Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe
-
Size
536KB
-
MD5
2506495f977b7639941399b0fc6a9a0f
-
SHA1
08b38692de34b8ccf0cead5e2af4b64d53d3b97d
-
SHA256
4ee284bf616d7da69bc162d2d57a145dc54158185b43212c526802197b43b4a7
-
SHA512
307bbf797600fd1c4de03b939eba9a1dc6ff4974a21aa92c65a80d0c39fbead7c3563a339d8b6d4aa05b137e7b5241f4ef1a9a9a8e044c5496bd4ff7c5762371
-
SSDEEP
12288:wU5rCOTeiUa+4p8IlaYkmJFkkkAJyAiIGh0ciPIZxVJ0ZT9:wUQOJUexzHkkkOyAiIGmciPIRJ0ZT9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2872 F3F5.tmp 4176 F54D.tmp 2940 F676.tmp 1600 F731.tmp 4132 F82B.tmp 3632 F992.tmp 4572 FA4E.tmp 2324 FB19.tmp 1388 FC23.tmp 756 FD2C.tmp 3692 FF6E.tmp 4628 105.tmp 3096 191.tmp 4604 347.tmp 4432 412.tmp 4160 53B.tmp 1592 606.tmp 4080 693.tmp 2940 7CB.tmp 4964 848.tmp 2316 971.tmp 4444 A8A.tmp 2420 B26.tmp 1968 C7E.tmp 2396 D1A.tmp 2204 DF5.tmp 1572 EE0.tmp 1932 F9B.tmp 4936 1037.tmp 3736 10F3.tmp 4060 124B.tmp 2156 1373.tmp 4432 1410.tmp 4436 147D.tmp 2916 1519.tmp 2096 1587.tmp 4080 17AA.tmp 4608 1827.tmp 2480 18E2.tmp 3636 194F.tmp 232 19CC.tmp 2268 1B72.tmp 4132 1BE0.tmp 3288 1C5D.tmp 2716 1D66.tmp 2136 1E03.tmp 1376 1E8F.tmp 4304 2035.tmp 3328 20D1.tmp 3564 213F.tmp 4912 21CB.tmp 3736 2362.tmp 1008 243C.tmp 1148 24D9.tmp 5072 25D3.tmp 4044 268E.tmp 2128 27A7.tmp 2100 2824.tmp 1360 28B1.tmp 3408 294D.tmp 2888 29E9.tmp 2940 2A66.tmp 2856 2B51.tmp 1040 2BAF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2872 5072 2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe 96 PID 5072 wrote to memory of 2872 5072 2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe 96 PID 5072 wrote to memory of 2872 5072 2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe 96 PID 2872 wrote to memory of 4176 2872 F3F5.tmp 97 PID 2872 wrote to memory of 4176 2872 F3F5.tmp 97 PID 2872 wrote to memory of 4176 2872 F3F5.tmp 97 PID 4176 wrote to memory of 2940 4176 F54D.tmp 117 PID 4176 wrote to memory of 2940 4176 F54D.tmp 117 PID 4176 wrote to memory of 2940 4176 F54D.tmp 117 PID 2940 wrote to memory of 1600 2940 F676.tmp 100 PID 2940 wrote to memory of 1600 2940 F676.tmp 100 PID 2940 wrote to memory of 1600 2940 F676.tmp 100 PID 1600 wrote to memory of 4132 1600 F731.tmp 141 PID 1600 wrote to memory of 4132 1600 F731.tmp 141 PID 1600 wrote to memory of 4132 1600 F731.tmp 141 PID 4132 wrote to memory of 3632 4132 F82B.tmp 102 PID 4132 wrote to memory of 3632 4132 F82B.tmp 102 PID 4132 wrote to memory of 3632 4132 F82B.tmp 102 PID 3632 wrote to memory of 4572 3632 F992.tmp 104 PID 3632 wrote to memory of 4572 3632 F992.tmp 104 PID 3632 wrote to memory of 4572 3632 F992.tmp 104 PID 4572 wrote to memory of 2324 4572 FA4E.tmp 105 PID 4572 wrote to memory of 2324 4572 FA4E.tmp 105 PID 4572 wrote to memory of 2324 4572 FA4E.tmp 105 PID 2324 wrote to memory of 1388 2324 FB19.tmp 106 PID 2324 wrote to memory of 1388 2324 FB19.tmp 106 PID 2324 wrote to memory of 1388 2324 FB19.tmp 106 PID 1388 wrote to memory of 756 1388 FC23.tmp 107 PID 1388 wrote to memory of 756 1388 FC23.tmp 107 PID 1388 wrote to memory of 756 1388 FC23.tmp 107 PID 756 wrote to memory of 3692 756 FD2C.tmp 108 PID 756 wrote to memory of 3692 756 FD2C.tmp 108 PID 756 wrote to memory of 3692 756 FD2C.tmp 108 PID 3692 wrote to memory of 4628 3692 FF6E.tmp 110 PID 3692 wrote to memory of 4628 3692 FF6E.tmp 110 PID 3692 wrote to memory of 4628 3692 FF6E.tmp 110 PID 4628 wrote to memory of 3096 4628 105.tmp 111 PID 4628 wrote to memory of 3096 4628 105.tmp 111 PID 4628 wrote to memory of 3096 4628 105.tmp 111 PID 3096 wrote to memory of 4604 3096 191.tmp 112 PID 3096 wrote to memory of 4604 3096 191.tmp 112 PID 3096 wrote to memory of 4604 3096 191.tmp 112 PID 4604 wrote to memory of 4432 4604 347.tmp 131 PID 4604 wrote to memory of 4432 4604 347.tmp 131 PID 4604 wrote to memory of 4432 4604 347.tmp 131 PID 4432 wrote to memory of 4160 4432 412.tmp 114 PID 4432 wrote to memory of 4160 4432 412.tmp 114 PID 4432 wrote to memory of 4160 4432 412.tmp 114 PID 4160 wrote to memory of 1592 4160 53B.tmp 115 PID 4160 wrote to memory of 1592 4160 53B.tmp 115 PID 4160 wrote to memory of 1592 4160 53B.tmp 115 PID 1592 wrote to memory of 4080 1592 606.tmp 135 PID 1592 wrote to memory of 4080 1592 606.tmp 135 PID 1592 wrote to memory of 4080 1592 606.tmp 135 PID 4080 wrote to memory of 2940 4080 693.tmp 117 PID 4080 wrote to memory of 2940 4080 693.tmp 117 PID 4080 wrote to memory of 2940 4080 693.tmp 117 PID 2940 wrote to memory of 4964 2940 7CB.tmp 118 PID 2940 wrote to memory of 4964 2940 7CB.tmp 118 PID 2940 wrote to memory of 4964 2940 7CB.tmp 118 PID 4964 wrote to memory of 2316 4964 848.tmp 119 PID 4964 wrote to memory of 2316 4964 848.tmp 119 PID 4964 wrote to memory of 2316 4964 848.tmp 119 PID 2316 wrote to memory of 4444 2316 971.tmp 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_2506495f977b7639941399b0fc6a9a0f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\F82B.tmp"C:\Users\Admin\AppData\Local\Temp\F82B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\F992.tmp"C:\Users\Admin\AppData\Local\Temp\F992.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\FB19.tmp"C:\Users\Admin\AppData\Local\Temp\FB19.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\191.tmp"C:\Users\Admin\AppData\Local\Temp\191.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\347.tmp"C:\Users\Admin\AppData\Local\Temp\347.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\53B.tmp"C:\Users\Admin\AppData\Local\Temp\53B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\693.tmp"C:\Users\Admin\AppData\Local\Temp\693.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\7CB.tmp"C:\Users\Admin\AppData\Local\Temp\7CB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\971.tmp"C:\Users\Admin\AppData\Local\Temp\971.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\A8A.tmp"C:\Users\Admin\AppData\Local\Temp\A8A.tmp"23⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\B26.tmp"C:\Users\Admin\AppData\Local\Temp\B26.tmp"24⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"25⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"26⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"27⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"28⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"29⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"30⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"31⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\124B.tmp"C:\Users\Admin\AppData\Local\Temp\124B.tmp"32⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\1373.tmp"C:\Users\Admin\AppData\Local\Temp\1373.tmp"33⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"34⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"35⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"36⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\1587.tmp"C:\Users\Admin\AppData\Local\Temp\1587.tmp"37⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\17AA.tmp"C:\Users\Admin\AppData\Local\Temp\17AA.tmp"38⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"39⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"40⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\194F.tmp"C:\Users\Admin\AppData\Local\Temp\194F.tmp"41⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"42⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"43⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"44⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"45⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\1D66.tmp"C:\Users\Admin\AppData\Local\Temp\1D66.tmp"46⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"47⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"48⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"49⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"50⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"51⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\21CB.tmp"C:\Users\Admin\AppData\Local\Temp\21CB.tmp"52⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"53⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\243C.tmp"C:\Users\Admin\AppData\Local\Temp\243C.tmp"54⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"55⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\25D3.tmp"C:\Users\Admin\AppData\Local\Temp\25D3.tmp"56⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\268E.tmp"C:\Users\Admin\AppData\Local\Temp\268E.tmp"57⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\27A7.tmp"C:\Users\Admin\AppData\Local\Temp\27A7.tmp"58⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"59⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"60⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"61⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"62⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"63⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"64⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"65⤵
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"66⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"67⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"68⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"69⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"70⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"71⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"72⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\31B9.tmp"C:\Users\Admin\AppData\Local\Temp\31B9.tmp"73⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"74⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"75⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"76⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"77⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\3479.tmp"C:\Users\Admin\AppData\Local\Temp\3479.tmp"78⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\3515.tmp"C:\Users\Admin\AppData\Local\Temp\3515.tmp"79⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\36CA.tmp"C:\Users\Admin\AppData\Local\Temp\36CA.tmp"80⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"81⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\389F.tmp"C:\Users\Admin\AppData\Local\Temp\389F.tmp"82⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"83⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"84⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\3A16.tmp"C:\Users\Admin\AppData\Local\Temp\3A16.tmp"85⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3A93.tmp"C:\Users\Admin\AppData\Local\Temp\3A93.tmp"86⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"87⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3D04.tmp"C:\Users\Admin\AppData\Local\Temp\3D04.tmp"88⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"89⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"90⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"91⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3F27.tmp"C:\Users\Admin\AppData\Local\Temp\3F27.tmp"92⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\3F94.tmp"C:\Users\Admin\AppData\Local\Temp\3F94.tmp"93⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"94⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"95⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"96⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"97⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\43EA.tmp"C:\Users\Admin\AppData\Local\Temp\43EA.tmp"98⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"99⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\4570.tmp"C:\Users\Admin\AppData\Local\Temp\4570.tmp"100⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\45FD.tmp"C:\Users\Admin\AppData\Local\Temp\45FD.tmp"101⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"102⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"103⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\488D.tmp"C:\Users\Admin\AppData\Local\Temp\488D.tmp"104⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"105⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\49D5.tmp"C:\Users\Admin\AppData\Local\Temp\49D5.tmp"106⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"107⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"108⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"109⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\4C75.tmp"C:\Users\Admin\AppData\Local\Temp\4C75.tmp"110⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"111⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"112⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"113⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\4F25.tmp"C:\Users\Admin\AppData\Local\Temp\4F25.tmp"114⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"115⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"116⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\51F3.tmp"C:\Users\Admin\AppData\Local\Temp\51F3.tmp"117⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"118⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"119⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\5399.tmp"C:\Users\Admin\AppData\Local\Temp\5399.tmp"120⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\5493.tmp"C:\Users\Admin\AppData\Local\Temp\5493.tmp"121⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"122⤵PID:2316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-