Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe
-
Size
486KB
-
MD5
c031bdcfde7de37229bc24cf85b62bec
-
SHA1
6ad730e7afc142251910f3371c9b758f368fd4fd
-
SHA256
cab744e88a3b86d82a4bc33e35be506454838f5e8d5451b1b97e0ad615d510ee
-
SHA512
4a4532deff6d2952005517f058861e4e6b9d9471c7c4d7c5701484db03416f5db8d843ac995cefa8475a17f7da6c1f7c25b5a86c52c9eb0060bd228bebd3a02a
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7PsFAf5JeNeSLTW/Kw32ehbad5RphXXrBW790:/U5rCOTeiDPsFe+zL0ba9phnY7gYsNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1952 FB09.tmp 2616 FC52.tmp 2100 FD2C.tmp 1212 FE07.tmp 3160 FF01.tmp 1504 FFDC.tmp 2944 88.tmp 4988 153.tmp 2864 858.tmp 3468 A7B.tmp 4236 B55.tmp 1676 C4F.tmp 4484 D59.tmp 4696 F2E.tmp 1732 FF9.tmp 4388 121C.tmp 5116 1373.tmp 1120 150A.tmp 3968 1681.tmp 2140 1807.tmp 5080 199E.tmp 4648 1AF5.tmp 4652 1C1E.tmp 380 1CF9.tmp 4528 1E03.tmp 1284 1F2B.tmp 4260 2083.tmp 536 217D.tmp 3260 2248.tmp 1308 2313.tmp 2240 23DF.tmp 368 24B9.tmp 1680 2584.tmp 5084 2640.tmp 224 26CD.tmp 2300 2759.tmp 1028 2844.tmp 788 28C1.tmp 3156 294D.tmp 1468 29CA.tmp 4060 2A47.tmp 4824 2AC4.tmp 3192 2B51.tmp 3116 2BFD.tmp 4952 2C89.tmp 4848 2D26.tmp 3860 2DC2.tmp 3724 2E4E.tmp 2400 2EDB.tmp 4324 2F77.tmp 4480 3023.tmp 636 30CF.tmp 448 318B.tmp 1320 3227.tmp 4044 32C3.tmp 4784 337F.tmp 1304 341B.tmp 5064 34A7.tmp 2376 3553.tmp 3740 35D0.tmp 5020 369B.tmp 3112 3747.tmp 1188 37E4.tmp 2864 3861.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 1952 448 2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe 83 PID 448 wrote to memory of 1952 448 2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe 83 PID 448 wrote to memory of 1952 448 2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe 83 PID 1952 wrote to memory of 2616 1952 FB09.tmp 84 PID 1952 wrote to memory of 2616 1952 FB09.tmp 84 PID 1952 wrote to memory of 2616 1952 FB09.tmp 84 PID 2616 wrote to memory of 2100 2616 FC52.tmp 85 PID 2616 wrote to memory of 2100 2616 FC52.tmp 85 PID 2616 wrote to memory of 2100 2616 FC52.tmp 85 PID 2100 wrote to memory of 1212 2100 FD2C.tmp 86 PID 2100 wrote to memory of 1212 2100 FD2C.tmp 86 PID 2100 wrote to memory of 1212 2100 FD2C.tmp 86 PID 1212 wrote to memory of 3160 1212 FE07.tmp 87 PID 1212 wrote to memory of 3160 1212 FE07.tmp 87 PID 1212 wrote to memory of 3160 1212 FE07.tmp 87 PID 3160 wrote to memory of 1504 3160 FF01.tmp 88 PID 3160 wrote to memory of 1504 3160 FF01.tmp 88 PID 3160 wrote to memory of 1504 3160 FF01.tmp 88 PID 1504 wrote to memory of 2944 1504 FFDC.tmp 89 PID 1504 wrote to memory of 2944 1504 FFDC.tmp 89 PID 1504 wrote to memory of 2944 1504 FFDC.tmp 89 PID 2944 wrote to memory of 4988 2944 88.tmp 90 PID 2944 wrote to memory of 4988 2944 88.tmp 90 PID 2944 wrote to memory of 4988 2944 88.tmp 90 PID 4988 wrote to memory of 2864 4988 153.tmp 91 PID 4988 wrote to memory of 2864 4988 153.tmp 91 PID 4988 wrote to memory of 2864 4988 153.tmp 91 PID 2864 wrote to memory of 3468 2864 858.tmp 92 PID 2864 wrote to memory of 3468 2864 858.tmp 92 PID 2864 wrote to memory of 3468 2864 858.tmp 92 PID 3468 wrote to memory of 4236 3468 A7B.tmp 93 PID 3468 wrote to memory of 4236 3468 A7B.tmp 93 PID 3468 wrote to memory of 4236 3468 A7B.tmp 93 PID 4236 wrote to memory of 1676 4236 B55.tmp 94 PID 4236 wrote to memory of 1676 4236 B55.tmp 94 PID 4236 wrote to memory of 1676 4236 B55.tmp 94 PID 1676 wrote to memory of 4484 1676 C4F.tmp 95 PID 1676 wrote to memory of 4484 1676 C4F.tmp 95 PID 1676 wrote to memory of 4484 1676 C4F.tmp 95 PID 4484 wrote to memory of 4696 4484 D59.tmp 96 PID 4484 wrote to memory of 4696 4484 D59.tmp 96 PID 4484 wrote to memory of 4696 4484 D59.tmp 96 PID 4696 wrote to memory of 1732 4696 F2E.tmp 97 PID 4696 wrote to memory of 1732 4696 F2E.tmp 97 PID 4696 wrote to memory of 1732 4696 F2E.tmp 97 PID 1732 wrote to memory of 4388 1732 FF9.tmp 98 PID 1732 wrote to memory of 4388 1732 FF9.tmp 98 PID 1732 wrote to memory of 4388 1732 FF9.tmp 98 PID 4388 wrote to memory of 5116 4388 121C.tmp 99 PID 4388 wrote to memory of 5116 4388 121C.tmp 99 PID 4388 wrote to memory of 5116 4388 121C.tmp 99 PID 5116 wrote to memory of 1120 5116 1373.tmp 100 PID 5116 wrote to memory of 1120 5116 1373.tmp 100 PID 5116 wrote to memory of 1120 5116 1373.tmp 100 PID 1120 wrote to memory of 3968 1120 150A.tmp 101 PID 1120 wrote to memory of 3968 1120 150A.tmp 101 PID 1120 wrote to memory of 3968 1120 150A.tmp 101 PID 3968 wrote to memory of 2140 3968 1681.tmp 102 PID 3968 wrote to memory of 2140 3968 1681.tmp 102 PID 3968 wrote to memory of 2140 3968 1681.tmp 102 PID 2140 wrote to memory of 5080 2140 1807.tmp 103 PID 2140 wrote to memory of 5080 2140 1807.tmp 103 PID 2140 wrote to memory of 5080 2140 1807.tmp 103 PID 5080 wrote to memory of 4648 5080 199E.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_c031bdcfde7de37229bc24cf85b62bec_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\153.tmp"C:\Users\Admin\AppData\Local\Temp\153.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\858.tmp"C:\Users\Admin\AppData\Local\Temp\858.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\F2E.tmp"C:\Users\Admin\AppData\Local\Temp\F2E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\1373.tmp"C:\Users\Admin\AppData\Local\Temp\1373.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"23⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"24⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"25⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"26⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"27⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\2083.tmp"C:\Users\Admin\AppData\Local\Temp\2083.tmp"28⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"29⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"30⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\2313.tmp"C:\Users\Admin\AppData\Local\Temp\2313.tmp"31⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\23DF.tmp"C:\Users\Admin\AppData\Local\Temp\23DF.tmp"32⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\24B9.tmp"C:\Users\Admin\AppData\Local\Temp\24B9.tmp"33⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"34⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"35⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\26CD.tmp"C:\Users\Admin\AppData\Local\Temp\26CD.tmp"36⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"37⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"38⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"39⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"40⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"41⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\2A47.tmp"C:\Users\Admin\AppData\Local\Temp\2A47.tmp"42⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"43⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"44⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"45⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"46⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"47⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"48⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"49⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"50⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"51⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3023.tmp"C:\Users\Admin\AppData\Local\Temp\3023.tmp"52⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\30CF.tmp"C:\Users\Admin\AppData\Local\Temp\30CF.tmp"53⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\318B.tmp"C:\Users\Admin\AppData\Local\Temp\318B.tmp"54⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"55⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"56⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"57⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"58⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"59⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"60⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"61⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"62⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"63⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\37E4.tmp"C:\Users\Admin\AppData\Local\Temp\37E4.tmp"64⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3861.tmp"C:\Users\Admin\AppData\Local\Temp\3861.tmp"65⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"66⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"67⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"68⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"69⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"70⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3BFA.tmp"C:\Users\Admin\AppData\Local\Temp\3BFA.tmp"71⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"72⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\3D14.tmp"C:\Users\Admin\AppData\Local\Temp\3D14.tmp"73⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"74⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"75⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"76⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\3F27.tmp"C:\Users\Admin\AppData\Local\Temp\3F27.tmp"77⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"78⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"79⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"80⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\413A.tmp"C:\Users\Admin\AppData\Local\Temp\413A.tmp"81⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"82⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"83⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\42D0.tmp"C:\Users\Admin\AppData\Local\Temp\42D0.tmp"84⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"85⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\4409.tmp"C:\Users\Admin\AppData\Local\Temp\4409.tmp"86⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\44A5.tmp"C:\Users\Admin\AppData\Local\Temp\44A5.tmp"87⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\4522.tmp"C:\Users\Admin\AppData\Local\Temp\4522.tmp"88⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"89⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"90⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\4726.tmp"C:\Users\Admin\AppData\Local\Temp\4726.tmp"91⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\47A3.tmp"C:\Users\Admin\AppData\Local\Temp\47A3.tmp"92⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\4820.tmp"C:\Users\Admin\AppData\Local\Temp\4820.tmp"93⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"94⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"95⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"96⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"97⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"98⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"99⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\4C37.tmp"C:\Users\Admin\AppData\Local\Temp\4C37.tmp"100⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"101⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\4D50.tmp"C:\Users\Admin\AppData\Local\Temp\4D50.tmp"102⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"103⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"104⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"105⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"106⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\500F.tmp"C:\Users\Admin\AppData\Local\Temp\500F.tmp"107⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\508C.tmp"C:\Users\Admin\AppData\Local\Temp\508C.tmp"108⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\5109.tmp"C:\Users\Admin\AppData\Local\Temp\5109.tmp"109⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\5186.tmp"C:\Users\Admin\AppData\Local\Temp\5186.tmp"110⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"111⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\5280.tmp"C:\Users\Admin\AppData\Local\Temp\5280.tmp"112⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\52ED.tmp"C:\Users\Admin\AppData\Local\Temp\52ED.tmp"113⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\53A9.tmp"C:\Users\Admin\AppData\Local\Temp\53A9.tmp"114⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"115⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\55DB.tmp"C:\Users\Admin\AppData\Local\Temp\55DB.tmp"116⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\5658.tmp"C:\Users\Admin\AppData\Local\Temp\5658.tmp"117⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"118⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"119⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\57EF.tmp"C:\Users\Admin\AppData\Local\Temp\57EF.tmp"120⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"121⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\58F8.tmp"C:\Users\Admin\AppData\Local\Temp\58F8.tmp"122⤵PID:4440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-