Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe
-
Size
529KB
-
MD5
7330cf38eb875dcd59ee07dab6c7fe2c
-
SHA1
b0506e16dfce7b8de01c9b7b7d9c8296c45798d6
-
SHA256
db58ae982d931446703dc904e4c9ba59f019b3cf00fcc2584f844729c214917a
-
SHA512
444d9ae101907401db30fdfbd1e6b073f8bcd74b5562b3722f2aeb4f90635806c4c2447de5de8d0eb4b37fc911eafced5f356049bc9c92202314591660ca200a
-
SSDEEP
12288:NU5rCOTeijLVgHzH4KpQhalKh9u4XBMnITZwlH4Hp:NUQOJjRyzYBhalAXBMnITSlH4Hp
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3192 FE74.tmp 912 2A.tmp 3836 134.tmp 1120 3F3.tmp 1804 4BE.tmp 3396 55A.tmp 1616 5E7.tmp 3468 683.tmp 3660 710.tmp 1228 7BB.tmp 4112 867.tmp 452 8E4.tmp 3612 9CF.tmp 3956 A4C.tmp 1132 AE8.tmp 5024 B65.tmp 1648 BE2.tmp 2940 C5F.tmp 4548 D59.tmp 1628 DC6.tmp 4900 F0E.tmp 3104 F7C.tmp 3676 1037.tmp 4428 10D4.tmp 872 1170.tmp 3752 121C.tmp 4396 1383.tmp 3668 13F0.tmp 1244 146D.tmp 4700 14EA.tmp 2944 1567.tmp 940 1604.tmp 1612 1681.tmp 3592 176B.tmp 4796 1807.tmp 1860 1875.tmp 2248 18E2.tmp 4144 196F.tmp 3900 19CC.tmp 2412 1A3A.tmp 4300 1AB7.tmp 4848 1B53.tmp 4572 1BE0.tmp 3764 1C5D.tmp 3252 1CCA.tmp 3296 1D37.tmp 1096 1DB4.tmp 4416 1E31.tmp 2876 1E9F.tmp 4348 1F2B.tmp 5116 1FD7.tmp 3232 2045.tmp 2632 20C2.tmp 5052 216E.tmp 3204 2296.tmp 1072 2362.tmp 4108 23EE.tmp 864 247B.tmp 4112 24F8.tmp 2168 2594.tmp 2344 2621.tmp 1444 268E.tmp 1000 270B.tmp 4080 27E6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 3192 228 2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe 90 PID 228 wrote to memory of 3192 228 2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe 90 PID 228 wrote to memory of 3192 228 2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe 90 PID 3192 wrote to memory of 912 3192 FE74.tmp 91 PID 3192 wrote to memory of 912 3192 FE74.tmp 91 PID 3192 wrote to memory of 912 3192 FE74.tmp 91 PID 912 wrote to memory of 3836 912 2A.tmp 92 PID 912 wrote to memory of 3836 912 2A.tmp 92 PID 912 wrote to memory of 3836 912 2A.tmp 92 PID 3836 wrote to memory of 1120 3836 134.tmp 93 PID 3836 wrote to memory of 1120 3836 134.tmp 93 PID 3836 wrote to memory of 1120 3836 134.tmp 93 PID 1120 wrote to memory of 1804 1120 3F3.tmp 94 PID 1120 wrote to memory of 1804 1120 3F3.tmp 94 PID 1120 wrote to memory of 1804 1120 3F3.tmp 94 PID 1804 wrote to memory of 3396 1804 4BE.tmp 95 PID 1804 wrote to memory of 3396 1804 4BE.tmp 95 PID 1804 wrote to memory of 3396 1804 4BE.tmp 95 PID 3396 wrote to memory of 1616 3396 55A.tmp 96 PID 3396 wrote to memory of 1616 3396 55A.tmp 96 PID 3396 wrote to memory of 1616 3396 55A.tmp 96 PID 1616 wrote to memory of 3468 1616 5E7.tmp 97 PID 1616 wrote to memory of 3468 1616 5E7.tmp 97 PID 1616 wrote to memory of 3468 1616 5E7.tmp 97 PID 3468 wrote to memory of 3660 3468 683.tmp 98 PID 3468 wrote to memory of 3660 3468 683.tmp 98 PID 3468 wrote to memory of 3660 3468 683.tmp 98 PID 3660 wrote to memory of 1228 3660 710.tmp 99 PID 3660 wrote to memory of 1228 3660 710.tmp 99 PID 3660 wrote to memory of 1228 3660 710.tmp 99 PID 1228 wrote to memory of 4112 1228 7BB.tmp 100 PID 1228 wrote to memory of 4112 1228 7BB.tmp 100 PID 1228 wrote to memory of 4112 1228 7BB.tmp 100 PID 4112 wrote to memory of 452 4112 867.tmp 101 PID 4112 wrote to memory of 452 4112 867.tmp 101 PID 4112 wrote to memory of 452 4112 867.tmp 101 PID 452 wrote to memory of 3612 452 8E4.tmp 102 PID 452 wrote to memory of 3612 452 8E4.tmp 102 PID 452 wrote to memory of 3612 452 8E4.tmp 102 PID 3612 wrote to memory of 3956 3612 9CF.tmp 103 PID 3612 wrote to memory of 3956 3612 9CF.tmp 103 PID 3612 wrote to memory of 3956 3612 9CF.tmp 103 PID 3956 wrote to memory of 1132 3956 A4C.tmp 104 PID 3956 wrote to memory of 1132 3956 A4C.tmp 104 PID 3956 wrote to memory of 1132 3956 A4C.tmp 104 PID 1132 wrote to memory of 5024 1132 AE8.tmp 105 PID 1132 wrote to memory of 5024 1132 AE8.tmp 105 PID 1132 wrote to memory of 5024 1132 AE8.tmp 105 PID 5024 wrote to memory of 1648 5024 B65.tmp 106 PID 5024 wrote to memory of 1648 5024 B65.tmp 106 PID 5024 wrote to memory of 1648 5024 B65.tmp 106 PID 1648 wrote to memory of 2940 1648 BE2.tmp 107 PID 1648 wrote to memory of 2940 1648 BE2.tmp 107 PID 1648 wrote to memory of 2940 1648 BE2.tmp 107 PID 2940 wrote to memory of 4548 2940 C5F.tmp 108 PID 2940 wrote to memory of 4548 2940 C5F.tmp 108 PID 2940 wrote to memory of 4548 2940 C5F.tmp 108 PID 4548 wrote to memory of 1628 4548 D59.tmp 109 PID 4548 wrote to memory of 1628 4548 D59.tmp 109 PID 4548 wrote to memory of 1628 4548 D59.tmp 109 PID 1628 wrote to memory of 4900 1628 DC6.tmp 110 PID 1628 wrote to memory of 4900 1628 DC6.tmp 110 PID 1628 wrote to memory of 4900 1628 DC6.tmp 110 PID 4900 wrote to memory of 3104 4900 F0E.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_7330cf38eb875dcd59ee07dab6c7fe2c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\2A.tmp"C:\Users\Admin\AppData\Local\Temp\2A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\4BE.tmp"C:\Users\Admin\AppData\Local\Temp\4BE.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\5E7.tmp"C:\Users\Admin\AppData\Local\Temp\5E7.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\683.tmp"C:\Users\Admin\AppData\Local\Temp\683.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\AE8.tmp"C:\Users\Admin\AppData\Local\Temp\AE8.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\B65.tmp"C:\Users\Admin\AppData\Local\Temp\B65.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\BE2.tmp"C:\Users\Admin\AppData\Local\Temp\BE2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\C5F.tmp"C:\Users\Admin\AppData\Local\Temp\C5F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"23⤵
- Executes dropped EXE
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"24⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"25⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"26⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"27⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\1383.tmp"C:\Users\Admin\AppData\Local\Temp\1383.tmp"28⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"29⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"30⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\14EA.tmp"C:\Users\Admin\AppData\Local\Temp\14EA.tmp"31⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\1567.tmp"C:\Users\Admin\AppData\Local\Temp\1567.tmp"32⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"33⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"34⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"35⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"36⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"37⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"38⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"39⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"40⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"41⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"42⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\1B53.tmp"C:\Users\Admin\AppData\Local\Temp\1B53.tmp"43⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"44⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"45⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"46⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"47⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"48⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"49⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"50⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"51⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"52⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\2045.tmp"C:\Users\Admin\AppData\Local\Temp\2045.tmp"53⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\20C2.tmp"C:\Users\Admin\AppData\Local\Temp\20C2.tmp"54⤵
- Executes dropped EXE
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"55⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"56⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"57⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\23EE.tmp"C:\Users\Admin\AppData\Local\Temp\23EE.tmp"58⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\247B.tmp"C:\Users\Admin\AppData\Local\Temp\247B.tmp"59⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\24F8.tmp"C:\Users\Admin\AppData\Local\Temp\24F8.tmp"60⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"61⤵
- Executes dropped EXE
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"62⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\268E.tmp"C:\Users\Admin\AppData\Local\Temp\268E.tmp"63⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"64⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\27E6.tmp"C:\Users\Admin\AppData\Local\Temp\27E6.tmp"65⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\2882.tmp"C:\Users\Admin\AppData\Local\Temp\2882.tmp"66⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"67⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2A38.tmp"C:\Users\Admin\AppData\Local\Temp\2A38.tmp"68⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"69⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"70⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2BBE.tmp"C:\Users\Admin\AppData\Local\Temp\2BBE.tmp"71⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"72⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2D45.tmp"C:\Users\Admin\AppData\Local\Temp\2D45.tmp"73⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\2E2F.tmp"C:\Users\Admin\AppData\Local\Temp\2E2F.tmp"74⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"75⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"76⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"77⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"78⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\30EE.tmp"C:\Users\Admin\AppData\Local\Temp\30EE.tmp"79⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"80⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"81⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"82⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"83⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"84⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\366D.tmp"C:\Users\Admin\AppData\Local\Temp\366D.tmp"85⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"86⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"87⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"88⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"89⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"90⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\3B8D.tmp"C:\Users\Admin\AppData\Local\Temp\3B8D.tmp"91⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\3C68.tmp"C:\Users\Admin\AppData\Local\Temp\3C68.tmp"92⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"93⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"94⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"95⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"96⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\410B.tmp"C:\Users\Admin\AppData\Local\Temp\410B.tmp"97⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\4225.tmp"C:\Users\Admin\AppData\Local\Temp\4225.tmp"98⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"99⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"100⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"101⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\4503.tmp"C:\Users\Admin\AppData\Local\Temp\4503.tmp"102⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"103⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"104⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\4745.tmp"C:\Users\Admin\AppData\Local\Temp\4745.tmp"105⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"106⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"107⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\48EB.tmp"C:\Users\Admin\AppData\Local\Temp\48EB.tmp"108⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"109⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"110⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"111⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"112⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"113⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"114⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"115⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"116⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"117⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\4E79.tmp"C:\Users\Admin\AppData\Local\Temp\4E79.tmp"118⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"119⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\4F73.tmp"C:\Users\Admin\AppData\Local\Temp\4F73.tmp"120⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"121⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\50AB.tmp"C:\Users\Admin\AppData\Local\Temp\50AB.tmp"122⤵PID:4300
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-