Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 10:31 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe
-
Size
486KB
-
MD5
5d19dbc5057e1b352bc70a99c0b0b1e6
-
SHA1
e2d33a65d85aa31924364c3874e40cf41d055c28
-
SHA256
2876b58869b92034c0eeb258a470902acf5748a73a0b1e53a0c8c5d97098b143
-
SHA512
657538ea90f39ef389bb9bbe79a51064c216faae824185349d0bf1ab7383f3fcc62b2a4add3739f4f7dc7ce217434f2c4331fb4570843b9f23629915b4ca4fae
-
SSDEEP
12288:/U5rCOTeiDqei8cTdYiu9cbqxWGIdDmPzAONZ:/UQOJD9ixdYiu9rxtaDmPRN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4112 3885.tmp 4068 38F2.tmp 5012 396F.tmp 5004 39EC.tmp 556 3A4A.tmp 440 3AB7.tmp 2200 3B05.tmp 4372 3B53.tmp 4188 3BC1.tmp 2116 3C1E.tmp 4928 3C8C.tmp 1712 3CEA.tmp 2988 3D57.tmp 1704 3DB5.tmp 2720 3E03.tmp 4352 3E70.tmp 520 3ECE.tmp 1176 3F2C.tmp 896 3F89.tmp 5040 3FD8.tmp 4496 4035.tmp 3148 40A3.tmp 1144 4100.tmp 1556 415E.tmp 3936 41BC.tmp 3272 4229.tmp 988 4287.tmp 920 42E5.tmp 5112 4352.tmp 4712 43B0.tmp 2728 441D.tmp 2100 448B.tmp 4964 44F8.tmp 4920 4556.tmp 892 45A4.tmp 5020 4602.tmp 3132 465F.tmp 3792 46BD.tmp 3484 470B.tmp 1096 4769.tmp 2364 47B7.tmp 4708 4805.tmp 4500 4863.tmp 2040 48C1.tmp 3544 490F.tmp 2024 495D.tmp 996 49BB.tmp 3172 4A19.tmp 3556 4A76.tmp 3332 4AC4.tmp 3120 4B13.tmp 3520 4B61.tmp 728 4BBE.tmp 1864 4C0D.tmp 4300 4C5B.tmp 5024 4CB8.tmp 3308 4D07.tmp 4108 4D64.tmp 2248 4DB2.tmp 5036 4E10.tmp 3920 4E5E.tmp 4620 4EAC.tmp 3688 4F0A.tmp 4796 4F58.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 4112 3308 2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe 85 PID 3308 wrote to memory of 4112 3308 2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe 85 PID 3308 wrote to memory of 4112 3308 2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe 85 PID 4112 wrote to memory of 4068 4112 3885.tmp 86 PID 4112 wrote to memory of 4068 4112 3885.tmp 86 PID 4112 wrote to memory of 4068 4112 3885.tmp 86 PID 4068 wrote to memory of 5012 4068 38F2.tmp 87 PID 4068 wrote to memory of 5012 4068 38F2.tmp 87 PID 4068 wrote to memory of 5012 4068 38F2.tmp 87 PID 5012 wrote to memory of 5004 5012 396F.tmp 88 PID 5012 wrote to memory of 5004 5012 396F.tmp 88 PID 5012 wrote to memory of 5004 5012 396F.tmp 88 PID 5004 wrote to memory of 556 5004 39EC.tmp 89 PID 5004 wrote to memory of 556 5004 39EC.tmp 89 PID 5004 wrote to memory of 556 5004 39EC.tmp 89 PID 556 wrote to memory of 440 556 3A4A.tmp 90 PID 556 wrote to memory of 440 556 3A4A.tmp 90 PID 556 wrote to memory of 440 556 3A4A.tmp 90 PID 440 wrote to memory of 2200 440 3AB7.tmp 91 PID 440 wrote to memory of 2200 440 3AB7.tmp 91 PID 440 wrote to memory of 2200 440 3AB7.tmp 91 PID 2200 wrote to memory of 4372 2200 3B05.tmp 92 PID 2200 wrote to memory of 4372 2200 3B05.tmp 92 PID 2200 wrote to memory of 4372 2200 3B05.tmp 92 PID 4372 wrote to memory of 4188 4372 3B53.tmp 93 PID 4372 wrote to memory of 4188 4372 3B53.tmp 93 PID 4372 wrote to memory of 4188 4372 3B53.tmp 93 PID 4188 wrote to memory of 2116 4188 3BC1.tmp 94 PID 4188 wrote to memory of 2116 4188 3BC1.tmp 94 PID 4188 wrote to memory of 2116 4188 3BC1.tmp 94 PID 2116 wrote to memory of 4928 2116 3C1E.tmp 95 PID 2116 wrote to memory of 4928 2116 3C1E.tmp 95 PID 2116 wrote to memory of 4928 2116 3C1E.tmp 95 PID 4928 wrote to memory of 1712 4928 3C8C.tmp 96 PID 4928 wrote to memory of 1712 4928 3C8C.tmp 96 PID 4928 wrote to memory of 1712 4928 3C8C.tmp 96 PID 1712 wrote to memory of 2988 1712 3CEA.tmp 97 PID 1712 wrote to memory of 2988 1712 3CEA.tmp 97 PID 1712 wrote to memory of 2988 1712 3CEA.tmp 97 PID 2988 wrote to memory of 1704 2988 3D57.tmp 98 PID 2988 wrote to memory of 1704 2988 3D57.tmp 98 PID 2988 wrote to memory of 1704 2988 3D57.tmp 98 PID 1704 wrote to memory of 2720 1704 3DB5.tmp 99 PID 1704 wrote to memory of 2720 1704 3DB5.tmp 99 PID 1704 wrote to memory of 2720 1704 3DB5.tmp 99 PID 2720 wrote to memory of 4352 2720 3E03.tmp 100 PID 2720 wrote to memory of 4352 2720 3E03.tmp 100 PID 2720 wrote to memory of 4352 2720 3E03.tmp 100 PID 4352 wrote to memory of 520 4352 3E70.tmp 101 PID 4352 wrote to memory of 520 4352 3E70.tmp 101 PID 4352 wrote to memory of 520 4352 3E70.tmp 101 PID 520 wrote to memory of 1176 520 3ECE.tmp 102 PID 520 wrote to memory of 1176 520 3ECE.tmp 102 PID 520 wrote to memory of 1176 520 3ECE.tmp 102 PID 1176 wrote to memory of 896 1176 3F2C.tmp 103 PID 1176 wrote to memory of 896 1176 3F2C.tmp 103 PID 1176 wrote to memory of 896 1176 3F2C.tmp 103 PID 896 wrote to memory of 5040 896 3F89.tmp 104 PID 896 wrote to memory of 5040 896 3F89.tmp 104 PID 896 wrote to memory of 5040 896 3F89.tmp 104 PID 5040 wrote to memory of 4496 5040 3FD8.tmp 105 PID 5040 wrote to memory of 4496 5040 3FD8.tmp 105 PID 5040 wrote to memory of 4496 5040 3FD8.tmp 105 PID 4496 wrote to memory of 3148 4496 4035.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_5d19dbc5057e1b352bc70a99c0b0b1e6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\3885.tmp"C:\Users\Admin\AppData\Local\Temp\3885.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\38F2.tmp"C:\Users\Admin\AppData\Local\Temp\38F2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\396F.tmp"C:\Users\Admin\AppData\Local\Temp\396F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\39EC.tmp"C:\Users\Admin\AppData\Local\Temp\39EC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\3A4A.tmp"C:\Users\Admin\AppData\Local\Temp\3A4A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3AB7.tmp"C:\Users\Admin\AppData\Local\Temp\3AB7.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\3B05.tmp"C:\Users\Admin\AppData\Local\Temp\3B05.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\3B53.tmp"C:\Users\Admin\AppData\Local\Temp\3B53.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\3BC1.tmp"C:\Users\Admin\AppData\Local\Temp\3BC1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\3C1E.tmp"C:\Users\Admin\AppData\Local\Temp\3C1E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3C8C.tmp"C:\Users\Admin\AppData\Local\Temp\3C8C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\3CEA.tmp"C:\Users\Admin\AppData\Local\Temp\3CEA.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3D57.tmp"C:\Users\Admin\AppData\Local\Temp\3D57.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3DB5.tmp"C:\Users\Admin\AppData\Local\Temp\3DB5.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3E03.tmp"C:\Users\Admin\AppData\Local\Temp\3E03.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\3E70.tmp"C:\Users\Admin\AppData\Local\Temp\3E70.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\3ECE.tmp"C:\Users\Admin\AppData\Local\Temp\3ECE.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\3F2C.tmp"C:\Users\Admin\AppData\Local\Temp\3F2C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\3F89.tmp"C:\Users\Admin\AppData\Local\Temp\3F89.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\4035.tmp"C:\Users\Admin\AppData\Local\Temp\4035.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\40A3.tmp"C:\Users\Admin\AppData\Local\Temp\40A3.tmp"23⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\4100.tmp"C:\Users\Admin\AppData\Local\Temp\4100.tmp"24⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\415E.tmp"C:\Users\Admin\AppData\Local\Temp\415E.tmp"25⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\41BC.tmp"C:\Users\Admin\AppData\Local\Temp\41BC.tmp"26⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\4229.tmp"C:\Users\Admin\AppData\Local\Temp\4229.tmp"27⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\4287.tmp"C:\Users\Admin\AppData\Local\Temp\4287.tmp"28⤵
- Executes dropped EXE
PID:988 -
C:\Users\Admin\AppData\Local\Temp\42E5.tmp"C:\Users\Admin\AppData\Local\Temp\42E5.tmp"29⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\4352.tmp"C:\Users\Admin\AppData\Local\Temp\4352.tmp"30⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\43B0.tmp"C:\Users\Admin\AppData\Local\Temp\43B0.tmp"31⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\441D.tmp"C:\Users\Admin\AppData\Local\Temp\441D.tmp"32⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\448B.tmp"C:\Users\Admin\AppData\Local\Temp\448B.tmp"33⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\44F8.tmp"C:\Users\Admin\AppData\Local\Temp\44F8.tmp"34⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\4556.tmp"C:\Users\Admin\AppData\Local\Temp\4556.tmp"35⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\45A4.tmp"C:\Users\Admin\AppData\Local\Temp\45A4.tmp"36⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\4602.tmp"C:\Users\Admin\AppData\Local\Temp\4602.tmp"37⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\465F.tmp"C:\Users\Admin\AppData\Local\Temp\465F.tmp"38⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\46BD.tmp"C:\Users\Admin\AppData\Local\Temp\46BD.tmp"39⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\470B.tmp"C:\Users\Admin\AppData\Local\Temp\470B.tmp"40⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\4769.tmp"C:\Users\Admin\AppData\Local\Temp\4769.tmp"41⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\47B7.tmp"C:\Users\Admin\AppData\Local\Temp\47B7.tmp"42⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\4805.tmp"C:\Users\Admin\AppData\Local\Temp\4805.tmp"43⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\4863.tmp"C:\Users\Admin\AppData\Local\Temp\4863.tmp"44⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\48C1.tmp"C:\Users\Admin\AppData\Local\Temp\48C1.tmp"45⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\490F.tmp"C:\Users\Admin\AppData\Local\Temp\490F.tmp"46⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\495D.tmp"C:\Users\Admin\AppData\Local\Temp\495D.tmp"47⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\49BB.tmp"C:\Users\Admin\AppData\Local\Temp\49BB.tmp"48⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\4A19.tmp"C:\Users\Admin\AppData\Local\Temp\4A19.tmp"49⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\4A76.tmp"C:\Users\Admin\AppData\Local\Temp\4A76.tmp"50⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\4AC4.tmp"C:\Users\Admin\AppData\Local\Temp\4AC4.tmp"51⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\4B13.tmp"C:\Users\Admin\AppData\Local\Temp\4B13.tmp"52⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\4B61.tmp"C:\Users\Admin\AppData\Local\Temp\4B61.tmp"53⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"54⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"55⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"56⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\4CB8.tmp"C:\Users\Admin\AppData\Local\Temp\4CB8.tmp"57⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\4D07.tmp"C:\Users\Admin\AppData\Local\Temp\4D07.tmp"58⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\4D64.tmp"C:\Users\Admin\AppData\Local\Temp\4D64.tmp"59⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"60⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\4E10.tmp"C:\Users\Admin\AppData\Local\Temp\4E10.tmp"61⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\4E5E.tmp"C:\Users\Admin\AppData\Local\Temp\4E5E.tmp"62⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"63⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"64⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"65⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"66⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"67⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"68⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"69⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"70⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"71⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"72⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"73⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\5246.tmp"C:\Users\Admin\AppData\Local\Temp\5246.tmp"74⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\5294.tmp"C:\Users\Admin\AppData\Local\Temp\5294.tmp"75⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"76⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\5340.tmp"C:\Users\Admin\AppData\Local\Temp\5340.tmp"77⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"78⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"79⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"80⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\5488.tmp"C:\Users\Admin\AppData\Local\Temp\5488.tmp"81⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\54D7.tmp"C:\Users\Admin\AppData\Local\Temp\54D7.tmp"82⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\5525.tmp"C:\Users\Admin\AppData\Local\Temp\5525.tmp"83⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\5573.tmp"C:\Users\Admin\AppData\Local\Temp\5573.tmp"84⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\55C1.tmp"C:\Users\Admin\AppData\Local\Temp\55C1.tmp"85⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\560F.tmp"C:\Users\Admin\AppData\Local\Temp\560F.tmp"86⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\566D.tmp"C:\Users\Admin\AppData\Local\Temp\566D.tmp"87⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\56BB.tmp"C:\Users\Admin\AppData\Local\Temp\56BB.tmp"88⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"89⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"90⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"91⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"92⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\5842.tmp"C:\Users\Admin\AppData\Local\Temp\5842.tmp"93⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\5890.tmp"C:\Users\Admin\AppData\Local\Temp\5890.tmp"94⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\58DE.tmp"C:\Users\Admin\AppData\Local\Temp\58DE.tmp"95⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"96⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\598A.tmp"C:\Users\Admin\AppData\Local\Temp\598A.tmp"97⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\59D8.tmp"C:\Users\Admin\AppData\Local\Temp\59D8.tmp"98⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\5A26.tmp"C:\Users\Admin\AppData\Local\Temp\5A26.tmp"99⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\5A74.tmp"C:\Users\Admin\AppData\Local\Temp\5A74.tmp"100⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\5AC2.tmp"C:\Users\Admin\AppData\Local\Temp\5AC2.tmp"101⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\5B10.tmp"C:\Users\Admin\AppData\Local\Temp\5B10.tmp"102⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"103⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"104⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"105⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\5C49.tmp"C:\Users\Admin\AppData\Local\Temp\5C49.tmp"106⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"107⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"108⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\5D33.tmp"C:\Users\Admin\AppData\Local\Temp\5D33.tmp"109⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\5D81.tmp"C:\Users\Admin\AppData\Local\Temp\5D81.tmp"110⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"111⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\5E1E.tmp"C:\Users\Admin\AppData\Local\Temp\5E1E.tmp"112⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"113⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\5EC9.tmp"C:\Users\Admin\AppData\Local\Temp\5EC9.tmp"114⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\5F18.tmp"C:\Users\Admin\AppData\Local\Temp\5F18.tmp"115⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\5F66.tmp"C:\Users\Admin\AppData\Local\Temp\5F66.tmp"116⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\5FB4.tmp"C:\Users\Admin\AppData\Local\Temp\5FB4.tmp"117⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6002.tmp"C:\Users\Admin\AppData\Local\Temp\6002.tmp"118⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\6050.tmp"C:\Users\Admin\AppData\Local\Temp\6050.tmp"119⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\609E.tmp"C:\Users\Admin\AppData\Local\Temp\609E.tmp"120⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\60EC.tmp"C:\Users\Admin\AppData\Local\Temp\60EC.tmp"121⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\613A.tmp"C:\Users\Admin\AppData\Local\Temp\613A.tmp"122⤵PID:4808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-