Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe
-
Size
487KB
-
MD5
cc8ecf5250d4591be423d65e1acee2db
-
SHA1
2b2d6673b284a0856fbe5e38a34ec9b29591de6a
-
SHA256
31599af8b003451f48ec8b6765adc9756ed63ca0e64d5dae88ed9d74f20aeb91
-
SHA512
703db27d79e62df93c0baff793d61fc99543f8260a1c30c24e6793a6e7ea746fdf1612fbceeecadef7ecd4f57bace1d2413730fd93398ce15decedd76d14cb9e
-
SSDEEP
12288:HU5rCOTeiJ0UQwRsAJt5wDRSJaqR/sVsNZ:HUQOJJ0l8sL+aqFTN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4444 3D91.tmp 3416 3F85.tmp 2248 414A.tmp 1828 43F9.tmp 872 459F.tmp 5020 4764.tmp 1528 490A.tmp 1028 4A52.tmp 456 4BE9.tmp 2340 4CF2.tmp 1092 4E5A.tmp 1588 4FD1.tmp 1744 5138.tmp 2104 52DE.tmp 2408 5464.tmp 372 5530.tmp 2108 56D5.tmp 3832 584C.tmp 4736 5985.tmp 528 5A6F.tmp 996 5BE6.tmp 3324 5D3E.tmp 1204 5F61.tmp 3036 6116.tmp 1712 628D.tmp 912 63F5.tmp 1424 650E.tmp 3616 6647.tmp 4396 679E.tmp 1120 6954.tmp 688 6ABB.tmp 3028 6BE4.tmp 4072 6CDE.tmp 2884 6D5B.tmp 3348 6E36.tmp 2892 6EF1.tmp 2756 6FCC.tmp 232 7088.tmp 1096 7143.tmp 768 71C0.tmp 2388 729B.tmp 2956 7347.tmp 1028 7431.tmp 456 750C.tmp 4820 75F6.tmp 64 76B2.tmp 2172 776D.tmp 4596 7829.tmp 3804 78E4.tmp 388 79CF.tmp 2104 7A8A.tmp 1820 7B46.tmp 3664 7C40.tmp 1476 7D59.tmp 2108 7E43.tmp 2220 7F0E.tmp 4752 7FBA.tmp 2828 8085.tmp 3172 8141.tmp 1768 8289.tmp 4848 8335.tmp 4780 841F.tmp 4560 850A.tmp 2440 85C5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 4444 992 2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe 92 PID 992 wrote to memory of 4444 992 2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe 92 PID 992 wrote to memory of 4444 992 2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe 92 PID 4444 wrote to memory of 3416 4444 3D91.tmp 93 PID 4444 wrote to memory of 3416 4444 3D91.tmp 93 PID 4444 wrote to memory of 3416 4444 3D91.tmp 93 PID 3416 wrote to memory of 2248 3416 3F85.tmp 95 PID 3416 wrote to memory of 2248 3416 3F85.tmp 95 PID 3416 wrote to memory of 2248 3416 3F85.tmp 95 PID 2248 wrote to memory of 1828 2248 414A.tmp 96 PID 2248 wrote to memory of 1828 2248 414A.tmp 96 PID 2248 wrote to memory of 1828 2248 414A.tmp 96 PID 1828 wrote to memory of 872 1828 43F9.tmp 97 PID 1828 wrote to memory of 872 1828 43F9.tmp 97 PID 1828 wrote to memory of 872 1828 43F9.tmp 97 PID 872 wrote to memory of 5020 872 459F.tmp 98 PID 872 wrote to memory of 5020 872 459F.tmp 98 PID 872 wrote to memory of 5020 872 459F.tmp 98 PID 5020 wrote to memory of 1528 5020 4764.tmp 99 PID 5020 wrote to memory of 1528 5020 4764.tmp 99 PID 5020 wrote to memory of 1528 5020 4764.tmp 99 PID 1528 wrote to memory of 1028 1528 490A.tmp 100 PID 1528 wrote to memory of 1028 1528 490A.tmp 100 PID 1528 wrote to memory of 1028 1528 490A.tmp 100 PID 1028 wrote to memory of 456 1028 4A52.tmp 101 PID 1028 wrote to memory of 456 1028 4A52.tmp 101 PID 1028 wrote to memory of 456 1028 4A52.tmp 101 PID 456 wrote to memory of 2340 456 4BE9.tmp 102 PID 456 wrote to memory of 2340 456 4BE9.tmp 102 PID 456 wrote to memory of 2340 456 4BE9.tmp 102 PID 2340 wrote to memory of 1092 2340 4CF2.tmp 103 PID 2340 wrote to memory of 1092 2340 4CF2.tmp 103 PID 2340 wrote to memory of 1092 2340 4CF2.tmp 103 PID 1092 wrote to memory of 1588 1092 4E5A.tmp 104 PID 1092 wrote to memory of 1588 1092 4E5A.tmp 104 PID 1092 wrote to memory of 1588 1092 4E5A.tmp 104 PID 1588 wrote to memory of 1744 1588 4FD1.tmp 105 PID 1588 wrote to memory of 1744 1588 4FD1.tmp 105 PID 1588 wrote to memory of 1744 1588 4FD1.tmp 105 PID 1744 wrote to memory of 2104 1744 5138.tmp 106 PID 1744 wrote to memory of 2104 1744 5138.tmp 106 PID 1744 wrote to memory of 2104 1744 5138.tmp 106 PID 2104 wrote to memory of 2408 2104 52DE.tmp 107 PID 2104 wrote to memory of 2408 2104 52DE.tmp 107 PID 2104 wrote to memory of 2408 2104 52DE.tmp 107 PID 2408 wrote to memory of 372 2408 5464.tmp 108 PID 2408 wrote to memory of 372 2408 5464.tmp 108 PID 2408 wrote to memory of 372 2408 5464.tmp 108 PID 372 wrote to memory of 2108 372 5530.tmp 109 PID 372 wrote to memory of 2108 372 5530.tmp 109 PID 372 wrote to memory of 2108 372 5530.tmp 109 PID 2108 wrote to memory of 3832 2108 56D5.tmp 110 PID 2108 wrote to memory of 3832 2108 56D5.tmp 110 PID 2108 wrote to memory of 3832 2108 56D5.tmp 110 PID 3832 wrote to memory of 4736 3832 584C.tmp 111 PID 3832 wrote to memory of 4736 3832 584C.tmp 111 PID 3832 wrote to memory of 4736 3832 584C.tmp 111 PID 4736 wrote to memory of 528 4736 5985.tmp 112 PID 4736 wrote to memory of 528 4736 5985.tmp 112 PID 4736 wrote to memory of 528 4736 5985.tmp 112 PID 528 wrote to memory of 996 528 5A6F.tmp 113 PID 528 wrote to memory of 996 528 5A6F.tmp 113 PID 528 wrote to memory of 996 528 5A6F.tmp 113 PID 996 wrote to memory of 3324 996 5BE6.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-06_cc8ecf5250d4591be423d65e1acee2db_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\43F9.tmp"C:\Users\Admin\AppData\Local\Temp\43F9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\459F.tmp"C:\Users\Admin\AppData\Local\Temp\459F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\4764.tmp"C:\Users\Admin\AppData\Local\Temp\4764.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\4A52.tmp"C:\Users\Admin\AppData\Local\Temp\4A52.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\5138.tmp"C:\Users\Admin\AppData\Local\Temp\5138.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\5464.tmp"C:\Users\Admin\AppData\Local\Temp\5464.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\5530.tmp"C:\Users\Admin\AppData\Local\Temp\5530.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\584C.tmp"C:\Users\Admin\AppData\Local\Temp\584C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"23⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\5F61.tmp"C:\Users\Admin\AppData\Local\Temp\5F61.tmp"24⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"25⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"26⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"27⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\650E.tmp"C:\Users\Admin\AppData\Local\Temp\650E.tmp"28⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\6647.tmp"C:\Users\Admin\AppData\Local\Temp\6647.tmp"29⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\679E.tmp"C:\Users\Admin\AppData\Local\Temp\679E.tmp"30⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\6954.tmp"C:\Users\Admin\AppData\Local\Temp\6954.tmp"31⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\6ABB.tmp"C:\Users\Admin\AppData\Local\Temp\6ABB.tmp"32⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"33⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"34⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"35⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\6E36.tmp"C:\Users\Admin\AppData\Local\Temp\6E36.tmp"36⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"37⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"38⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"39⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\7143.tmp"C:\Users\Admin\AppData\Local\Temp\7143.tmp"40⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"41⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Temp\729B.tmp"C:\Users\Admin\AppData\Local\Temp\729B.tmp"42⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\7347.tmp"C:\Users\Admin\AppData\Local\Temp\7347.tmp"43⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"44⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\750C.tmp"C:\Users\Admin\AppData\Local\Temp\750C.tmp"45⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\75F6.tmp"C:\Users\Admin\AppData\Local\Temp\75F6.tmp"46⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\76B2.tmp"C:\Users\Admin\AppData\Local\Temp\76B2.tmp"47⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\776D.tmp"C:\Users\Admin\AppData\Local\Temp\776D.tmp"48⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\7829.tmp"C:\Users\Admin\AppData\Local\Temp\7829.tmp"49⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\78E4.tmp"C:\Users\Admin\AppData\Local\Temp\78E4.tmp"50⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\79CF.tmp"C:\Users\Admin\AppData\Local\Temp\79CF.tmp"51⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"52⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\7B46.tmp"C:\Users\Admin\AppData\Local\Temp\7B46.tmp"53⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\7C40.tmp"C:\Users\Admin\AppData\Local\Temp\7C40.tmp"54⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\7D59.tmp"C:\Users\Admin\AppData\Local\Temp\7D59.tmp"55⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\7E43.tmp"C:\Users\Admin\AppData\Local\Temp\7E43.tmp"56⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"57⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\7FBA.tmp"C:\Users\Admin\AppData\Local\Temp\7FBA.tmp"58⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\8085.tmp"C:\Users\Admin\AppData\Local\Temp\8085.tmp"59⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\8141.tmp"C:\Users\Admin\AppData\Local\Temp\8141.tmp"60⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\8289.tmp"C:\Users\Admin\AppData\Local\Temp\8289.tmp"61⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\8335.tmp"C:\Users\Admin\AppData\Local\Temp\8335.tmp"62⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"63⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\850A.tmp"C:\Users\Admin\AppData\Local\Temp\850A.tmp"64⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\85C5.tmp"C:\Users\Admin\AppData\Local\Temp\85C5.tmp"65⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\8690.tmp"C:\Users\Admin\AppData\Local\Temp\8690.tmp"66⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\876B.tmp"C:\Users\Admin\AppData\Local\Temp\876B.tmp"67⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\8826.tmp"C:\Users\Admin\AppData\Local\Temp\8826.tmp"68⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\8901.tmp"C:\Users\Admin\AppData\Local\Temp\8901.tmp"69⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\89BD.tmp"C:\Users\Admin\AppData\Local\Temp\89BD.tmp"70⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\8A69.tmp"C:\Users\Admin\AppData\Local\Temp\8A69.tmp"71⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\8B05.tmp"C:\Users\Admin\AppData\Local\Temp\8B05.tmp"72⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\8B91.tmp"C:\Users\Admin\AppData\Local\Temp\8B91.tmp"73⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"74⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"75⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\8D66.tmp"C:\Users\Admin\AppData\Local\Temp\8D66.tmp"76⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\8E22.tmp"C:\Users\Admin\AppData\Local\Temp\8E22.tmp"77⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\8EED.tmp"C:\Users\Admin\AppData\Local\Temp\8EED.tmp"78⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\9006.tmp"C:\Users\Admin\AppData\Local\Temp\9006.tmp"79⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\90B2.tmp"C:\Users\Admin\AppData\Local\Temp\90B2.tmp"80⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\919C.tmp"C:\Users\Admin\AppData\Local\Temp\919C.tmp"81⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\9287.tmp"C:\Users\Admin\AppData\Local\Temp\9287.tmp"82⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\9323.tmp"C:\Users\Admin\AppData\Local\Temp\9323.tmp"83⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\93BF.tmp"C:\Users\Admin\AppData\Local\Temp\93BF.tmp"84⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\947B.tmp"C:\Users\Admin\AppData\Local\Temp\947B.tmp"85⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\9555.tmp"C:\Users\Admin\AppData\Local\Temp\9555.tmp"86⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\95F2.tmp"C:\Users\Admin\AppData\Local\Temp\95F2.tmp"87⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\967E.tmp"C:\Users\Admin\AppData\Local\Temp\967E.tmp"88⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\970B.tmp"C:\Users\Admin\AppData\Local\Temp\970B.tmp"89⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\97C6.tmp"C:\Users\Admin\AppData\Local\Temp\97C6.tmp"90⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\98A1.tmp"C:\Users\Admin\AppData\Local\Temp\98A1.tmp"91⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\991E.tmp"C:\Users\Admin\AppData\Local\Temp\991E.tmp"92⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\998C.tmp"C:\Users\Admin\AppData\Local\Temp\998C.tmp"93⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\99E9.tmp"C:\Users\Admin\AppData\Local\Temp\99E9.tmp"94⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\9AB4.tmp"C:\Users\Admin\AppData\Local\Temp\9AB4.tmp"95⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\9B60.tmp"C:\Users\Admin\AppData\Local\Temp\9B60.tmp"96⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"97⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\9D45.tmp"C:\Users\Admin\AppData\Local\Temp\9D45.tmp"98⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"99⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"100⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\9FB6.tmp"C:\Users\Admin\AppData\Local\Temp\9FB6.tmp"101⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\A090.tmp"C:\Users\Admin\AppData\Local\Temp\A090.tmp"102⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\A15C.tmp"C:\Users\Admin\AppData\Local\Temp\A15C.tmp"103⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\A236.tmp"C:\Users\Admin\AppData\Local\Temp\A236.tmp"104⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\A2D3.tmp"C:\Users\Admin\AppData\Local\Temp\A2D3.tmp"105⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\A36F.tmp"C:\Users\Admin\AppData\Local\Temp\A36F.tmp"106⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\A459.tmp"C:\Users\Admin\AppData\Local\Temp\A459.tmp"107⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\A544.tmp"C:\Users\Admin\AppData\Local\Temp\A544.tmp"108⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\A5EF.tmp"C:\Users\Admin\AppData\Local\Temp\A5EF.tmp"109⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"110⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\A776.tmp"C:\Users\Admin\AppData\Local\Temp\A776.tmp"111⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\A822.tmp"C:\Users\Admin\AppData\Local\Temp\A822.tmp"112⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"113⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\A9D7.tmp"C:\Users\Admin\AppData\Local\Temp\A9D7.tmp"114⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\AA64.tmp"C:\Users\Admin\AppData\Local\Temp\AA64.tmp"115⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\AB3F.tmp"C:\Users\Admin\AppData\Local\Temp\AB3F.tmp"116⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\AC39.tmp"C:\Users\Admin\AppData\Local\Temp\AC39.tmp"117⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"118⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\ADA0.tmp"C:\Users\Admin\AppData\Local\Temp\ADA0.tmp"119⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\AE7B.tmp"C:\Users\Admin\AppData\Local\Temp\AE7B.tmp"120⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\AF85.tmp"C:\Users\Admin\AppData\Local\Temp\AF85.tmp"121⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\B021.tmp"C:\Users\Admin\AppData\Local\Temp\B021.tmp"122⤵PID:1516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-