Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe
-
Size
486KB
-
MD5
92611ea41a9e03b8b196f369f2825441
-
SHA1
fa435a2dc79db258891193e6d333e38cbdacd4eb
-
SHA256
1c6d37c8611a91e3e41e0f370c7337cbcbd7985806daf1c4f663526552107fa6
-
SHA512
1b7810e96c1fef0f845224a18899a96e3fad2d488d310c1033c8103c20820b28a38e52f52dc37129371a9ad7d64c6e156e47a64ad414709a3196b7bd43e594db
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD79kSeqOTwQMee3JR0XXung0HSVp4TuVryDsHT:UU5rCOTeiD6sOT9Mee3uXcmV2TuQINZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2344 F906.tmp 2968 FADB.tmp 4496 FBA6.tmp 1660 FC90.tmp 5104 FD6B.tmp 3340 FE26.tmp 4632 FFEB.tmp 4952 105.tmp 4460 1EF.tmp 2496 2D9.tmp 1188 366.tmp 4608 3E3.tmp 3700 47F.tmp 1160 4ED.tmp 2916 56A.tmp 4080 72F.tmp 4024 79C.tmp 3420 887.tmp 1724 8F4.tmp 1440 B26.tmp 4444 BB3.tmp 4572 C20.tmp 1824 CBD.tmp 3428 D59.tmp 3160 E14.tmp 4000 EB1.tmp 3656 F5D.tmp 3940 1028.tmp 2160 10D4.tmp 2520 120C.tmp 1348 12D7.tmp 4112 1364.tmp 4684 1400.tmp 2120 14AC.tmp 4544 1567.tmp 4912 15F4.tmp 1344 1681.tmp 2932 170D.tmp 4904 177B.tmp 1204 17E8.tmp 3552 1855.tmp 2172 18E2.tmp 4660 195F.tmp 3980 1A49.tmp 4004 1AC6.tmp 1548 1B72.tmp 1848 1C6C.tmp 4580 1D66.tmp 1208 1DC4.tmp 4924 1E31.tmp 5108 1E9F.tmp 1492 1F0C.tmp 884 1F99.tmp 4288 1FF7.tmp 4160 2083.tmp 4608 20F1.tmp 3700 219C.tmp 2280 220A.tmp 3220 22C5.tmp 2940 2323.tmp 1656 23A0.tmp 4080 240D.tmp 2292 248A.tmp 2316 2507.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4248 wrote to memory of 2344 4248 2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe 91 PID 4248 wrote to memory of 2344 4248 2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe 91 PID 4248 wrote to memory of 2344 4248 2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe 91 PID 2344 wrote to memory of 2968 2344 F906.tmp 92 PID 2344 wrote to memory of 2968 2344 F906.tmp 92 PID 2344 wrote to memory of 2968 2344 F906.tmp 92 PID 2968 wrote to memory of 4496 2968 FADB.tmp 93 PID 2968 wrote to memory of 4496 2968 FADB.tmp 93 PID 2968 wrote to memory of 4496 2968 FADB.tmp 93 PID 4496 wrote to memory of 1660 4496 FBA6.tmp 94 PID 4496 wrote to memory of 1660 4496 FBA6.tmp 94 PID 4496 wrote to memory of 1660 4496 FBA6.tmp 94 PID 1660 wrote to memory of 5104 1660 FC90.tmp 95 PID 1660 wrote to memory of 5104 1660 FC90.tmp 95 PID 1660 wrote to memory of 5104 1660 FC90.tmp 95 PID 5104 wrote to memory of 3340 5104 FD6B.tmp 96 PID 5104 wrote to memory of 3340 5104 FD6B.tmp 96 PID 5104 wrote to memory of 3340 5104 FD6B.tmp 96 PID 3340 wrote to memory of 4632 3340 FE26.tmp 97 PID 3340 wrote to memory of 4632 3340 FE26.tmp 97 PID 3340 wrote to memory of 4632 3340 FE26.tmp 97 PID 4632 wrote to memory of 4952 4632 FFEB.tmp 98 PID 4632 wrote to memory of 4952 4632 FFEB.tmp 98 PID 4632 wrote to memory of 4952 4632 FFEB.tmp 98 PID 4952 wrote to memory of 4460 4952 105.tmp 99 PID 4952 wrote to memory of 4460 4952 105.tmp 99 PID 4952 wrote to memory of 4460 4952 105.tmp 99 PID 4460 wrote to memory of 2496 4460 1EF.tmp 100 PID 4460 wrote to memory of 2496 4460 1EF.tmp 100 PID 4460 wrote to memory of 2496 4460 1EF.tmp 100 PID 2496 wrote to memory of 1188 2496 2D9.tmp 101 PID 2496 wrote to memory of 1188 2496 2D9.tmp 101 PID 2496 wrote to memory of 1188 2496 2D9.tmp 101 PID 1188 wrote to memory of 4608 1188 366.tmp 146 PID 1188 wrote to memory of 4608 1188 366.tmp 146 PID 1188 wrote to memory of 4608 1188 366.tmp 146 PID 4608 wrote to memory of 3700 4608 3E3.tmp 147 PID 4608 wrote to memory of 3700 4608 3E3.tmp 147 PID 4608 wrote to memory of 3700 4608 3E3.tmp 147 PID 3700 wrote to memory of 1160 3700 47F.tmp 104 PID 3700 wrote to memory of 1160 3700 47F.tmp 104 PID 3700 wrote to memory of 1160 3700 47F.tmp 104 PID 1160 wrote to memory of 2916 1160 4ED.tmp 105 PID 1160 wrote to memory of 2916 1160 4ED.tmp 105 PID 1160 wrote to memory of 2916 1160 4ED.tmp 105 PID 2916 wrote to memory of 4080 2916 56A.tmp 152 PID 2916 wrote to memory of 4080 2916 56A.tmp 152 PID 2916 wrote to memory of 4080 2916 56A.tmp 152 PID 4080 wrote to memory of 4024 4080 72F.tmp 107 PID 4080 wrote to memory of 4024 4080 72F.tmp 107 PID 4080 wrote to memory of 4024 4080 72F.tmp 107 PID 4024 wrote to memory of 3420 4024 79C.tmp 108 PID 4024 wrote to memory of 3420 4024 79C.tmp 108 PID 4024 wrote to memory of 3420 4024 79C.tmp 108 PID 3420 wrote to memory of 1724 3420 887.tmp 109 PID 3420 wrote to memory of 1724 3420 887.tmp 109 PID 3420 wrote to memory of 1724 3420 887.tmp 109 PID 1724 wrote to memory of 1440 1724 8F4.tmp 110 PID 1724 wrote to memory of 1440 1724 8F4.tmp 110 PID 1724 wrote to memory of 1440 1724 8F4.tmp 110 PID 1440 wrote to memory of 4444 1440 B26.tmp 111 PID 1440 wrote to memory of 4444 1440 B26.tmp 111 PID 1440 wrote to memory of 4444 1440 B26.tmp 111 PID 4444 wrote to memory of 4572 4444 BB3.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_92611ea41a9e03b8b196f369f2825441_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\FADB.tmp"C:\Users\Admin\AppData\Local\Temp\FADB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\FC90.tmp"C:\Users\Admin\AppData\Local\Temp\FC90.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\1EF.tmp"C:\Users\Admin\AppData\Local\Temp\1EF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\2D9.tmp"C:\Users\Admin\AppData\Local\Temp\2D9.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3E3.tmp"C:\Users\Admin\AppData\Local\Temp\3E3.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\79C.tmp"C:\Users\Admin\AppData\Local\Temp\79C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\887.tmp"C:\Users\Admin\AppData\Local\Temp\887.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\B26.tmp"C:\Users\Admin\AppData\Local\Temp\B26.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\C20.tmp"C:\Users\Admin\AppData\Local\Temp\C20.tmp"23⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"24⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"25⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"26⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp"27⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"28⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"29⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"30⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"31⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"32⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"33⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"34⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\14AC.tmp"C:\Users\Admin\AppData\Local\Temp\14AC.tmp"35⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\1567.tmp"C:\Users\Admin\AppData\Local\Temp\1567.tmp"36⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"37⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"38⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"39⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"40⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"41⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1855.tmp"C:\Users\Admin\AppData\Local\Temp\1855.tmp"42⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"43⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"44⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\1A49.tmp"C:\Users\Admin\AppData\Local\Temp\1A49.tmp"45⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"46⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"47⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"48⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\1D66.tmp"C:\Users\Admin\AppData\Local\Temp\1D66.tmp"49⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"50⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"51⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"52⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"53⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"54⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"55⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\2083.tmp"C:\Users\Admin\AppData\Local\Temp\2083.tmp"56⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\20F1.tmp"C:\Users\Admin\AppData\Local\Temp\20F1.tmp"57⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"58⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"59⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"60⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\2323.tmp"C:\Users\Admin\AppData\Local\Temp\2323.tmp"61⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\23A0.tmp"C:\Users\Admin\AppData\Local\Temp\23A0.tmp"62⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"63⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\248A.tmp"C:\Users\Admin\AppData\Local\Temp\248A.tmp"64⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"65⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\2575.tmp"C:\Users\Admin\AppData\Local\Temp\2575.tmp"66⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2601.tmp"C:\Users\Admin\AppData\Local\Temp\2601.tmp"67⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"68⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\27D6.tmp"C:\Users\Admin\AppData\Local\Temp\27D6.tmp"69⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\28FF.tmp"C:\Users\Admin\AppData\Local\Temp\28FF.tmp"70⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\29AB.tmp"C:\Users\Admin\AppData\Local\Temp\29AB.tmp"71⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\2A47.tmp"C:\Users\Admin\AppData\Local\Temp\2A47.tmp"72⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"73⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2B60.tmp"C:\Users\Admin\AppData\Local\Temp\2B60.tmp"74⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"75⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"76⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"77⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"78⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"79⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\30CF.tmp"C:\Users\Admin\AppData\Local\Temp\30CF.tmp"80⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"81⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"82⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\32B3.tmp"C:\Users\Admin\AppData\Local\Temp\32B3.tmp"83⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"84⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"85⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"86⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"87⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"88⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"89⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\3861.tmp"C:\Users\Admin\AppData\Local\Temp\3861.tmp"90⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"91⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"92⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\3A16.tmp"C:\Users\Admin\AppData\Local\Temp\3A16.tmp"93⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"94⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\3B10.tmp"C:\Users\Admin\AppData\Local\Temp\3B10.tmp"95⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"96⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"97⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3C97.tmp"C:\Users\Admin\AppData\Local\Temp\3C97.tmp"98⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"99⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"100⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"101⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"102⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"103⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"104⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\40DC.tmp"C:\Users\Admin\AppData\Local\Temp\40DC.tmp"105⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"106⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"107⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"108⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"109⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\43EA.tmp"C:\Users\Admin\AppData\Local\Temp\43EA.tmp"110⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\4467.tmp"C:\Users\Admin\AppData\Local\Temp\4467.tmp"111⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"112⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"113⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"114⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\4764.tmp"C:\Users\Admin\AppData\Local\Temp\4764.tmp"115⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\47D2.tmp"C:\Users\Admin\AppData\Local\Temp\47D2.tmp"116⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\489D.tmp"C:\Users\Admin\AppData\Local\Temp\489D.tmp"117⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"118⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\49D5.tmp"C:\Users\Admin\AppData\Local\Temp\49D5.tmp"119⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\4A52.tmp"C:\Users\Admin\AppData\Local\Temp\4A52.tmp"120⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"121⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"122⤵PID:5052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-