Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 10:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe
-
Size
488KB
-
MD5
217a02331e3bd240166f9056eb44bf10
-
SHA1
ec5765518a45e1c13828536e6d30b6ac75a6ea6b
-
SHA256
49d3e5b45b97dbf0189af43eb6ddb3b9779470484599223cfea1b31cf5f834df
-
SHA512
c0c75371796e6ef13fdf843d937bd235f33b6819b2152cf56650d187d12f790960efc5cf15a275a36d4555d3eabad3e6d963b2cb9f9160d9334d194c4b600126
-
SSDEEP
12288:/U5rCOTeiD3IgM2JnsiwFui52HTJVv67FNZ:/UQOJD/MAQui52H1BUN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2264 517B.tmp 2192 51F8.tmp 3148 5294.tmp 116 5350.tmp 1268 53FC.tmp 1364 5488.tmp 2920 5563.tmp 5104 55FF.tmp 4852 56CB.tmp 2604 5767.tmp 4800 5813.tmp 1988 58BF.tmp 848 59B9.tmp 4936 5AB3.tmp 3404 5B6E.tmp 4984 5BEB.tmp 3708 5CA7.tmp 2528 5D43.tmp 1144 5E0E.tmp 1456 5EC9.tmp 1376 5F85.tmp 2784 6021.tmp 4924 60EC.tmp 2788 61A8.tmp 5040 6283.tmp 4324 633E.tmp 3700 63EA.tmp 4740 64B5.tmp 1804 6590.tmp 4804 666B.tmp 2392 6736.tmp 1164 685F.tmp 4916 6939.tmp 2616 69C6.tmp 3312 6A53.tmp 2308 6AFE.tmp 1560 6B6C.tmp 4316 6BF8.tmp 4252 6C66.tmp 4640 6CE3.tmp 4392 6D50.tmp 1160 6DEC.tmp 1812 6E5A.tmp 2932 6EF6.tmp 3184 6F83.tmp 2908 701F.tmp 5112 709C.tmp 5088 7109.tmp 116 7196.tmp 1572 7203.tmp 4844 72A0.tmp 3820 732C.tmp 3564 738A.tmp 1364 73F7.tmp 3696 7474.tmp 4048 7501.tmp 3448 756E.tmp 4296 75EB.tmp 1132 7678.tmp 2604 7705.tmp 4800 7772.tmp 4292 77D0.tmp 5064 785C.tmp 848 78E9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 2264 636 2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe 85 PID 636 wrote to memory of 2264 636 2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe 85 PID 636 wrote to memory of 2264 636 2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe 85 PID 2264 wrote to memory of 2192 2264 517B.tmp 86 PID 2264 wrote to memory of 2192 2264 517B.tmp 86 PID 2264 wrote to memory of 2192 2264 517B.tmp 86 PID 2192 wrote to memory of 3148 2192 51F8.tmp 88 PID 2192 wrote to memory of 3148 2192 51F8.tmp 88 PID 2192 wrote to memory of 3148 2192 51F8.tmp 88 PID 3148 wrote to memory of 116 3148 5294.tmp 90 PID 3148 wrote to memory of 116 3148 5294.tmp 90 PID 3148 wrote to memory of 116 3148 5294.tmp 90 PID 116 wrote to memory of 1268 116 5350.tmp 91 PID 116 wrote to memory of 1268 116 5350.tmp 91 PID 116 wrote to memory of 1268 116 5350.tmp 91 PID 1268 wrote to memory of 1364 1268 53FC.tmp 92 PID 1268 wrote to memory of 1364 1268 53FC.tmp 92 PID 1268 wrote to memory of 1364 1268 53FC.tmp 92 PID 1364 wrote to memory of 2920 1364 5488.tmp 94 PID 1364 wrote to memory of 2920 1364 5488.tmp 94 PID 1364 wrote to memory of 2920 1364 5488.tmp 94 PID 2920 wrote to memory of 5104 2920 5563.tmp 95 PID 2920 wrote to memory of 5104 2920 5563.tmp 95 PID 2920 wrote to memory of 5104 2920 5563.tmp 95 PID 5104 wrote to memory of 4852 5104 55FF.tmp 96 PID 5104 wrote to memory of 4852 5104 55FF.tmp 96 PID 5104 wrote to memory of 4852 5104 55FF.tmp 96 PID 4852 wrote to memory of 2604 4852 56CB.tmp 97 PID 4852 wrote to memory of 2604 4852 56CB.tmp 97 PID 4852 wrote to memory of 2604 4852 56CB.tmp 97 PID 2604 wrote to memory of 4800 2604 5767.tmp 98 PID 2604 wrote to memory of 4800 2604 5767.tmp 98 PID 2604 wrote to memory of 4800 2604 5767.tmp 98 PID 4800 wrote to memory of 1988 4800 5813.tmp 99 PID 4800 wrote to memory of 1988 4800 5813.tmp 99 PID 4800 wrote to memory of 1988 4800 5813.tmp 99 PID 1988 wrote to memory of 848 1988 58BF.tmp 100 PID 1988 wrote to memory of 848 1988 58BF.tmp 100 PID 1988 wrote to memory of 848 1988 58BF.tmp 100 PID 848 wrote to memory of 4936 848 59B9.tmp 101 PID 848 wrote to memory of 4936 848 59B9.tmp 101 PID 848 wrote to memory of 4936 848 59B9.tmp 101 PID 4936 wrote to memory of 3404 4936 5AB3.tmp 103 PID 4936 wrote to memory of 3404 4936 5AB3.tmp 103 PID 4936 wrote to memory of 3404 4936 5AB3.tmp 103 PID 3404 wrote to memory of 4984 3404 5B6E.tmp 104 PID 3404 wrote to memory of 4984 3404 5B6E.tmp 104 PID 3404 wrote to memory of 4984 3404 5B6E.tmp 104 PID 4984 wrote to memory of 3708 4984 5BEB.tmp 105 PID 4984 wrote to memory of 3708 4984 5BEB.tmp 105 PID 4984 wrote to memory of 3708 4984 5BEB.tmp 105 PID 3708 wrote to memory of 2528 3708 5CA7.tmp 107 PID 3708 wrote to memory of 2528 3708 5CA7.tmp 107 PID 3708 wrote to memory of 2528 3708 5CA7.tmp 107 PID 2528 wrote to memory of 1144 2528 5D43.tmp 108 PID 2528 wrote to memory of 1144 2528 5D43.tmp 108 PID 2528 wrote to memory of 1144 2528 5D43.tmp 108 PID 1144 wrote to memory of 1456 1144 5E0E.tmp 109 PID 1144 wrote to memory of 1456 1144 5E0E.tmp 109 PID 1144 wrote to memory of 1456 1144 5E0E.tmp 109 PID 1456 wrote to memory of 1376 1456 5EC9.tmp 110 PID 1456 wrote to memory of 1376 1456 5EC9.tmp 110 PID 1456 wrote to memory of 1376 1456 5EC9.tmp 110 PID 1376 wrote to memory of 2784 1376 5F85.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_217a02331e3bd240166f9056eb44bf10_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\517B.tmp"C:\Users\Admin\AppData\Local\Temp\517B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\5294.tmp"C:\Users\Admin\AppData\Local\Temp\5294.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\53FC.tmp"C:\Users\Admin\AppData\Local\Temp\53FC.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\5488.tmp"C:\Users\Admin\AppData\Local\Temp\5488.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\56CB.tmp"C:\Users\Admin\AppData\Local\Temp\56CB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\5813.tmp"C:\Users\Admin\AppData\Local\Temp\5813.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\58BF.tmp"C:\Users\Admin\AppData\Local\Temp\58BF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\59B9.tmp"C:\Users\Admin\AppData\Local\Temp\59B9.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\5CA7.tmp"C:\Users\Admin\AppData\Local\Temp\5CA7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\5D43.tmp"C:\Users\Admin\AppData\Local\Temp\5D43.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\5EC9.tmp"C:\Users\Admin\AppData\Local\Temp\5EC9.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"23⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\60EC.tmp"C:\Users\Admin\AppData\Local\Temp\60EC.tmp"24⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\61A8.tmp"C:\Users\Admin\AppData\Local\Temp\61A8.tmp"25⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"26⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"27⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\63EA.tmp"C:\Users\Admin\AppData\Local\Temp\63EA.tmp"28⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\64B5.tmp"C:\Users\Admin\AppData\Local\Temp\64B5.tmp"29⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\6590.tmp"C:\Users\Admin\AppData\Local\Temp\6590.tmp"30⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"31⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"32⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"33⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\6939.tmp"C:\Users\Admin\AppData\Local\Temp\6939.tmp"34⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\69C6.tmp"C:\Users\Admin\AppData\Local\Temp\69C6.tmp"35⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\6A53.tmp"C:\Users\Admin\AppData\Local\Temp\6A53.tmp"36⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"37⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"38⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"39⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\6C66.tmp"C:\Users\Admin\AppData\Local\Temp\6C66.tmp"40⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"41⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"42⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"43⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"44⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"45⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\6F83.tmp"C:\Users\Admin\AppData\Local\Temp\6F83.tmp"46⤵
- Executes dropped EXE
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"47⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\709C.tmp"C:\Users\Admin\AppData\Local\Temp\709C.tmp"48⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"49⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\7196.tmp"C:\Users\Admin\AppData\Local\Temp\7196.tmp"50⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\7203.tmp"C:\Users\Admin\AppData\Local\Temp\7203.tmp"51⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\72A0.tmp"C:\Users\Admin\AppData\Local\Temp\72A0.tmp"52⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\732C.tmp"C:\Users\Admin\AppData\Local\Temp\732C.tmp"53⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"54⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\73F7.tmp"C:\Users\Admin\AppData\Local\Temp\73F7.tmp"55⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\7474.tmp"C:\Users\Admin\AppData\Local\Temp\7474.tmp"56⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\7501.tmp"C:\Users\Admin\AppData\Local\Temp\7501.tmp"57⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\756E.tmp"C:\Users\Admin\AppData\Local\Temp\756E.tmp"58⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"59⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"60⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\7705.tmp"C:\Users\Admin\AppData\Local\Temp\7705.tmp"61⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\7772.tmp"C:\Users\Admin\AppData\Local\Temp\7772.tmp"62⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\77D0.tmp"C:\Users\Admin\AppData\Local\Temp\77D0.tmp"63⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\785C.tmp"C:\Users\Admin\AppData\Local\Temp\785C.tmp"64⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\78E9.tmp"C:\Users\Admin\AppData\Local\Temp\78E9.tmp"65⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\7966.tmp"C:\Users\Admin\AppData\Local\Temp\7966.tmp"66⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\79F3.tmp"C:\Users\Admin\AppData\Local\Temp\79F3.tmp"67⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\7A70.tmp"C:\Users\Admin\AppData\Local\Temp\7A70.tmp"68⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"69⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"70⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\7C15.tmp"C:\Users\Admin\AppData\Local\Temp\7C15.tmp"71⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\7C92.tmp"C:\Users\Admin\AppData\Local\Temp\7C92.tmp"72⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\7D00.tmp"C:\Users\Admin\AppData\Local\Temp\7D00.tmp"73⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"74⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\7E38.tmp"C:\Users\Admin\AppData\Local\Temp\7E38.tmp"75⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"76⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"77⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"78⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\807A.tmp"C:\Users\Admin\AppData\Local\Temp\807A.tmp"79⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"80⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"81⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\8201.tmp"C:\Users\Admin\AppData\Local\Temp\8201.tmp"82⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"83⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"84⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\83A7.tmp"C:\Users\Admin\AppData\Local\Temp\83A7.tmp"85⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\8443.tmp"C:\Users\Admin\AppData\Local\Temp\8443.tmp"86⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\84D0.tmp"C:\Users\Admin\AppData\Local\Temp\84D0.tmp"87⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\853D.tmp"C:\Users\Admin\AppData\Local\Temp\853D.tmp"88⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\85AB.tmp"C:\Users\Admin\AppData\Local\Temp\85AB.tmp"89⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"90⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\8685.tmp"C:\Users\Admin\AppData\Local\Temp\8685.tmp"91⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\8712.tmp"C:\Users\Admin\AppData\Local\Temp\8712.tmp"92⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"93⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\881C.tmp"C:\Users\Admin\AppData\Local\Temp\881C.tmp"94⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\8899.tmp"C:\Users\Admin\AppData\Local\Temp\8899.tmp"95⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"96⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"97⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\8A7D.tmp"C:\Users\Admin\AppData\Local\Temp\8A7D.tmp"98⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"99⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\8B87.tmp"C:\Users\Admin\AppData\Local\Temp\8B87.tmp"100⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"101⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\8C52.tmp"C:\Users\Admin\AppData\Local\Temp\8C52.tmp"102⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"103⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"104⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"105⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\8E65.tmp"C:\Users\Admin\AppData\Local\Temp\8E65.tmp"106⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"107⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"108⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"109⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\9088.tmp"C:\Users\Admin\AppData\Local\Temp\9088.tmp"110⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\9114.tmp"C:\Users\Admin\AppData\Local\Temp\9114.tmp"111⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\91A1.tmp"C:\Users\Admin\AppData\Local\Temp\91A1.tmp"112⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\921E.tmp"C:\Users\Admin\AppData\Local\Temp\921E.tmp"113⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\92AB.tmp"C:\Users\Admin\AppData\Local\Temp\92AB.tmp"114⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\9328.tmp"C:\Users\Admin\AppData\Local\Temp\9328.tmp"115⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\93B4.tmp"C:\Users\Admin\AppData\Local\Temp\93B4.tmp"116⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\9441.tmp"C:\Users\Admin\AppData\Local\Temp\9441.tmp"117⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\94BE.tmp"C:\Users\Admin\AppData\Local\Temp\94BE.tmp"118⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\952B.tmp"C:\Users\Admin\AppData\Local\Temp\952B.tmp"119⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\9599.tmp"C:\Users\Admin\AppData\Local\Temp\9599.tmp"120⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\9635.tmp"C:\Users\Admin\AppData\Local\Temp\9635.tmp"121⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\96B2.tmp"C:\Users\Admin\AppData\Local\Temp\96B2.tmp"122⤵PID:4912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-