmp 4308 49CA.tmp 4904 4A38.tmp 4584 4A86.tmp 4472 4AD4.tmp 4300 4B41.tmp 3468 4CD8.tmp 1808 4D26.tmp 2032 4D74.tmp 1444 4DC2.tmp 4912 4E10.tmp 3040 4E5E.tmp 2172 4EAC.tmp 3840 4F0A.tmp 2584 5DDF.tmp 408 5E2D.tmp 2356 5004.tmp 1380 5052.tmp 1192 50A0.tmp 4480 6002.tmp 2988 514C.tmp 2592 519A.tmp 3012 51F8.tmp 3224 5266.tmp 5096 52B4.tmp 3864 5302.tmp 2944 5360.tmp 3796 53AE.tmp 4700 53FC.tmp 452 544A.tmp 1164 5498.tmp 404 54E6.tmp 5020 5534.tmp 4084 5592.tmp 4424 55E0.tmp 364 562E.tmp 3228 567C.tmp 3860 56CB.tmp 4260 66E8.tmp 2372 6736.tmp 2576 57B5.tmp 4576 5803.tmp 4364 5851.tmp 4856 6997.tmp 444 6A24.tmp 2404 595B.tmp 3192 59A9.tmp 4756 59F7.tmp 1248 5A45.tmp 4836 5A93.tmp 1844 5AE1.tmp 1196 5B30.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4512 3500 2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe 85 PID 3500 wrote to memory of 4512 3500 2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe 85 PID 3500 wrote to memory of 4512 3500 2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe 85 PID 4512 wrote to memory of 452 4512 4585.tmp 113 PID 4512 wrote to memory of 452 4512 4585.tmp 113 PID 4512 wrote to memory of 452 4512 4585.tmp 113 PID 452 wrote to memory of 1164 452 544A.tmp 114 PID 452 wrote to memory of 1164 452 544A.tmp 114 PID 452 wrote to memory of 1164 452 544A.tmp 114 PID 1164 wrote to memory of 4604 1164 5498.tmp 193 PID 1164 wrote to memory of 4604 1164 5498.tmp 193 PID 1164 wrote to memory of 4604 1164 5498.tmp 193 PID 4604 wrote to memory of 4508 4604 468E.tmp 192 PID 4604 wrote to memory of 4508 4604 468E.tmp 192 PID 4604 wrote to memory of 4508 4604 468E.tmp 192 PID 4508 wrote to memory of 4220 4508 46DC.tmp 191 PID 4508 wrote to memory of 4220 4508 46DC.tmp 191 PID 4508 wrote to memory of 4220 4508 46DC.tmp 191 PID 4220 wrote to memory of 4060 4220 472B.tmp 190 PID 4220 wrote to memory of 4060 4220 472B.tmp 190 PID 4220 wrote to memory of 4060 4220 472B.tmp 190 PID 4060 wrote to memory of 2296 4060 4779.tmp 93 PID 4060 wrote to memory of 2296 4060 4779.tmp 93 PID 4060 wrote to memory of 2296 4060 4779.tmp 93 PID 2296 wrote to memory of 4084 2296 47C7.tmp 117 PID 2296 wrote to memory of 4084 2296 47C7.tmp 117 PID 2296 wrote to memory of 4084 2296 47C7.tmp 117 PID 4084 wrote to memory of 1520 4084 5592.tmp 92 PID 4084 wrote to memory of 1520 4084 5592.tmp 92 PID 4084 wrote to memory of 1520 4084 5592.tmp 92 PID 1520 wrote to memory of 4688 1520 4882.tmp 189 PID 1520 wrote to memory of 4688 1520 4882.tmp 189 PID 1520 wrote to memory of 4688 1520 4882.tmp 189 PID 4688 wrote to memory of 1392 4688 48D0.tmp 94 PID 4688 wrote to memory of 1392 4688 48D0.tmp 94 PID 4688 wrote to memory of 1392 4688 48D0.tmp 94 PID 1392 wrote to memory of 2788 1392 492E.tmp 95 PID 1392 wrote to memory of 2788 1392 492E.tmp 95 PID 1392 wrote to memory of 2788 1392 492E.tmp 95 PID 2788 wrote to memory of 4308 2788 497C.tmp 100 PID 2788 wrote to memory of 4308 2788 497C.tmp 100 PID 2788 wrote to memory of 4308 2788 497C.tmp 100 PID 4308 wrote to memory of 4904 4308 49CA.tmp 99 PID 4308 wrote to memory of 4904 4308 49CA.tmp 99 PID 4308 wrote to memory of 4904 4308 49CA.tmp 99 PID 4904 wrote to memory of 4584 4904 4A38.tmp 96 PID 4904 wrote to memory of 4584 4904 4A38.tmp 96 PID 4904 wrote to memory of 4584 4904 4A38.tmp 96 PID 4584 wrote to memory of 4472 4584 4A86.tmp 98 PID 4584 wrote to memory of 4472 4584 4A86.tmp 98 PID 4584 wrote to memory of 4472 4584 4A86.tmp 98 PID 4472 wrote to memory of 4300 4472 4AD4.tmp 188 PID 4472 wrote to memory of 4300 4472 4AD4.tmp 188 PID 4472 wrote to memory of 4300 4472 4AD4.tmp 188 PID 4300 wrote to memory of 3468 4300 4B41.tmp 187 PID 4300 wrote to memory of 3468 4300 4B41.tmp 187 PID 4300 wrote to memory of 3468 4300 4B41.tmp 187 PID 3468 wrote to memory of 1808 3468 4CD8.tmp 186 PID 3468 wrote to memory of 1808 3468 4CD8.tmp 186 PID 3468 wrote to memory of 1808 3468 4CD8.tmp 186 PID 1808 wrote to memory of 2032 1808 4D26.tmp 185 PID 1808 wrote to memory of 2032 1808 4D26.tmp 185 PID 1808 wrote to memory of 2032 1808 4D26.tmp 185 PID 2032 wrote to memory of 1444 2032 4D74.tmp 184
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_8701ad59930d47974860568287adeb34_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\4585.tmp"C:\Users\Admin\AppData\Local\Temp\4585.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\45E2.tmp"C:\Users\Admin\AppData\Local\Temp\45E2.tmp"3⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\4640.tmp"C:\Users\Admin\AppData\Local\Temp\4640.tmp"4⤵PID:1164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4815.tmp"C:\Users\Admin\AppData\Local\Temp\4815.tmp"1⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\4882.tmp"C:\Users\Admin\AppData\Local\Temp\4882.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\48D0.tmp"C:\Users\Admin\AppData\Local\Temp\48D0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\47C7.tmp"C:\Users\Admin\AppData\Local\Temp\47C7.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296
-
C:\Users\Admin\AppData\Local\Temp\492E.tmp"C:\Users\Admin\AppData\Local\Temp\492E.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\497C.tmp"C:\Users\Admin\AppData\Local\Temp\497C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\49CA.tmp"C:\Users\Admin\AppData\Local\Temp\49CA.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\4A86.tmp"C:\Users\Admin\AppData\Local\Temp\4A86.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\4B41.tmp"C:\Users\Admin\AppData\Local\Temp\4B41.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\4A38.tmp"C:\Users\Admin\AppData\Local\Temp\4A38.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904
-
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"1⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"2⤵PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"1⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"2⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"3⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"4⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"5⤵
- Executes dropped EXE
PID:3224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"1⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\5302.tmp"C:\Users\Admin\AppData\Local\Temp\5302.tmp"2⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\5360.tmp"C:\Users\Admin\AppData\Local\Temp\5360.tmp"3⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\53AE.tmp"C:\Users\Admin\AppData\Local\Temp\53AE.tmp"4⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\53FC.tmp"C:\Users\Admin\AppData\Local\Temp\53FC.tmp"5⤵
- Executes dropped EXE
PID:4700
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\544A.tmp"C:\Users\Admin\AppData\Local\Temp\544A.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\5498.tmp"C:\Users\Admin\AppData\Local\Temp\5498.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\54E6.tmp"C:\Users\Admin\AppData\Local\Temp\54E6.tmp"3⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\64B5.tmp"C:\Users\Admin\AppData\Local\Temp\64B5.tmp"4⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"5⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"6⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"7⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\65DE.tmp"C:\Users\Admin\AppData\Local\Temp\65DE.tmp"8⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"9⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\668A.tmp"C:\Users\Admin\AppData\Local\Temp\668A.tmp"10⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\66E8.tmp"C:\Users\Admin\AppData\Local\Temp\66E8.tmp"11⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"12⤵
- Executes dropped EXE
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\67A3.tmp"C:\Users\Admin\AppData\Local\Temp\67A3.tmp"13⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\689D.tmp"C:\Users\Admin\AppData\Local\Temp\689D.tmp"14⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"15⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"16⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"17⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"18⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"19⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\6C08.tmp"C:\Users\Admin\AppData\Local\Temp\6C08.tmp"20⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"21⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"22⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\6D41.tmp"C:\Users\Admin\AppData\Local\Temp\6D41.tmp"23⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"24⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"25⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"26⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"27⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\6F15.tmp"C:\Users\Admin\AppData\Local\Temp\6F15.tmp"28⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"29⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\703E.tmp"C:\Users\Admin\AppData\Local\Temp\703E.tmp"30⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\70BB.tmp"C:\Users\Admin\AppData\Local\Temp\70BB.tmp"31⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\7138.tmp"C:\Users\Admin\AppData\Local\Temp\7138.tmp"32⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\7186.tmp"C:\Users\Admin\AppData\Local\Temp\7186.tmp"33⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\71D4.tmp"C:\Users\Admin\AppData\Local\Temp\71D4.tmp"34⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\7232.tmp"C:\Users\Admin\AppData\Local\Temp\7232.tmp"35⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\7280.tmp"C:\Users\Admin\AppData\Local\Temp\7280.tmp"36⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\72DE.tmp"C:\Users\Admin\AppData\Local\Temp\72DE.tmp"37⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\733C.tmp"C:\Users\Admin\AppData\Local\Temp\733C.tmp"38⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"39⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"40⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"41⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"42⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\74D2.tmp"C:\Users\Admin\AppData\Local\Temp\74D2.tmp"43⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\7520.tmp"C:\Users\Admin\AppData\Local\Temp\7520.tmp"44⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\757E.tmp"C:\Users\Admin\AppData\Local\Temp\757E.tmp"45⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\75CC.tmp"C:\Users\Admin\AppData\Local\Temp\75CC.tmp"46⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"47⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"48⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\76B6.tmp"C:\Users\Admin\AppData\Local\Temp\76B6.tmp"49⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\7705.tmp"C:\Users\Admin\AppData\Local\Temp\7705.tmp"50⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\7762.tmp"C:\Users\Admin\AppData\Local\Temp\7762.tmp"51⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"52⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"53⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\786C.tmp"C:\Users\Admin\AppData\Local\Temp\786C.tmp"54⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"55⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\7908.tmp"C:\Users\Admin\AppData\Local\Temp\7908.tmp"56⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\7956.tmp"C:\Users\Admin\AppData\Local\Temp\7956.tmp"57⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"58⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\79F3.tmp"C:\Users\Admin\AppData\Local\Temp\79F3.tmp"59⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\7A41.tmp"C:\Users\Admin\AppData\Local\Temp\7A41.tmp"60⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"61⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"62⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"63⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\7B89.tmp"C:\Users\Admin\AppData\Local\Temp\7B89.tmp"64⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"65⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\7C44.tmp"C:\Users\Admin\AppData\Local\Temp\7C44.tmp"66⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\7C92.tmp"C:\Users\Admin\AppData\Local\Temp\7C92.tmp"67⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"68⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"69⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"70⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"71⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\7E38.tmp"C:\Users\Admin\AppData\Local\Temp\7E38.tmp"72⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\7E86.tmp"C:\Users\Admin\AppData\Local\Temp\7E86.tmp"73⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"74⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\7F23.tmp"C:\Users\Admin\AppData\Local\Temp\7F23.tmp"75⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\7F71.tmp"C:\Users\Admin\AppData\Local\Temp\7F71.tmp"76⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"77⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"78⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\806B.tmp"C:\Users\Admin\AppData\Local\Temp\806B.tmp"79⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"80⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\8117.tmp"C:\Users\Admin\AppData\Local\Temp\8117.tmp"81⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"82⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\81D2.tmp"C:\Users\Admin\AppData\Local\Temp\81D2.tmp"83⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\8220.tmp"C:\Users\Admin\AppData\Local\Temp\8220.tmp"84⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"85⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\82BD.tmp"C:\Users\Admin\AppData\Local\Temp\82BD.tmp"86⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"87⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\8368.tmp"C:\Users\Admin\AppData\Local\Temp\8368.tmp"88⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\83B7.tmp"C:\Users\Admin\AppData\Local\Temp\83B7.tmp"89⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"90⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\8453.tmp"C:\Users\Admin\AppData\Local\Temp\8453.tmp"91⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\84A1.tmp"C:\Users\Admin\AppData\Local\Temp\84A1.tmp"92⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\84EF.tmp"C:\Users\Admin\AppData\Local\Temp\84EF.tmp"93⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\854D.tmp"C:\Users\Admin\AppData\Local\Temp\854D.tmp"94⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\859B.tmp"C:\Users\Admin\AppData\Local\Temp\859B.tmp"95⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\85F9.tmp"C:\Users\Admin\AppData\Local\Temp\85F9.tmp"96⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"97⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"98⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"99⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\8741.tmp"C:\Users\Admin\AppData\Local\Temp\8741.tmp"100⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\879F.tmp"C:\Users\Admin\AppData\Local\Temp\879F.tmp"101⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\87ED.tmp"C:\Users\Admin\AppData\Local\Temp\87ED.tmp"102⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\883B.tmp"C:\Users\Admin\AppData\Local\Temp\883B.tmp"103⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"104⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\88D7.tmp"C:\Users\Admin\AppData\Local\Temp\88D7.tmp"105⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"106⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\8983.tmp"C:\Users\Admin\AppData\Local\Temp\8983.tmp"107⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"108⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"109⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"110⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"111⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\8B29.tmp"C:\Users\Admin\AppData\Local\Temp\8B29.tmp"112⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\8B77.tmp"C:\Users\Admin\AppData\Local\Temp\8B77.tmp"113⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"114⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\8C32.tmp"C:\Users\Admin\AppData\Local\Temp\8C32.tmp"115⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\8C90.tmp"C:\Users\Admin\AppData\Local\Temp\8C90.tmp"116⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"117⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"118⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"119⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\8DD8.tmp"C:\Users\Admin\AppData\Local\Temp\8DD8.tmp"120⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"121⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"122⤵PID:2500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-