Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 14:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe
-
Size
536KB
-
MD5
03c7ce1343a6961fabc3799439798d46
-
SHA1
d44f99a59e41ac20fd6ad4d3c2302fef999f2cf8
-
SHA256
6e1885cb7b5bb7f982525efb5d6abdbc87955322044a68498f193df6fe7480b4
-
SHA512
22102b3a09427bc7368046f876640f60866cf93d4d7be02aac6ba2c227dba5e51dcca04efed7a4a96b38c20698a372bf66219f4e06b9f934d278362f8d1040d1
-
SSDEEP
12288:wU5rCOTeiUAC6i+1Lj3oD9GtR+sGmIZxVJ0ZT9:wUQOJUACcLzowLlLIRJ0ZT9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3416 15C5.tmp 3604 176B.tmp 3584 195F.tmp 4532 19DC.tmp 1600 1B15.tmp 5068 1BD0.tmp 2380 1CDA.tmp 3644 1D66.tmp 2808 1E9F.tmp 3424 1F5A.tmp 4432 2083.tmp 4956 214E.tmp 1060 220A.tmp 4372 2323.tmp 3092 244C.tmp 2400 2565.tmp 1880 2650.tmp 2316 273A.tmp 4556 2844.tmp 3808 28D0.tmp 2800 29BB.tmp 3536 2B12.tmp 680 2BDD.tmp 1976 2D54.tmp 216 2EEB.tmp 4424 2FD5.tmp 3852 30DF.tmp 3156 319A.tmp 684 3311.tmp 2040 33AD.tmp 1192 3469.tmp 1984 35FF.tmp 4432 368C.tmp 4936 3728.tmp 3616 3880.tmp 2976 390C.tmp 2480 397A.tmp 1748 39E7.tmp 1852 3A64.tmp 1448 3B00.tmp 3592 3B7D.tmp 1772 3CD5.tmp 60 3D81.tmp 2432 3F46.tmp 680 3FC3.tmp 3992 405F.tmp 5012 410B.tmp 1620 41B7.tmp 3376 4273.tmp 2640 430F.tmp 4876 438C.tmp 2040 4419.tmp 3556 44C4.tmp 1192 4580.tmp 1932 45FD.tmp 4956 46C8.tmp 1452 4745.tmp 1060 47D2.tmp 4184 487E.tmp 2976 4939.tmp 1148 49C6.tmp 1880 4A62.tmp 1388 4ADF.tmp 2152 4BD9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3416 2252 2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe 93 PID 2252 wrote to memory of 3416 2252 2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe 93 PID 2252 wrote to memory of 3416 2252 2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe 93 PID 3416 wrote to memory of 3604 3416 15C5.tmp 94 PID 3416 wrote to memory of 3604 3416 15C5.tmp 94 PID 3416 wrote to memory of 3604 3416 15C5.tmp 94 PID 3604 wrote to memory of 3584 3604 176B.tmp 96 PID 3604 wrote to memory of 3584 3604 176B.tmp 96 PID 3604 wrote to memory of 3584 3604 176B.tmp 96 PID 3584 wrote to memory of 4532 3584 195F.tmp 97 PID 3584 wrote to memory of 4532 3584 195F.tmp 97 PID 3584 wrote to memory of 4532 3584 195F.tmp 97 PID 4532 wrote to memory of 1600 4532 19DC.tmp 98 PID 4532 wrote to memory of 1600 4532 19DC.tmp 98 PID 4532 wrote to memory of 1600 4532 19DC.tmp 98 PID 1600 wrote to memory of 5068 1600 1B15.tmp 99 PID 1600 wrote to memory of 5068 1600 1B15.tmp 99 PID 1600 wrote to memory of 5068 1600 1B15.tmp 99 PID 5068 wrote to memory of 2380 5068 1BD0.tmp 100 PID 5068 wrote to memory of 2380 5068 1BD0.tmp 100 PID 5068 wrote to memory of 2380 5068 1BD0.tmp 100 PID 2380 wrote to memory of 3644 2380 1CDA.tmp 101 PID 2380 wrote to memory of 3644 2380 1CDA.tmp 101 PID 2380 wrote to memory of 3644 2380 1CDA.tmp 101 PID 3644 wrote to memory of 2808 3644 1D66.tmp 102 PID 3644 wrote to memory of 2808 3644 1D66.tmp 102 PID 3644 wrote to memory of 2808 3644 1D66.tmp 102 PID 2808 wrote to memory of 3424 2808 1E9F.tmp 103 PID 2808 wrote to memory of 3424 2808 1E9F.tmp 103 PID 2808 wrote to memory of 3424 2808 1E9F.tmp 103 PID 3424 wrote to memory of 4432 3424 1F5A.tmp 129 PID 3424 wrote to memory of 4432 3424 1F5A.tmp 129 PID 3424 wrote to memory of 4432 3424 1F5A.tmp 129 PID 4432 wrote to memory of 4956 4432 2083.tmp 105 PID 4432 wrote to memory of 4956 4432 2083.tmp 105 PID 4432 wrote to memory of 4956 4432 2083.tmp 105 PID 4956 wrote to memory of 1060 4956 214E.tmp 106 PID 4956 wrote to memory of 1060 4956 214E.tmp 106 PID 4956 wrote to memory of 1060 4956 214E.tmp 106 PID 1060 wrote to memory of 4372 1060 220A.tmp 107 PID 1060 wrote to memory of 4372 1060 220A.tmp 107 PID 1060 wrote to memory of 4372 1060 220A.tmp 107 PID 4372 wrote to memory of 3092 4372 2323.tmp 108 PID 4372 wrote to memory of 3092 4372 2323.tmp 108 PID 4372 wrote to memory of 3092 4372 2323.tmp 108 PID 3092 wrote to memory of 2400 3092 244C.tmp 109 PID 3092 wrote to memory of 2400 3092 244C.tmp 109 PID 3092 wrote to memory of 2400 3092 244C.tmp 109 PID 2400 wrote to memory of 1880 2400 2565.tmp 110 PID 2400 wrote to memory of 1880 2400 2565.tmp 110 PID 2400 wrote to memory of 1880 2400 2565.tmp 110 PID 1880 wrote to memory of 2316 1880 2650.tmp 111 PID 1880 wrote to memory of 2316 1880 2650.tmp 111 PID 1880 wrote to memory of 2316 1880 2650.tmp 111 PID 2316 wrote to memory of 4556 2316 273A.tmp 112 PID 2316 wrote to memory of 4556 2316 273A.tmp 112 PID 2316 wrote to memory of 4556 2316 273A.tmp 112 PID 4556 wrote to memory of 3808 4556 2844.tmp 113 PID 4556 wrote to memory of 3808 4556 2844.tmp 113 PID 4556 wrote to memory of 3808 4556 2844.tmp 113 PID 3808 wrote to memory of 2800 3808 28D0.tmp 114 PID 3808 wrote to memory of 2800 3808 28D0.tmp 114 PID 3808 wrote to memory of 2800 3808 28D0.tmp 114 PID 2800 wrote to memory of 3536 2800 29BB.tmp 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_03c7ce1343a6961fabc3799439798d46_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\19DC.tmp"C:\Users\Admin\AppData\Local\Temp\19DC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\1D66.tmp"C:\Users\Admin\AppData\Local\Temp\1D66.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\2083.tmp"C:\Users\Admin\AppData\Local\Temp\2083.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\2323.tmp"C:\Users\Admin\AppData\Local\Temp\2323.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\2565.tmp"C:\Users\Admin\AppData\Local\Temp\2565.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\28D0.tmp"C:\Users\Admin\AppData\Local\Temp\28D0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\29BB.tmp"C:\Users\Admin\AppData\Local\Temp\29BB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"23⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"24⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"25⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"26⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"27⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"28⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"29⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"30⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"31⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"32⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"33⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"34⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"35⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"36⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"37⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\397A.tmp"C:\Users\Admin\AppData\Local\Temp\397A.tmp"38⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"39⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"40⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"41⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"42⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"43⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"44⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"45⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"46⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"47⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"48⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\410B.tmp"C:\Users\Admin\AppData\Local\Temp\410B.tmp"49⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"50⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\4273.tmp"C:\Users\Admin\AppData\Local\Temp\4273.tmp"51⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\430F.tmp"C:\Users\Admin\AppData\Local\Temp\430F.tmp"52⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\438C.tmp"C:\Users\Admin\AppData\Local\Temp\438C.tmp"53⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\4419.tmp"C:\Users\Admin\AppData\Local\Temp\4419.tmp"54⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\44C4.tmp"C:\Users\Admin\AppData\Local\Temp\44C4.tmp"55⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\4580.tmp"C:\Users\Admin\AppData\Local\Temp\4580.tmp"56⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\45FD.tmp"C:\Users\Admin\AppData\Local\Temp\45FD.tmp"57⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\46C8.tmp"C:\Users\Admin\AppData\Local\Temp\46C8.tmp"58⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\4745.tmp"C:\Users\Admin\AppData\Local\Temp\4745.tmp"59⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\47D2.tmp"C:\Users\Admin\AppData\Local\Temp\47D2.tmp"60⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"61⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\4939.tmp"C:\Users\Admin\AppData\Local\Temp\4939.tmp"62⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"63⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\4A62.tmp"C:\Users\Admin\AppData\Local\Temp\4A62.tmp"64⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\4ADF.tmp"C:\Users\Admin\AppData\Local\Temp\4ADF.tmp"65⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"66⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\4C75.tmp"C:\Users\Admin\AppData\Local\Temp\4C75.tmp"67⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"68⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"69⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"70⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"71⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"72⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"73⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\506D.tmp"C:\Users\Admin\AppData\Local\Temp\506D.tmp"74⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\5109.tmp"C:\Users\Admin\AppData\Local\Temp\5109.tmp"75⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\5186.tmp"C:\Users\Admin\AppData\Local\Temp\5186.tmp"76⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\52AF.tmp"C:\Users\Admin\AppData\Local\Temp\52AF.tmp"77⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\531C.tmp"C:\Users\Admin\AppData\Local\Temp\531C.tmp"78⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\538A.tmp"C:\Users\Admin\AppData\Local\Temp\538A.tmp"79⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"80⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\556E.tmp"C:\Users\Admin\AppData\Local\Temp\556E.tmp"81⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\55EB.tmp"C:\Users\Admin\AppData\Local\Temp\55EB.tmp"82⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\5687.tmp"C:\Users\Admin\AppData\Local\Temp\5687.tmp"83⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"84⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\583D.tmp"C:\Users\Admin\AppData\Local\Temp\583D.tmp"85⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\58C9.tmp"C:\Users\Admin\AppData\Local\Temp\58C9.tmp"86⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\5966.tmp"C:\Users\Admin\AppData\Local\Temp\5966.tmp"87⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"88⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"89⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"90⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"91⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"92⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\5F80.tmp"C:\Users\Admin\AppData\Local\Temp\5F80.tmp"93⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\600D.tmp"C:\Users\Admin\AppData\Local\Temp\600D.tmp"94⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"95⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\61A3.tmp"C:\Users\Admin\AppData\Local\Temp\61A3.tmp"96⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\6220.tmp"C:\Users\Admin\AppData\Local\Temp\6220.tmp"97⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"98⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"99⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\655C.tmp"C:\Users\Admin\AppData\Local\Temp\655C.tmp"100⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\6618.tmp"C:\Users\Admin\AppData\Local\Temp\6618.tmp"101⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\6695.tmp"C:\Users\Admin\AppData\Local\Temp\6695.tmp"102⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\67CD.tmp"C:\Users\Admin\AppData\Local\Temp\67CD.tmp"103⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"104⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\68E6.tmp"C:\Users\Admin\AppData\Local\Temp\68E6.tmp"105⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\69B2.tmp"C:\Users\Admin\AppData\Local\Temp\69B2.tmp"106⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\6A4E.tmp"C:\Users\Admin\AppData\Local\Temp\6A4E.tmp"107⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"108⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\6B96.tmp"C:\Users\Admin\AppData\Local\Temp\6B96.tmp"109⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"110⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\700B.tmp"C:\Users\Admin\AppData\Local\Temp\700B.tmp"111⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\7097.tmp"C:\Users\Admin\AppData\Local\Temp\7097.tmp"112⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\7124.tmp"C:\Users\Admin\AppData\Local\Temp\7124.tmp"113⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\71B0.tmp"C:\Users\Admin\AppData\Local\Temp\71B0.tmp"114⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\7366.tmp"C:\Users\Admin\AppData\Local\Temp\7366.tmp"115⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\73F3.tmp"C:\Users\Admin\AppData\Local\Temp\73F3.tmp"116⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\7460.tmp"C:\Users\Admin\AppData\Local\Temp\7460.tmp"117⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\750C.tmp"C:\Users\Admin\AppData\Local\Temp\750C.tmp"118⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\7579.tmp"C:\Users\Admin\AppData\Local\Temp\7579.tmp"119⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\75F6.tmp"C:\Users\Admin\AppData\Local\Temp\75F6.tmp"120⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\7673.tmp"C:\Users\Admin\AppData\Local\Temp\7673.tmp"121⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\77AC.tmp"C:\Users\Admin\AppData\Local\Temp\77AC.tmp"122⤵PID:4908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-