Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe
Resource
win10v2004-20240426-en
Errors
General
-
Target
2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe
-
Size
541KB
-
MD5
1495a5b8a8d6bdf81fe369fa9a37d612
-
SHA1
2d860cca88de5f3e2a7a7ba3320649c0db112924
-
SHA256
28b0f4155eda5483c5fff519dc26f77a7b15186576310532277bbcea8cc68694
-
SHA512
69b52f4c1864f7f68aa97e3babcc0df5b052d6ee9c8a79ffe2cf0a32bfd555204a58da699ef852be798a2bafa486264becc11033c4f0486cde75b07ac17e15ad
-
SSDEEP
12288:UU5rCOTeifvLVSjowcxrU1fGxsQErZa73ctO:UUQOJfvLVmcO1FQErU73ctO
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2636 515C.tmp 4440 51E9.tmp 1588 5275.tmp 3512 5331.tmp 4020 53AE.tmp 4144 545A.tmp 4648 54E6.tmp 4848 5582.tmp 4136 55FF.tmp 1500 565D.tmp 2312 5719.tmp 1432 57A5.tmp 3328 5822.tmp 2820 5890.tmp 1580 590D.tmp 3488 597A.tmp 4764 5A07.tmp 2904 5AA3.tmp 2748 5B20.tmp 5040 5B8D.tmp 3284 5BFB.tmp 5116 5C78.tmp 4628 5CD5.tmp 1444 5D62.tmp 1636 5DCF.tmp 3928 5E5C.tmp 2044 5EF8.tmp 2216 5F66.tmp 404 5FF2.tmp 3020 6060.tmp 3268 60BD.tmp 2580 614A.tmp 3416 61B7.tmp 4536 6225.tmp 4368 6273.tmp 2464 62D1.tmp 788 633E.tmp 3272 638C.tmp 3956 63DA.tmp 4452 6428.tmp 3260 6496.tmp 3796 6503.tmp 2572 6551.tmp 4296 659F.tmp 1768 660D.tmp 4860 666B.tmp 3444 66D8.tmp 4048 6736.tmp 776 67A3.tmp 4900 6801.tmp 1424 684F.tmp 4564 68AD.tmp 4516 690A.tmp 4612 6959.tmp 1724 69A7.tmp 4256 6A04.tmp 944 6A62.tmp 2636 6AB0.tmp 1452 6B0E.tmp 2948 6B6C.tmp 2452 6BCA.tmp 4364 6C37.tmp 1440 6C95.tmp 232 6CF2.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2636 2300 2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe 81 PID 2300 wrote to memory of 2636 2300 2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe 81 PID 2300 wrote to memory of 2636 2300 2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe 81 PID 2636 wrote to memory of 4440 2636 515C.tmp 83 PID 2636 wrote to memory of 4440 2636 515C.tmp 83 PID 2636 wrote to memory of 4440 2636 515C.tmp 83 PID 4440 wrote to memory of 1588 4440 51E9.tmp 85 PID 4440 wrote to memory of 1588 4440 51E9.tmp 85 PID 4440 wrote to memory of 1588 4440 51E9.tmp 85 PID 1588 wrote to memory of 3512 1588 5275.tmp 86 PID 1588 wrote to memory of 3512 1588 5275.tmp 86 PID 1588 wrote to memory of 3512 1588 5275.tmp 86 PID 3512 wrote to memory of 4020 3512 5331.tmp 87 PID 3512 wrote to memory of 4020 3512 5331.tmp 87 PID 3512 wrote to memory of 4020 3512 5331.tmp 87 PID 4020 wrote to memory of 4144 4020 53AE.tmp 88 PID 4020 wrote to memory of 4144 4020 53AE.tmp 88 PID 4020 wrote to memory of 4144 4020 53AE.tmp 88 PID 4144 wrote to memory of 4648 4144 545A.tmp 89 PID 4144 wrote to memory of 4648 4144 545A.tmp 89 PID 4144 wrote to memory of 4648 4144 545A.tmp 89 PID 4648 wrote to memory of 4848 4648 54E6.tmp 90 PID 4648 wrote to memory of 4848 4648 54E6.tmp 90 PID 4648 wrote to memory of 4848 4648 54E6.tmp 90 PID 4848 wrote to memory of 4136 4848 5582.tmp 91 PID 4848 wrote to memory of 4136 4848 5582.tmp 91 PID 4848 wrote to memory of 4136 4848 5582.tmp 91 PID 4136 wrote to memory of 1500 4136 55FF.tmp 92 PID 4136 wrote to memory of 1500 4136 55FF.tmp 92 PID 4136 wrote to memory of 1500 4136 55FF.tmp 92 PID 1500 wrote to memory of 2312 1500 565D.tmp 93 PID 1500 wrote to memory of 2312 1500 565D.tmp 93 PID 1500 wrote to memory of 2312 1500 565D.tmp 93 PID 2312 wrote to memory of 1432 2312 5719.tmp 94 PID 2312 wrote to memory of 1432 2312 5719.tmp 94 PID 2312 wrote to memory of 1432 2312 5719.tmp 94 PID 1432 wrote to memory of 3328 1432 57A5.tmp 95 PID 1432 wrote to memory of 3328 1432 57A5.tmp 95 PID 1432 wrote to memory of 3328 1432 57A5.tmp 95 PID 3328 wrote to memory of 2820 3328 5822.tmp 96 PID 3328 wrote to memory of 2820 3328 5822.tmp 96 PID 3328 wrote to memory of 2820 3328 5822.tmp 96 PID 2820 wrote to memory of 1580 2820 5890.tmp 97 PID 2820 wrote to memory of 1580 2820 5890.tmp 97 PID 2820 wrote to memory of 1580 2820 5890.tmp 97 PID 1580 wrote to memory of 3488 1580 590D.tmp 98 PID 1580 wrote to memory of 3488 1580 590D.tmp 98 PID 1580 wrote to memory of 3488 1580 590D.tmp 98 PID 3488 wrote to memory of 4764 3488 597A.tmp 99 PID 3488 wrote to memory of 4764 3488 597A.tmp 99 PID 3488 wrote to memory of 4764 3488 597A.tmp 99 PID 4764 wrote to memory of 2904 4764 5A07.tmp 100 PID 4764 wrote to memory of 2904 4764 5A07.tmp 100 PID 4764 wrote to memory of 2904 4764 5A07.tmp 100 PID 2904 wrote to memory of 2748 2904 5AA3.tmp 101 PID 2904 wrote to memory of 2748 2904 5AA3.tmp 101 PID 2904 wrote to memory of 2748 2904 5AA3.tmp 101 PID 2748 wrote to memory of 5040 2748 5B20.tmp 102 PID 2748 wrote to memory of 5040 2748 5B20.tmp 102 PID 2748 wrote to memory of 5040 2748 5B20.tmp 102 PID 5040 wrote to memory of 3284 5040 5B8D.tmp 103 PID 5040 wrote to memory of 3284 5040 5B8D.tmp 103 PID 5040 wrote to memory of 3284 5040 5B8D.tmp 103 PID 3284 wrote to memory of 5116 3284 5BFB.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_1495a5b8a8d6bdf81fe369fa9a37d612_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\515C.tmp"C:\Users\Admin\AppData\Local\Temp\515C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\5275.tmp"C:\Users\Admin\AppData\Local\Temp\5275.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\5331.tmp"C:\Users\Admin\AppData\Local\Temp\5331.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\53AE.tmp"C:\Users\Admin\AppData\Local\Temp\53AE.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\54E6.tmp"C:\Users\Admin\AppData\Local\Temp\54E6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\5582.tmp"C:\Users\Admin\AppData\Local\Temp\5582.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\5719.tmp"C:\Users\Admin\AppData\Local\Temp\5719.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\5822.tmp"C:\Users\Admin\AppData\Local\Temp\5822.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\5890.tmp"C:\Users\Admin\AppData\Local\Temp\5890.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\590D.tmp"C:\Users\Admin\AppData\Local\Temp\590D.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\597A.tmp"C:\Users\Admin\AppData\Local\Temp\597A.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\5A07.tmp"C:\Users\Admin\AppData\Local\Temp\5A07.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\5B20.tmp"C:\Users\Admin\AppData\Local\Temp\5B20.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp"23⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"24⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\5D62.tmp"C:\Users\Admin\AppData\Local\Temp\5D62.tmp"25⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"26⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"27⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\5EF8.tmp"C:\Users\Admin\AppData\Local\Temp\5EF8.tmp"28⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\5F66.tmp"C:\Users\Admin\AppData\Local\Temp\5F66.tmp"29⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"30⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\6060.tmp"C:\Users\Admin\AppData\Local\Temp\6060.tmp"31⤵
- Executes dropped EXE
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"32⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\614A.tmp"C:\Users\Admin\AppData\Local\Temp\614A.tmp"33⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"34⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"35⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"36⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\62D1.tmp"C:\Users\Admin\AppData\Local\Temp\62D1.tmp"37⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"38⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\638C.tmp"C:\Users\Admin\AppData\Local\Temp\638C.tmp"39⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\63DA.tmp"C:\Users\Admin\AppData\Local\Temp\63DA.tmp"40⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\6428.tmp"C:\Users\Admin\AppData\Local\Temp\6428.tmp"41⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"42⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"43⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"44⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"45⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\660D.tmp"C:\Users\Admin\AppData\Local\Temp\660D.tmp"46⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"47⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\66D8.tmp"C:\Users\Admin\AppData\Local\Temp\66D8.tmp"48⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"49⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\67A3.tmp"C:\Users\Admin\AppData\Local\Temp\67A3.tmp"50⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\6801.tmp"C:\Users\Admin\AppData\Local\Temp\6801.tmp"51⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\684F.tmp"C:\Users\Admin\AppData\Local\Temp\684F.tmp"52⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"53⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\690A.tmp"C:\Users\Admin\AppData\Local\Temp\690A.tmp"54⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\6959.tmp"C:\Users\Admin\AppData\Local\Temp\6959.tmp"55⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\69A7.tmp"C:\Users\Admin\AppData\Local\Temp\69A7.tmp"56⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\6A04.tmp"C:\Users\Admin\AppData\Local\Temp\6A04.tmp"57⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\6A62.tmp"C:\Users\Admin\AppData\Local\Temp\6A62.tmp"58⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\6AB0.tmp"C:\Users\Admin\AppData\Local\Temp\6AB0.tmp"59⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"60⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"61⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"62⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"63⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"64⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"65⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\6D41.tmp"C:\Users\Admin\AppData\Local\Temp\6D41.tmp"66⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"67⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"68⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\6E4A.tmp"C:\Users\Admin\AppData\Local\Temp\6E4A.tmp"69⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\6E98.tmp"C:\Users\Admin\AppData\Local\Temp\6E98.tmp"70⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"71⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\6F54.tmp"C:\Users\Admin\AppData\Local\Temp\6F54.tmp"72⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"73⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\700F.tmp"C:\Users\Admin\AppData\Local\Temp\700F.tmp"74⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\706D.tmp"C:\Users\Admin\AppData\Local\Temp\706D.tmp"75⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\70BB.tmp"C:\Users\Admin\AppData\Local\Temp\70BB.tmp"76⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"77⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"78⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\71D4.tmp"C:\Users\Admin\AppData\Local\Temp\71D4.tmp"79⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\7242.tmp"C:\Users\Admin\AppData\Local\Temp\7242.tmp"80⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\7290.tmp"C:\Users\Admin\AppData\Local\Temp\7290.tmp"81⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\72EE.tmp"C:\Users\Admin\AppData\Local\Temp\72EE.tmp"82⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\733C.tmp"C:\Users\Admin\AppData\Local\Temp\733C.tmp"83⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\739A.tmp"C:\Users\Admin\AppData\Local\Temp\739A.tmp"84⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"85⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"86⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"87⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"88⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"89⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"90⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"91⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"92⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"93⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"94⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"95⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"96⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\783D.tmp"C:\Users\Admin\AppData\Local\Temp\783D.tmp"97⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp"98⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\78F9.tmp"C:\Users\Admin\AppData\Local\Temp\78F9.tmp"99⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\7947.tmp"C:\Users\Admin\AppData\Local\Temp\7947.tmp"100⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"101⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\7A02.tmp"C:\Users\Admin\AppData\Local\Temp\7A02.tmp"102⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\7A60.tmp"C:\Users\Admin\AppData\Local\Temp\7A60.tmp"103⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"104⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"105⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"106⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"107⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\7C35.tmp"C:\Users\Admin\AppData\Local\Temp\7C35.tmp"108⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\7C83.tmp"C:\Users\Admin\AppData\Local\Temp\7C83.tmp"109⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"110⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"111⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"112⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"113⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\7E38.tmp"C:\Users\Admin\AppData\Local\Temp\7E38.tmp"114⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\7E96.tmp"C:\Users\Admin\AppData\Local\Temp\7E96.tmp"115⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\7F03.tmp"C:\Users\Admin\AppData\Local\Temp\7F03.tmp"116⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"117⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"118⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"119⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\805B.tmp"C:\Users\Admin\AppData\Local\Temp\805B.tmp"120⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\80A9.tmp"C:\Users\Admin\AppData\Local\Temp\80A9.tmp"121⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\8107.tmp"C:\Users\Admin\AppData\Local\Temp\8107.tmp"122⤵PID:4400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-