Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe
-
Size
520KB
-
MD5
f77c15ccdcf9b061b947fb8eef908ed5
-
SHA1
7e9a9609efa599e8047f48fe83556484e125fcfa
-
SHA256
906d47de367ff3c11db91b4f30f2a8463a742d61fee4dabcdd35405d1f87e989
-
SHA512
19a1fad9285b824f7b2b344c44257a3d77cefc8fb2db08501d64800a51cfb3d82f74bd032182214c40b95c0e4fd9eab1402b0c31f24722c9e62b45540ed77954
-
SSDEEP
12288:gj8fuxR21t5i8f6HdZug4v7w420IK9jenkRsXNZ:gj8fuK1GYWAgghq6sXN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1004 5AE1.tmp 1524 5B8D.tmp 5028 5C1A.tmp 408 5D14.tmp 4740 5E0E.tmp 3056 5ED9.tmp 4188 5F75.tmp 1288 6040.tmp 4916 60CD.tmp 3908 632E.tmp 3260 63DA.tmp 1104 6467.tmp 1772 6503.tmp 3236 65CE.tmp 3496 66C8.tmp 4456 6793.tmp 3164 6820.tmp 532 68DC.tmp 4600 6978.tmp 3480 6A24.tmp 1700 6AEF.tmp 3076 6B9B.tmp 2436 6C85.tmp 4424 6D60.tmp 1472 6DDD.tmp 2668 6E5A.tmp 2724 6F06.tmp 2892 6FB2.tmp 1108 70DA.tmp 1064 7177.tmp 1792 7242.tmp 4772 72EE.tmp 4376 736B.tmp 4808 7417.tmp 1460 7484.tmp 1480 7520.tmp 2920 759D.tmp 944 7639.tmp 4764 7697.tmp 4428 7714.tmp 4484 7791.tmp 3256 781E.tmp 2576 789B.tmp 844 7927.tmp 4704 79C4.tmp 4404 7A31.tmp 2240 7A9E.tmp 2164 7B2B.tmp 3332 7BD7.tmp 888 7C54.tmp 764 7CD1.tmp 4516 7D4E.tmp 2312 7DBB.tmp 4944 7E58.tmp 548 7ED5.tmp 4124 7F80.tmp 1820 7FFD.tmp 3488 809A.tmp 1956 8117.tmp 1624 81A3.tmp 3496 8220.tmp 4456 828E.tmp 3744 830B.tmp 4092 83A7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 1004 3976 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 92 PID 3976 wrote to memory of 1004 3976 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 92 PID 3976 wrote to memory of 1004 3976 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 92 PID 1004 wrote to memory of 1524 1004 5AE1.tmp 94 PID 1004 wrote to memory of 1524 1004 5AE1.tmp 94 PID 1004 wrote to memory of 1524 1004 5AE1.tmp 94 PID 1524 wrote to memory of 5028 1524 5B8D.tmp 95 PID 1524 wrote to memory of 5028 1524 5B8D.tmp 95 PID 1524 wrote to memory of 5028 1524 5B8D.tmp 95 PID 5028 wrote to memory of 408 5028 5C1A.tmp 96 PID 5028 wrote to memory of 408 5028 5C1A.tmp 96 PID 5028 wrote to memory of 408 5028 5C1A.tmp 96 PID 408 wrote to memory of 4740 408 5D14.tmp 97 PID 408 wrote to memory of 4740 408 5D14.tmp 97 PID 408 wrote to memory of 4740 408 5D14.tmp 97 PID 4740 wrote to memory of 3056 4740 5E0E.tmp 98 PID 4740 wrote to memory of 3056 4740 5E0E.tmp 98 PID 4740 wrote to memory of 3056 4740 5E0E.tmp 98 PID 3056 wrote to memory of 4188 3056 5ED9.tmp 99 PID 3056 wrote to memory of 4188 3056 5ED9.tmp 99 PID 3056 wrote to memory of 4188 3056 5ED9.tmp 99 PID 4188 wrote to memory of 1288 4188 5F75.tmp 100 PID 4188 wrote to memory of 1288 4188 5F75.tmp 100 PID 4188 wrote to memory of 1288 4188 5F75.tmp 100 PID 1288 wrote to memory of 4916 1288 6040.tmp 101 PID 1288 wrote to memory of 4916 1288 6040.tmp 101 PID 1288 wrote to memory of 4916 1288 6040.tmp 101 PID 4916 wrote to memory of 3908 4916 60CD.tmp 102 PID 4916 wrote to memory of 3908 4916 60CD.tmp 102 PID 4916 wrote to memory of 3908 4916 60CD.tmp 102 PID 3908 wrote to memory of 3260 3908 632E.tmp 103 PID 3908 wrote to memory of 3260 3908 632E.tmp 103 PID 3908 wrote to memory of 3260 3908 632E.tmp 103 PID 3260 wrote to memory of 1104 3260 63DA.tmp 104 PID 3260 wrote to memory of 1104 3260 63DA.tmp 104 PID 3260 wrote to memory of 1104 3260 63DA.tmp 104 PID 1104 wrote to memory of 1772 1104 6467.tmp 105 PID 1104 wrote to memory of 1772 1104 6467.tmp 105 PID 1104 wrote to memory of 1772 1104 6467.tmp 105 PID 1772 wrote to memory of 3236 1772 6503.tmp 106 PID 1772 wrote to memory of 3236 1772 6503.tmp 106 PID 1772 wrote to memory of 3236 1772 6503.tmp 106 PID 3236 wrote to memory of 3496 3236 65CE.tmp 107 PID 3236 wrote to memory of 3496 3236 65CE.tmp 107 PID 3236 wrote to memory of 3496 3236 65CE.tmp 107 PID 3496 wrote to memory of 4456 3496 66C8.tmp 108 PID 3496 wrote to memory of 4456 3496 66C8.tmp 108 PID 3496 wrote to memory of 4456 3496 66C8.tmp 108 PID 4456 wrote to memory of 3164 4456 6793.tmp 109 PID 4456 wrote to memory of 3164 4456 6793.tmp 109 PID 4456 wrote to memory of 3164 4456 6793.tmp 109 PID 3164 wrote to memory of 532 3164 6820.tmp 110 PID 3164 wrote to memory of 532 3164 6820.tmp 110 PID 3164 wrote to memory of 532 3164 6820.tmp 110 PID 532 wrote to memory of 4600 532 68DC.tmp 111 PID 532 wrote to memory of 4600 532 68DC.tmp 111 PID 532 wrote to memory of 4600 532 68DC.tmp 111 PID 4600 wrote to memory of 3480 4600 6978.tmp 112 PID 4600 wrote to memory of 3480 4600 6978.tmp 112 PID 4600 wrote to memory of 3480 4600 6978.tmp 112 PID 3480 wrote to memory of 1700 3480 6A24.tmp 113 PID 3480 wrote to memory of 1700 3480 6A24.tmp 113 PID 3480 wrote to memory of 1700 3480 6A24.tmp 113 PID 1700 wrote to memory of 3076 1700 6AEF.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\5D14.tmp"C:\Users\Admin\AppData\Local\Temp\5D14.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\5F75.tmp"C:\Users\Admin\AppData\Local\Temp\5F75.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\6040.tmp"C:\Users\Admin\AppData\Local\Temp\6040.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\60CD.tmp"C:\Users\Admin\AppData\Local\Temp\60CD.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\632E.tmp"C:\Users\Admin\AppData\Local\Temp\632E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\63DA.tmp"C:\Users\Admin\AppData\Local\Temp\63DA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\6467.tmp"C:\Users\Admin\AppData\Local\Temp\6467.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\65CE.tmp"C:\Users\Admin\AppData\Local\Temp\65CE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\66C8.tmp"C:\Users\Admin\AppData\Local\Temp\66C8.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\6793.tmp"C:\Users\Admin\AppData\Local\Temp\6793.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\6820.tmp"C:\Users\Admin\AppData\Local\Temp\6820.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\68DC.tmp"C:\Users\Admin\AppData\Local\Temp\68DC.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\6978.tmp"C:\Users\Admin\AppData\Local\Temp\6978.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"23⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\6C85.tmp"C:\Users\Admin\AppData\Local\Temp\6C85.tmp"24⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\6D60.tmp"C:\Users\Admin\AppData\Local\Temp\6D60.tmp"25⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"26⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"27⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\6F06.tmp"C:\Users\Admin\AppData\Local\Temp\6F06.tmp"28⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"29⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\70DA.tmp"C:\Users\Admin\AppData\Local\Temp\70DA.tmp"30⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"31⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\7242.tmp"C:\Users\Admin\AppData\Local\Temp\7242.tmp"32⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\72EE.tmp"C:\Users\Admin\AppData\Local\Temp\72EE.tmp"33⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\736B.tmp"C:\Users\Admin\AppData\Local\Temp\736B.tmp"34⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\7417.tmp"C:\Users\Admin\AppData\Local\Temp\7417.tmp"35⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"36⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\7520.tmp"C:\Users\Admin\AppData\Local\Temp\7520.tmp"37⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"38⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\7639.tmp"C:\Users\Admin\AppData\Local\Temp\7639.tmp"39⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\7697.tmp"C:\Users\Admin\AppData\Local\Temp\7697.tmp"40⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"41⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"42⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"43⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp"44⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\7927.tmp"C:\Users\Admin\AppData\Local\Temp\7927.tmp"45⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\79C4.tmp"C:\Users\Admin\AppData\Local\Temp\79C4.tmp"46⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\7A31.tmp"C:\Users\Admin\AppData\Local\Temp\7A31.tmp"47⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"48⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"49⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"50⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\7C54.tmp"C:\Users\Admin\AppData\Local\Temp\7C54.tmp"51⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"52⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\7D4E.tmp"C:\Users\Admin\AppData\Local\Temp\7D4E.tmp"53⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"54⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\7E58.tmp"C:\Users\Admin\AppData\Local\Temp\7E58.tmp"55⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"56⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\7F80.tmp"C:\Users\Admin\AppData\Local\Temp\7F80.tmp"57⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"58⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\809A.tmp"C:\Users\Admin\AppData\Local\Temp\809A.tmp"59⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\8117.tmp"C:\Users\Admin\AppData\Local\Temp\8117.tmp"60⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"61⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\8220.tmp"C:\Users\Admin\AppData\Local\Temp\8220.tmp"62⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"63⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"64⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\83A7.tmp"C:\Users\Admin\AppData\Local\Temp\83A7.tmp"65⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\8443.tmp"C:\Users\Admin\AppData\Local\Temp\8443.tmp"66⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\84C0.tmp"C:\Users\Admin\AppData\Local\Temp\84C0.tmp"67⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"68⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"69⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\8695.tmp"C:\Users\Admin\AppData\Local\Temp\8695.tmp"70⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\8722.tmp"C:\Users\Admin\AppData\Local\Temp\8722.tmp"71⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\877F.tmp"C:\Users\Admin\AppData\Local\Temp\877F.tmp"72⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\880C.tmp"C:\Users\Admin\AppData\Local\Temp\880C.tmp"73⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\8879.tmp"C:\Users\Admin\AppData\Local\Temp\8879.tmp"74⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\88F6.tmp"C:\Users\Admin\AppData\Local\Temp\88F6.tmp"75⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\8964.tmp"C:\Users\Admin\AppData\Local\Temp\8964.tmp"76⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"77⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"78⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\8ACB.tmp"C:\Users\Admin\AppData\Local\Temp\8ACB.tmp"79⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\8B29.tmp"C:\Users\Admin\AppData\Local\Temp\8B29.tmp"80⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\8BA6.tmp"C:\Users\Admin\AppData\Local\Temp\8BA6.tmp"81⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\8C13.tmp"C:\Users\Admin\AppData\Local\Temp\8C13.tmp"82⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"83⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\8DB9.tmp"C:\Users\Admin\AppData\Local\Temp\8DB9.tmp"84⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"85⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"86⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\8F20.tmp"C:\Users\Admin\AppData\Local\Temp\8F20.tmp"87⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\8F7E.tmp"C:\Users\Admin\AppData\Local\Temp\8F7E.tmp"88⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\9097.tmp"C:\Users\Admin\AppData\Local\Temp\9097.tmp"89⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\9105.tmp"C:\Users\Admin\AppData\Local\Temp\9105.tmp"90⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\9182.tmp"C:\Users\Admin\AppData\Local\Temp\9182.tmp"91⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\91EF.tmp"C:\Users\Admin\AppData\Local\Temp\91EF.tmp"92⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\925D.tmp"C:\Users\Admin\AppData\Local\Temp\925D.tmp"93⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\92CA.tmp"C:\Users\Admin\AppData\Local\Temp\92CA.tmp"94⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\9357.tmp"C:\Users\Admin\AppData\Local\Temp\9357.tmp"95⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\93F3.tmp"C:\Users\Admin\AppData\Local\Temp\93F3.tmp"96⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\9460.tmp"C:\Users\Admin\AppData\Local\Temp\9460.tmp"97⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"98⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\95C8.tmp"C:\Users\Admin\AppData\Local\Temp\95C8.tmp"99⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\9635.tmp"C:\Users\Admin\AppData\Local\Temp\9635.tmp"100⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\9693.tmp"C:\Users\Admin\AppData\Local\Temp\9693.tmp"101⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\9700.tmp"C:\Users\Admin\AppData\Local\Temp\9700.tmp"102⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\977D.tmp"C:\Users\Admin\AppData\Local\Temp\977D.tmp"103⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\97FA.tmp"C:\Users\Admin\AppData\Local\Temp\97FA.tmp"104⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\9887.tmp"C:\Users\Admin\AppData\Local\Temp\9887.tmp"105⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\9904.tmp"C:\Users\Admin\AppData\Local\Temp\9904.tmp"106⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\9990.tmp"C:\Users\Admin\AppData\Local\Temp\9990.tmp"107⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"108⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"109⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\9B36.tmp"C:\Users\Admin\AppData\Local\Temp\9B36.tmp"110⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\9BA4.tmp"C:\Users\Admin\AppData\Local\Temp\9BA4.tmp"111⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\9C21.tmp"C:\Users\Admin\AppData\Local\Temp\9C21.tmp"112⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"113⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"114⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"115⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\9E24.tmp"C:\Users\Admin\AppData\Local\Temp\9E24.tmp"116⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"117⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"118⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"119⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\A095.tmp"C:\Users\Admin\AppData\Local\Temp\A095.tmp"120⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"121⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"122⤵PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-