Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe
-
Size
527KB
-
MD5
f830b64849a4da17271b149880472af1
-
SHA1
33ce5c8e94307d4edecc207b3454e730d5eea351
-
SHA256
6abbff928fdbe6159bedad121bc27ecee57b2a850c1ade586c0e3449ab23db13
-
SHA512
f61ea7ec20fa9c5e880898dbc932a3230a274a4da8f240862f404667106010f0d7509973fc28b6b3a420f825dbf26321477ca6f5ab8f219ffe33edef9795115f
-
SSDEEP
6144:yorf3lPvovsgZnqG2C7mOTeiLRDYifGyu3njp0jCFMqAqmXy7wCEIRrpwuY9ojeE:fU5rCOTeidJGyuXt64wy7rbW9RXDZu
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1556 1A98.tmp 3348 1BD0.tmp 800 1CBA.tmp 1712 1D86.tmp 1856 1E22.tmp 4796 1F0C.tmp 1684 1F7A.tmp 4160 2074.tmp 1332 214E.tmp 1576 21EB.tmp 4820 2268.tmp 2388 22E5.tmp 3284 2381.tmp 3868 242D.tmp 2128 24D9.tmp 4116 2584.tmp 2224 25F2.tmp 4352 269E.tmp 2324 272A.tmp 4488 2824.tmp 3332 28EF.tmp 4336 298C.tmp 2808 2A09.tmp 4672 2AF3.tmp 1716 2B60.tmp 208 2BCE.tmp 1864 2D26.tmp 1788 2DA3.tmp 2756 2E20.tmp 2220 2E8D.tmp 3496 2EFA.tmp 4156 2F87.tmp 4784 30A0.tmp 3840 313C.tmp 2932 31B9.tmp 2132 3236.tmp 2244 32B3.tmp 2408 3350.tmp 4980 33EC.tmp 1216 34A7.tmp 5116 3515.tmp 3248 3592.tmp 4656 363E.tmp 3120 36BB.tmp 3348 3767.tmp 4988 37D4.tmp 4924 388F.tmp 3568 390C.tmp 1916 3989.tmp 3292 3A06.tmp 4484 3B9D.tmp 5112 3C1A.tmp 4568 3C87.tmp 1332 3CF4.tmp 3324 3E2D.tmp 1604 3E9A.tmp 4572 3F08.tmp 4580 3F85.tmp 1548 4011.tmp 4648 40CD.tmp 2176 413A.tmp 2044 41A8.tmp 3420 4253.tmp 4832 42C1.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 1556 4404 2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe 90 PID 4404 wrote to memory of 1556 4404 2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe 90 PID 4404 wrote to memory of 1556 4404 2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe 90 PID 1556 wrote to memory of 3348 1556 1A98.tmp 134 PID 1556 wrote to memory of 3348 1556 1A98.tmp 134 PID 1556 wrote to memory of 3348 1556 1A98.tmp 134 PID 3348 wrote to memory of 800 3348 1BD0.tmp 92 PID 3348 wrote to memory of 800 3348 1BD0.tmp 92 PID 3348 wrote to memory of 800 3348 1BD0.tmp 92 PID 800 wrote to memory of 1712 800 1CBA.tmp 93 PID 800 wrote to memory of 1712 800 1CBA.tmp 93 PID 800 wrote to memory of 1712 800 1CBA.tmp 93 PID 1712 wrote to memory of 1856 1712 1D86.tmp 94 PID 1712 wrote to memory of 1856 1712 1D86.tmp 94 PID 1712 wrote to memory of 1856 1712 1D86.tmp 94 PID 1856 wrote to memory of 4796 1856 1E22.tmp 95 PID 1856 wrote to memory of 4796 1856 1E22.tmp 95 PID 1856 wrote to memory of 4796 1856 1E22.tmp 95 PID 4796 wrote to memory of 1684 4796 1F0C.tmp 96 PID 4796 wrote to memory of 1684 4796 1F0C.tmp 96 PID 4796 wrote to memory of 1684 4796 1F0C.tmp 96 PID 1684 wrote to memory of 4160 1684 1F7A.tmp 97 PID 1684 wrote to memory of 4160 1684 1F7A.tmp 97 PID 1684 wrote to memory of 4160 1684 1F7A.tmp 97 PID 4160 wrote to memory of 1332 4160 2074.tmp 143 PID 4160 wrote to memory of 1332 4160 2074.tmp 143 PID 4160 wrote to memory of 1332 4160 2074.tmp 143 PID 1332 wrote to memory of 1576 1332 214E.tmp 99 PID 1332 wrote to memory of 1576 1332 214E.tmp 99 PID 1332 wrote to memory of 1576 1332 214E.tmp 99 PID 1576 wrote to memory of 4820 1576 21EB.tmp 100 PID 1576 wrote to memory of 4820 1576 21EB.tmp 100 PID 1576 wrote to memory of 4820 1576 21EB.tmp 100 PID 4820 wrote to memory of 2388 4820 2268.tmp 101 PID 4820 wrote to memory of 2388 4820 2268.tmp 101 PID 4820 wrote to memory of 2388 4820 2268.tmp 101 PID 2388 wrote to memory of 3284 2388 22E5.tmp 102 PID 2388 wrote to memory of 3284 2388 22E5.tmp 102 PID 2388 wrote to memory of 3284 2388 22E5.tmp 102 PID 3284 wrote to memory of 3868 3284 2381.tmp 103 PID 3284 wrote to memory of 3868 3284 2381.tmp 103 PID 3284 wrote to memory of 3868 3284 2381.tmp 103 PID 3868 wrote to memory of 2128 3868 242D.tmp 104 PID 3868 wrote to memory of 2128 3868 242D.tmp 104 PID 3868 wrote to memory of 2128 3868 242D.tmp 104 PID 2128 wrote to memory of 4116 2128 24D9.tmp 105 PID 2128 wrote to memory of 4116 2128 24D9.tmp 105 PID 2128 wrote to memory of 4116 2128 24D9.tmp 105 PID 4116 wrote to memory of 2224 4116 2584.tmp 106 PID 4116 wrote to memory of 2224 4116 2584.tmp 106 PID 4116 wrote to memory of 2224 4116 2584.tmp 106 PID 2224 wrote to memory of 4352 2224 25F2.tmp 107 PID 2224 wrote to memory of 4352 2224 25F2.tmp 107 PID 2224 wrote to memory of 4352 2224 25F2.tmp 107 PID 4352 wrote to memory of 2324 4352 269E.tmp 108 PID 4352 wrote to memory of 2324 4352 269E.tmp 108 PID 4352 wrote to memory of 2324 4352 269E.tmp 108 PID 2324 wrote to memory of 4488 2324 272A.tmp 109 PID 2324 wrote to memory of 4488 2324 272A.tmp 109 PID 2324 wrote to memory of 4488 2324 272A.tmp 109 PID 4488 wrote to memory of 3332 4488 2824.tmp 110 PID 4488 wrote to memory of 3332 4488 2824.tmp 110 PID 4488 wrote to memory of 3332 4488 2824.tmp 110 PID 3332 wrote to memory of 4336 3332 28EF.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_f830b64849a4da17271b149880472af1_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\1E22.tmp"C:\Users\Admin\AppData\Local\Temp\1E22.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\2074.tmp"C:\Users\Admin\AppData\Local\Temp\2074.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\21EB.tmp"C:\Users\Admin\AppData\Local\Temp\21EB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\2268.tmp"C:\Users\Admin\AppData\Local\Temp\2268.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\269E.tmp"C:\Users\Admin\AppData\Local\Temp\269E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\272A.tmp"C:\Users\Admin\AppData\Local\Temp\272A.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"23⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\2A09.tmp"C:\Users\Admin\AppData\Local\Temp\2A09.tmp"24⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"25⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\2B60.tmp"C:\Users\Admin\AppData\Local\Temp\2B60.tmp"26⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"27⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"28⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"29⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"30⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"31⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"32⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"33⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\30A0.tmp"C:\Users\Admin\AppData\Local\Temp\30A0.tmp"34⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"35⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\31B9.tmp"C:\Users\Admin\AppData\Local\Temp\31B9.tmp"36⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"37⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\32B3.tmp"C:\Users\Admin\AppData\Local\Temp\32B3.tmp"38⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"39⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"40⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"41⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\3515.tmp"C:\Users\Admin\AppData\Local\Temp\3515.tmp"42⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\3592.tmp"C:\Users\Admin\AppData\Local\Temp\3592.tmp"43⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\363E.tmp"C:\Users\Admin\AppData\Local\Temp\363E.tmp"44⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\36BB.tmp"C:\Users\Admin\AppData\Local\Temp\36BB.tmp"45⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"46⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"47⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\388F.tmp"C:\Users\Admin\AppData\Local\Temp\388F.tmp"48⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"49⤵
- Executes dropped EXE
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"50⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"51⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"52⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"53⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"54⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"55⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"56⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"57⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"58⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"59⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"60⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\40CD.tmp"C:\Users\Admin\AppData\Local\Temp\40CD.tmp"61⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\413A.tmp"C:\Users\Admin\AppData\Local\Temp\413A.tmp"62⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"63⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"64⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"65⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"66⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\44E4.tmp"C:\Users\Admin\AppData\Local\Temp\44E4.tmp"67⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"68⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"69⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"70⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"71⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\4801.tmp"C:\Users\Admin\AppData\Local\Temp\4801.tmp"72⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"73⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\48DB.tmp"C:\Users\Admin\AppData\Local\Temp\48DB.tmp"74⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"75⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"76⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"77⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"78⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"79⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\5119.tmp"C:\Users\Admin\AppData\Local\Temp\5119.tmp"80⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\51C5.tmp"C:\Users\Admin\AppData\Local\Temp\51C5.tmp"81⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\52ED.tmp"C:\Users\Admin\AppData\Local\Temp\52ED.tmp"82⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\535B.tmp"C:\Users\Admin\AppData\Local\Temp\535B.tmp"83⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"84⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\5445.tmp"C:\Users\Admin\AppData\Local\Temp\5445.tmp"85⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"86⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"87⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"88⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\57B0.tmp"C:\Users\Admin\AppData\Local\Temp\57B0.tmp"89⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\588B.tmp"C:\Users\Admin\AppData\Local\Temp\588B.tmp"90⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\5918.tmp"C:\Users\Admin\AppData\Local\Temp\5918.tmp"91⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\5995.tmp"C:\Users\Admin\AppData\Local\Temp\5995.tmp"92⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"93⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"94⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"95⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"96⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\5C73.tmp"C:\Users\Admin\AppData\Local\Temp\5C73.tmp"97⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\5D00.tmp"C:\Users\Admin\AppData\Local\Temp\5D00.tmp"98⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"99⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"100⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"101⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"102⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\5F42.tmp"C:\Users\Admin\AppData\Local\Temp\5F42.tmp"103⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"104⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\602C.tmp"C:\Users\Admin\AppData\Local\Temp\602C.tmp"105⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\6099.tmp"C:\Users\Admin\AppData\Local\Temp\6099.tmp"106⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\6107.tmp"C:\Users\Admin\AppData\Local\Temp\6107.tmp"107⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\624F.tmp"C:\Users\Admin\AppData\Local\Temp\624F.tmp"108⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\62BC.tmp"C:\Users\Admin\AppData\Local\Temp\62BC.tmp"109⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\632A.tmp"C:\Users\Admin\AppData\Local\Temp\632A.tmp"110⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\6397.tmp"C:\Users\Admin\AppData\Local\Temp\6397.tmp"111⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\6443.tmp"C:\Users\Admin\AppData\Local\Temp\6443.tmp"112⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"113⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\654D.tmp"C:\Users\Admin\AppData\Local\Temp\654D.tmp"114⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\65CA.tmp"C:\Users\Admin\AppData\Local\Temp\65CA.tmp"115⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6647.tmp"C:\Users\Admin\AppData\Local\Temp\6647.tmp"116⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"117⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\678F.tmp"C:\Users\Admin\AppData\Local\Temp\678F.tmp"118⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\67FC.tmp"C:\Users\Admin\AppData\Local\Temp\67FC.tmp"119⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\6869.tmp"C:\Users\Admin\AppData\Local\Temp\6869.tmp"120⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\6925.tmp"C:\Users\Admin\AppData\Local\Temp\6925.tmp"121⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\6992.tmp"C:\Users\Admin\AppData\Local\Temp\6992.tmp"122⤵PID:2288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-