Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe
-
Size
520KB
-
MD5
b465a2cab42ba283330b7a0d9607bad3
-
SHA1
c43b5a9af1e5555a105b3d43537fdf0c227447c4
-
SHA256
5aba8c414cb5e22940283872b85efd88c013ac602fbaadde21247c00335e6871
-
SHA512
7c0cdf3b7ddf2f201694ff50ff4e8eae017a86452e03ffad3118426f8915ba6d563c57175dec828b901768cab11b959a87dc23971b6e8f4dbe4101c8fdf53a81
-
SSDEEP
12288:gj8fuxR21t5i8f9E4JeeREU4Uq+UFdisCApcpOOIneNZ:gj8fuK1GY9EYREf8Ufis7YOZeN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4352 4805.tmp 2472 4863.tmp 1400 48F0.tmp 2616 498C.tmp 2996 4A09.tmp 4892 4A67.tmp 452 4AD4.tmp 1968 4B32.tmp 2560 4B9F.tmp 1188 4C0D.tmp 2352 4C8A.tmp 3844 4CF7.tmp 4556 4D74.tmp 4504 4DD2.tmp 944 4E2F.tmp 3624 4E8D.tmp 1976 4F1A.tmp 2628 4F97.tmp 4236 5004.tmp 1564 5081.tmp 4076 50DF.tmp 1792 514C.tmp 4680 51BA.tmp 3160 5208.tmp 4048 5266.tmp 3172 52C3.tmp 3496 5311.tmp 2576 538E.tmp 4792 53FC.tmp 4396 545A.tmp 1904 54D7.tmp 1320 5544.tmp 4220 55B1.tmp 3568 55FF.tmp 388 565D.tmp 2472 56AB.tmp 4216 5709.tmp 2284 5767.tmp 4408 57C5.tmp 1488 5822.tmp 2616 5880.tmp 3104 58DE.tmp 2820 593C.tmp 1344 5999.tmp 4284 59F7.tmp 2004 5A55.tmp 4712 5AB3.tmp 2560 5B10.tmp 5092 5B5E.tmp 2872 5BBC.tmp 3212 5C1A.tmp 3836 5C78.tmp 1468 5CC6.tmp 820 5D24.tmp 3884 5D81.tmp 4728 5DDF.tmp 4064 5E3D.tmp 2208 5E9B.tmp 944 5EE9.tmp 3356 5F46.tmp 400 5FA4.tmp 4696 6002.tmp 4224 6060.tmp 4236 60BD.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4352 4544 2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe 84 PID 4544 wrote to memory of 4352 4544 2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe 84 PID 4544 wrote to memory of 4352 4544 2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe 84 PID 4352 wrote to memory of 2472 4352 4805.tmp 85 PID 4352 wrote to memory of 2472 4352 4805.tmp 85 PID 4352 wrote to memory of 2472 4352 4805.tmp 85 PID 2472 wrote to memory of 1400 2472 4863.tmp 86 PID 2472 wrote to memory of 1400 2472 4863.tmp 86 PID 2472 wrote to memory of 1400 2472 4863.tmp 86 PID 1400 wrote to memory of 2616 1400 48F0.tmp 87 PID 1400 wrote to memory of 2616 1400 48F0.tmp 87 PID 1400 wrote to memory of 2616 1400 48F0.tmp 87 PID 2616 wrote to memory of 2996 2616 498C.tmp 88 PID 2616 wrote to memory of 2996 2616 498C.tmp 88 PID 2616 wrote to memory of 2996 2616 498C.tmp 88 PID 2996 wrote to memory of 4892 2996 4A09.tmp 89 PID 2996 wrote to memory of 4892 2996 4A09.tmp 89 PID 2996 wrote to memory of 4892 2996 4A09.tmp 89 PID 4892 wrote to memory of 452 4892 4A67.tmp 91 PID 4892 wrote to memory of 452 4892 4A67.tmp 91 PID 4892 wrote to memory of 452 4892 4A67.tmp 91 PID 452 wrote to memory of 1968 452 4AD4.tmp 92 PID 452 wrote to memory of 1968 452 4AD4.tmp 92 PID 452 wrote to memory of 1968 452 4AD4.tmp 92 PID 1968 wrote to memory of 2560 1968 4B32.tmp 93 PID 1968 wrote to memory of 2560 1968 4B32.tmp 93 PID 1968 wrote to memory of 2560 1968 4B32.tmp 93 PID 2560 wrote to memory of 1188 2560 4B9F.tmp 95 PID 2560 wrote to memory of 1188 2560 4B9F.tmp 95 PID 2560 wrote to memory of 1188 2560 4B9F.tmp 95 PID 1188 wrote to memory of 2352 1188 4C0D.tmp 97 PID 1188 wrote to memory of 2352 1188 4C0D.tmp 97 PID 1188 wrote to memory of 2352 1188 4C0D.tmp 97 PID 2352 wrote to memory of 3844 2352 4C8A.tmp 98 PID 2352 wrote to memory of 3844 2352 4C8A.tmp 98 PID 2352 wrote to memory of 3844 2352 4C8A.tmp 98 PID 3844 wrote to memory of 4556 3844 4CF7.tmp 99 PID 3844 wrote to memory of 4556 3844 4CF7.tmp 99 PID 3844 wrote to memory of 4556 3844 4CF7.tmp 99 PID 4556 wrote to memory of 4504 4556 4D74.tmp 100 PID 4556 wrote to memory of 4504 4556 4D74.tmp 100 PID 4556 wrote to memory of 4504 4556 4D74.tmp 100 PID 4504 wrote to memory of 944 4504 4DD2.tmp 101 PID 4504 wrote to memory of 944 4504 4DD2.tmp 101 PID 4504 wrote to memory of 944 4504 4DD2.tmp 101 PID 944 wrote to memory of 3624 944 4E2F.tmp 102 PID 944 wrote to memory of 3624 944 4E2F.tmp 102 PID 944 wrote to memory of 3624 944 4E2F.tmp 102 PID 3624 wrote to memory of 1976 3624 4E8D.tmp 103 PID 3624 wrote to memory of 1976 3624 4E8D.tmp 103 PID 3624 wrote to memory of 1976 3624 4E8D.tmp 103 PID 1976 wrote to memory of 2628 1976 4F1A.tmp 104 PID 1976 wrote to memory of 2628 1976 4F1A.tmp 104 PID 1976 wrote to memory of 2628 1976 4F1A.tmp 104 PID 2628 wrote to memory of 4236 2628 4F97.tmp 105 PID 2628 wrote to memory of 4236 2628 4F97.tmp 105 PID 2628 wrote to memory of 4236 2628 4F97.tmp 105 PID 4236 wrote to memory of 1564 4236 5004.tmp 106 PID 4236 wrote to memory of 1564 4236 5004.tmp 106 PID 4236 wrote to memory of 1564 4236 5004.tmp 106 PID 1564 wrote to memory of 4076 1564 5081.tmp 107 PID 1564 wrote to memory of 4076 1564 5081.tmp 107 PID 1564 wrote to memory of 4076 1564 5081.tmp 107 PID 4076 wrote to memory of 1792 4076 50DF.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_b465a2cab42ba283330b7a0d9607bad3_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\4805.tmp"C:\Users\Admin\AppData\Local\Temp\4805.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\4863.tmp"C:\Users\Admin\AppData\Local\Temp\4863.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\48F0.tmp"C:\Users\Admin\AppData\Local\Temp\48F0.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\498C.tmp"C:\Users\Admin\AppData\Local\Temp\498C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\4A09.tmp"C:\Users\Admin\AppData\Local\Temp\4A09.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\4A67.tmp"C:\Users\Admin\AppData\Local\Temp\4A67.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\4B32.tmp"C:\Users\Admin\AppData\Local\Temp\4B32.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\4B9F.tmp"C:\Users\Admin\AppData\Local\Temp\4B9F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\4D74.tmp"C:\Users\Admin\AppData\Local\Temp\4D74.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\4F97.tmp"C:\Users\Admin\AppData\Local\Temp\4F97.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\5081.tmp"C:\Users\Admin\AppData\Local\Temp\5081.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\50DF.tmp"C:\Users\Admin\AppData\Local\Temp\50DF.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"23⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\51BA.tmp"C:\Users\Admin\AppData\Local\Temp\51BA.tmp"24⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\5208.tmp"C:\Users\Admin\AppData\Local\Temp\5208.tmp"25⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"26⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\52C3.tmp"C:\Users\Admin\AppData\Local\Temp\52C3.tmp"27⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\5311.tmp"C:\Users\Admin\AppData\Local\Temp\5311.tmp"28⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\538E.tmp"C:\Users\Admin\AppData\Local\Temp\538E.tmp"29⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\53FC.tmp"C:\Users\Admin\AppData\Local\Temp\53FC.tmp"30⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"31⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\54D7.tmp"C:\Users\Admin\AppData\Local\Temp\54D7.tmp"32⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\5544.tmp"C:\Users\Admin\AppData\Local\Temp\5544.tmp"33⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"34⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"35⤵
- Executes dropped EXE
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"36⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\56AB.tmp"C:\Users\Admin\AppData\Local\Temp\56AB.tmp"37⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"38⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"39⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\57C5.tmp"C:\Users\Admin\AppData\Local\Temp\57C5.tmp"40⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\5822.tmp"C:\Users\Admin\AppData\Local\Temp\5822.tmp"41⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\5880.tmp"C:\Users\Admin\AppData\Local\Temp\5880.tmp"42⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\58DE.tmp"C:\Users\Admin\AppData\Local\Temp\58DE.tmp"43⤵
- Executes dropped EXE
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"44⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"45⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\59F7.tmp"C:\Users\Admin\AppData\Local\Temp\59F7.tmp"46⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\5A55.tmp"C:\Users\Admin\AppData\Local\Temp\5A55.tmp"47⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"48⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\5B10.tmp"C:\Users\Admin\AppData\Local\Temp\5B10.tmp"49⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"50⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\5BBC.tmp"C:\Users\Admin\AppData\Local\Temp\5BBC.tmp"51⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"52⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp"53⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\5CC6.tmp"C:\Users\Admin\AppData\Local\Temp\5CC6.tmp"54⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"55⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\5D81.tmp"C:\Users\Admin\AppData\Local\Temp\5D81.tmp"56⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"57⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"58⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"59⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"60⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\5F46.tmp"C:\Users\Admin\AppData\Local\Temp\5F46.tmp"61⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"62⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\6002.tmp"C:\Users\Admin\AppData\Local\Temp\6002.tmp"63⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\6060.tmp"C:\Users\Admin\AppData\Local\Temp\6060.tmp"64⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"65⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"66⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"67⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\61C7.tmp"C:\Users\Admin\AppData\Local\Temp\61C7.tmp"68⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"69⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"70⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\62D1.tmp"C:\Users\Admin\AppData\Local\Temp\62D1.tmp"71⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\632E.tmp"C:\Users\Admin\AppData\Local\Temp\632E.tmp"72⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\638C.tmp"C:\Users\Admin\AppData\Local\Temp\638C.tmp"73⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\63EA.tmp"C:\Users\Admin\AppData\Local\Temp\63EA.tmp"74⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\6448.tmp"C:\Users\Admin\AppData\Local\Temp\6448.tmp"75⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"76⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"77⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"78⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\65AF.tmp"C:\Users\Admin\AppData\Local\Temp\65AF.tmp"79⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\660D.tmp"C:\Users\Admin\AppData\Local\Temp\660D.tmp"80⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"81⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\66B9.tmp"C:\Users\Admin\AppData\Local\Temp\66B9.tmp"82⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\6716.tmp"C:\Users\Admin\AppData\Local\Temp\6716.tmp"83⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\6765.tmp"C:\Users\Admin\AppData\Local\Temp\6765.tmp"84⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\67B3.tmp"C:\Users\Admin\AppData\Local\Temp\67B3.tmp"85⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"86⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\686E.tmp"C:\Users\Admin\AppData\Local\Temp\686E.tmp"87⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\68CC.tmp"C:\Users\Admin\AppData\Local\Temp\68CC.tmp"88⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\692A.tmp"C:\Users\Admin\AppData\Local\Temp\692A.tmp"89⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\6987.tmp"C:\Users\Admin\AppData\Local\Temp\6987.tmp"90⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\69E5.tmp"C:\Users\Admin\AppData\Local\Temp\69E5.tmp"91⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"92⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\6A91.tmp"C:\Users\Admin\AppData\Local\Temp\6A91.tmp"93⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"94⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"95⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"96⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"97⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\6C47.tmp"C:\Users\Admin\AppData\Local\Temp\6C47.tmp"98⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"99⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"100⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"101⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"102⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"103⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"104⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\6E89.tmp"C:\Users\Admin\AppData\Local\Temp\6E89.tmp"105⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"106⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\6F44.tmp"C:\Users\Admin\AppData\Local\Temp\6F44.tmp"107⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"108⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"109⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\703E.tmp"C:\Users\Admin\AppData\Local\Temp\703E.tmp"110⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\709C.tmp"C:\Users\Admin\AppData\Local\Temp\709C.tmp"111⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\70FA.tmp"C:\Users\Admin\AppData\Local\Temp\70FA.tmp"112⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\7157.tmp"C:\Users\Admin\AppData\Local\Temp\7157.tmp"113⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\71A6.tmp"C:\Users\Admin\AppData\Local\Temp\71A6.tmp"114⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\71F4.tmp"C:\Users\Admin\AppData\Local\Temp\71F4.tmp"115⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\7242.tmp"C:\Users\Admin\AppData\Local\Temp\7242.tmp"116⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\72A0.tmp"C:\Users\Admin\AppData\Local\Temp\72A0.tmp"117⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"118⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp"119⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\73A9.tmp"C:\Users\Admin\AppData\Local\Temp\73A9.tmp"120⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\7407.tmp"C:\Users\Admin\AppData\Local\Temp\7407.tmp"121⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\7465.tmp"C:\Users\Admin\AppData\Local\Temp\7465.tmp"122⤵PID:1604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-