Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe
-
Size
712KB
-
MD5
662c5ce9a2adf6b208cfc6000f86a1c7
-
SHA1
7b7e25a2e90bec78d0436e2ac5e28f2999184316
-
SHA256
d5a70d3071d35878f38fda5841e97c840a0681bb88ece1acc1a50f6fa9530bef
-
SHA512
e7508833df7543fc0cf78597d94ab89355c5cceef1f6283b7418d9de0b79f27e3cd613de80864dc68fcaffc22cb2066929a779d1c7d4eadc752535bf7baf315c
-
SSDEEP
12288:FU5rCOTeiDEPcrx+JG3pVv1FEO2ve9NZdCvq5TJLCvY90D8/LVBlVk736Y79GWzC:FUQOJD48CG3pVrEO2cNnCvq5TJLCvY93
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4720 342A.tmp 4604 39B8.tmp 1108 3AA3.tmp 3304 3C29.tmp 764 3D33.tmp 3160 3FD3.tmp 2880 4428.tmp 2184 4503.tmp 432 462C.tmp 3380 47F1.tmp 396 488D.tmp 4176 4A23.tmp 4460 4AFE.tmp 5108 4C75.tmp 628 4D6F.tmp 1984 4F25.tmp 4164 5148.tmp 1816 52BF.tmp 2244 536A.tmp 4192 54C2.tmp 2124 5704.tmp 3420 580E.tmp 64 5918.tmp 3196 5B3A.tmp 3572 5C25.tmp 1440 5D00.tmp 1624 5E48.tmp 2532 5F42.tmp 2876 600D.tmp 3616 6116.tmp 3092 63F5.tmp 1564 64C0.tmp 4960 658B.tmp 4636 65F8.tmp 4376 67AE.tmp 224 681B.tmp 1100 6898.tmp 532 6992.tmp 4728 6ADA.tmp 1680 6C23.tmp 4576 6D2C.tmp 652 6DA9.tmp 3768 6F01.tmp 3164 6FDC.tmp 2656 7088.tmp 3216 7124.tmp 5032 723D.tmp 3900 72BA.tmp 4752 7327.tmp 4672 73A4.tmp 3792 7460.tmp 1224 74DD.tmp 4044 775E.tmp 4068 7829.tmp 2524 78F4.tmp 396 7A2C.tmp 2984 7B07.tmp 1212 7CAD.tmp 3584 7D97.tmp 4764 7E43.tmp 1864 7EFF.tmp 2848 8037.tmp 1384 80A5.tmp 3372 8141.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4720 2356 2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe 90 PID 2356 wrote to memory of 4720 2356 2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe 90 PID 2356 wrote to memory of 4720 2356 2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe 90 PID 4720 wrote to memory of 4604 4720 342A.tmp 91 PID 4720 wrote to memory of 4604 4720 342A.tmp 91 PID 4720 wrote to memory of 4604 4720 342A.tmp 91 PID 4604 wrote to memory of 1108 4604 39B8.tmp 92 PID 4604 wrote to memory of 1108 4604 39B8.tmp 92 PID 4604 wrote to memory of 1108 4604 39B8.tmp 92 PID 1108 wrote to memory of 3304 1108 3AA3.tmp 93 PID 1108 wrote to memory of 3304 1108 3AA3.tmp 93 PID 1108 wrote to memory of 3304 1108 3AA3.tmp 93 PID 3304 wrote to memory of 764 3304 3C29.tmp 94 PID 3304 wrote to memory of 764 3304 3C29.tmp 94 PID 3304 wrote to memory of 764 3304 3C29.tmp 94 PID 764 wrote to memory of 3160 764 3D33.tmp 95 PID 764 wrote to memory of 3160 764 3D33.tmp 95 PID 764 wrote to memory of 3160 764 3D33.tmp 95 PID 3160 wrote to memory of 2880 3160 3FD3.tmp 96 PID 3160 wrote to memory of 2880 3160 3FD3.tmp 96 PID 3160 wrote to memory of 2880 3160 3FD3.tmp 96 PID 2880 wrote to memory of 2184 2880 4428.tmp 97 PID 2880 wrote to memory of 2184 2880 4428.tmp 97 PID 2880 wrote to memory of 2184 2880 4428.tmp 97 PID 2184 wrote to memory of 432 2184 4503.tmp 98 PID 2184 wrote to memory of 432 2184 4503.tmp 98 PID 2184 wrote to memory of 432 2184 4503.tmp 98 PID 432 wrote to memory of 3380 432 462C.tmp 99 PID 432 wrote to memory of 3380 432 462C.tmp 99 PID 432 wrote to memory of 3380 432 462C.tmp 99 PID 3380 wrote to memory of 396 3380 47F1.tmp 100 PID 3380 wrote to memory of 396 3380 47F1.tmp 100 PID 3380 wrote to memory of 396 3380 47F1.tmp 100 PID 396 wrote to memory of 4176 396 488D.tmp 101 PID 396 wrote to memory of 4176 396 488D.tmp 101 PID 396 wrote to memory of 4176 396 488D.tmp 101 PID 4176 wrote to memory of 4460 4176 4A23.tmp 102 PID 4176 wrote to memory of 4460 4176 4A23.tmp 102 PID 4176 wrote to memory of 4460 4176 4A23.tmp 102 PID 4460 wrote to memory of 5108 4460 4AFE.tmp 103 PID 4460 wrote to memory of 5108 4460 4AFE.tmp 103 PID 4460 wrote to memory of 5108 4460 4AFE.tmp 103 PID 5108 wrote to memory of 628 5108 4C75.tmp 104 PID 5108 wrote to memory of 628 5108 4C75.tmp 104 PID 5108 wrote to memory of 628 5108 4C75.tmp 104 PID 628 wrote to memory of 1984 628 4D6F.tmp 105 PID 628 wrote to memory of 1984 628 4D6F.tmp 105 PID 628 wrote to memory of 1984 628 4D6F.tmp 105 PID 1984 wrote to memory of 4164 1984 4F25.tmp 106 PID 1984 wrote to memory of 4164 1984 4F25.tmp 106 PID 1984 wrote to memory of 4164 1984 4F25.tmp 106 PID 4164 wrote to memory of 1816 4164 5148.tmp 107 PID 4164 wrote to memory of 1816 4164 5148.tmp 107 PID 4164 wrote to memory of 1816 4164 5148.tmp 107 PID 1816 wrote to memory of 2244 1816 52BF.tmp 108 PID 1816 wrote to memory of 2244 1816 52BF.tmp 108 PID 1816 wrote to memory of 2244 1816 52BF.tmp 108 PID 2244 wrote to memory of 4192 2244 536A.tmp 109 PID 2244 wrote to memory of 4192 2244 536A.tmp 109 PID 2244 wrote to memory of 4192 2244 536A.tmp 109 PID 4192 wrote to memory of 2124 4192 54C2.tmp 110 PID 4192 wrote to memory of 2124 4192 54C2.tmp 110 PID 4192 wrote to memory of 2124 4192 54C2.tmp 110 PID 2124 wrote to memory of 3420 2124 5704.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_662c5ce9a2adf6b208cfc6000f86a1c7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\4503.tmp"C:\Users\Admin\AppData\Local\Temp\4503.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\488D.tmp"C:\Users\Admin\AppData\Local\Temp\488D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\4C75.tmp"C:\Users\Admin\AppData\Local\Temp\4C75.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\4F25.tmp"C:\Users\Admin\AppData\Local\Temp\4F25.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\5148.tmp"C:\Users\Admin\AppData\Local\Temp\5148.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\54C2.tmp"C:\Users\Admin\AppData\Local\Temp\54C2.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\5704.tmp"C:\Users\Admin\AppData\Local\Temp\5704.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\580E.tmp"C:\Users\Admin\AppData\Local\Temp\580E.tmp"23⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\5918.tmp"C:\Users\Admin\AppData\Local\Temp\5918.tmp"24⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"25⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"26⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\5D00.tmp"C:\Users\Admin\AppData\Local\Temp\5D00.tmp"27⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"28⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\5F42.tmp"C:\Users\Admin\AppData\Local\Temp\5F42.tmp"29⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\600D.tmp"C:\Users\Admin\AppData\Local\Temp\600D.tmp"30⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"31⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"32⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"33⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\658B.tmp"C:\Users\Admin\AppData\Local\Temp\658B.tmp"34⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\65F8.tmp"C:\Users\Admin\AppData\Local\Temp\65F8.tmp"35⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"36⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\681B.tmp"C:\Users\Admin\AppData\Local\Temp\681B.tmp"37⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\6898.tmp"C:\Users\Admin\AppData\Local\Temp\6898.tmp"38⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\6992.tmp"C:\Users\Admin\AppData\Local\Temp\6992.tmp"39⤵
- Executes dropped EXE
PID:532 -
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"40⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\6C23.tmp"C:\Users\Admin\AppData\Local\Temp\6C23.tmp"41⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\6D2C.tmp"C:\Users\Admin\AppData\Local\Temp\6D2C.tmp"42⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"43⤵
- Executes dropped EXE
PID:652 -
C:\Users\Admin\AppData\Local\Temp\6F01.tmp"C:\Users\Admin\AppData\Local\Temp\6F01.tmp"44⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\6FDC.tmp"C:\Users\Admin\AppData\Local\Temp\6FDC.tmp"45⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"46⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\7124.tmp"C:\Users\Admin\AppData\Local\Temp\7124.tmp"47⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\723D.tmp"C:\Users\Admin\AppData\Local\Temp\723D.tmp"48⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\72BA.tmp"C:\Users\Admin\AppData\Local\Temp\72BA.tmp"49⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"50⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\73A4.tmp"C:\Users\Admin\AppData\Local\Temp\73A4.tmp"51⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\7460.tmp"C:\Users\Admin\AppData\Local\Temp\7460.tmp"52⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\74DD.tmp"C:\Users\Admin\AppData\Local\Temp\74DD.tmp"53⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\775E.tmp"C:\Users\Admin\AppData\Local\Temp\775E.tmp"54⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\7829.tmp"C:\Users\Admin\AppData\Local\Temp\7829.tmp"55⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\78F4.tmp"C:\Users\Admin\AppData\Local\Temp\78F4.tmp"56⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\7A2C.tmp"C:\Users\Admin\AppData\Local\Temp\7A2C.tmp"57⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\7B07.tmp"C:\Users\Admin\AppData\Local\Temp\7B07.tmp"58⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\7CAD.tmp"C:\Users\Admin\AppData\Local\Temp\7CAD.tmp"59⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\7D97.tmp"C:\Users\Admin\AppData\Local\Temp\7D97.tmp"60⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\7E43.tmp"C:\Users\Admin\AppData\Local\Temp\7E43.tmp"61⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"62⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\8037.tmp"C:\Users\Admin\AppData\Local\Temp\8037.tmp"63⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\80A5.tmp"C:\Users\Admin\AppData\Local\Temp\80A5.tmp"64⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\8141.tmp"C:\Users\Admin\AppData\Local\Temp\8141.tmp"65⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\8335.tmp"C:\Users\Admin\AppData\Local\Temp\8335.tmp"66⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\83C1.tmp"C:\Users\Admin\AppData\Local\Temp\83C1.tmp"67⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\846D.tmp"C:\Users\Admin\AppData\Local\Temp\846D.tmp"68⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\8596.tmp"C:\Users\Admin\AppData\Local\Temp\8596.tmp"69⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\875B.tmp"C:\Users\Admin\AppData\Local\Temp\875B.tmp"70⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\8807.tmp"C:\Users\Admin\AppData\Local\Temp\8807.tmp"71⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\8911.tmp"C:\Users\Admin\AppData\Local\Temp\8911.tmp"72⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\89CC.tmp"C:\Users\Admin\AppData\Local\Temp\89CC.tmp"73⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\8A78.tmp"C:\Users\Admin\AppData\Local\Temp\8A78.tmp"74⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"75⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\8D76.tmp"C:\Users\Admin\AppData\Local\Temp\8D76.tmp"76⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\8F4B.tmp"C:\Users\Admin\AppData\Local\Temp\8F4B.tmp"77⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\9006.tmp"C:\Users\Admin\AppData\Local\Temp\9006.tmp"78⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\90D1.tmp"C:\Users\Admin\AppData\Local\Temp\90D1.tmp"79⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\9229.tmp"C:\Users\Admin\AppData\Local\Temp\9229.tmp"80⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\948A.tmp"C:\Users\Admin\AppData\Local\Temp\948A.tmp"81⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\9555.tmp"C:\Users\Admin\AppData\Local\Temp\9555.tmp"82⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\971B.tmp"C:\Users\Admin\AppData\Local\Temp\971B.tmp"83⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\9798.tmp"C:\Users\Admin\AppData\Local\Temp\9798.tmp"84⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\9824.tmp"C:\Users\Admin\AppData\Local\Temp\9824.tmp"85⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\9A57.tmp"C:\Users\Admin\AppData\Local\Temp\9A57.tmp"86⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"87⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\A2D3.tmp"C:\Users\Admin\AppData\Local\Temp\A2D3.tmp"88⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\A35F.tmp"C:\Users\Admin\AppData\Local\Temp\A35F.tmp"89⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"90⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\A515.tmp"C:\Users\Admin\AppData\Local\Temp\A515.tmp"91⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"92⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"93⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\A786.tmp"C:\Users\Admin\AppData\Local\Temp\A786.tmp"94⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\AB2F.tmp"C:\Users\Admin\AppData\Local\Temp\AB2F.tmp"95⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\AFA4.tmp"C:\Users\Admin\AppData\Local\Temp\AFA4.tmp"96⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\B438.tmp"C:\Users\Admin\AppData\Local\Temp\B438.tmp"97⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\B532.tmp"C:\Users\Admin\AppData\Local\Temp\B532.tmp"98⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\B5AF.tmp"C:\Users\Admin\AppData\Local\Temp\B5AF.tmp"99⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\B63B.tmp"C:\Users\Admin\AppData\Local\Temp\B63B.tmp"100⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\B9C6.tmp"C:\Users\Admin\AppData\Local\Temp\B9C6.tmp"101⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\BA71.tmp"C:\Users\Admin\AppData\Local\Temp\BA71.tmp"102⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"103⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\BCC3.tmp"C:\Users\Admin\AppData\Local\Temp\BCC3.tmp"104⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\BD31.tmp"C:\Users\Admin\AppData\Local\Temp\BD31.tmp"105⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"106⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\C0AB.tmp"C:\Users\Admin\AppData\Local\Temp\C0AB.tmp"107⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\C407.tmp"C:\Users\Admin\AppData\Local\Temp\C407.tmp"108⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\C493.tmp"C:\Users\Admin\AppData\Local\Temp\C493.tmp"109⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\C60A.tmp"C:\Users\Admin\AppData\Local\Temp\C60A.tmp"110⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\C6A6.tmp"C:\Users\Admin\AppData\Local\Temp\C6A6.tmp"111⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\C733.tmp"C:\Users\Admin\AppData\Local\Temp\C733.tmp"112⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\C8BA.tmp"C:\Users\Admin\AppData\Local\Temp\C8BA.tmp"113⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\C956.tmp"C:\Users\Admin\AppData\Local\Temp\C956.tmp"114⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\C9E3.tmp"C:\Users\Admin\AppData\Local\Temp\C9E3.tmp"115⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\CCA2.tmp"C:\Users\Admin\AppData\Local\Temp\CCA2.tmp"116⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\CD6D.tmp"C:\Users\Admin\AppData\Local\Temp\CD6D.tmp"117⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\CE09.tmp"C:\Users\Admin\AppData\Local\Temp\CE09.tmp"118⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\CFED.tmp"C:\Users\Admin\AppData\Local\Temp\CFED.tmp"119⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\D0C8.tmp"C:\Users\Admin\AppData\Local\Temp\D0C8.tmp"120⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\D1C2.tmp"C:\Users\Admin\AppData\Local\Temp\D1C2.tmp"121⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\D618.tmp"C:\Users\Admin\AppData\Local\Temp\D618.tmp"122⤵PID:2108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-