Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe
-
Size
488KB
-
MD5
de892a449efe04833129632ba3c4b608
-
SHA1
f3445beab6cec43d77e7aa37c86ef1fb843443d5
-
SHA256
3f8f1227c495160f71ba35b96d197383a288c6deee903bc7ad900b2d60f05ab0
-
SHA512
dde6bb50fd7b16affbdcd13b9d34e8a49cf1d470bb0b53777cd50c52cb23f989874b9c522830659ce5aab547604e5102787a4fdcfebca5536364545821215f2e
-
SSDEEP
12288:/U5rCOTeiD2uv6fwxoJI0BvTLPwLu62NZ:/UQOJD2w6VvZTDwKTN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4252 7668.tmp 1180 76F5.tmp 5048 77A1.tmp 5116 78D9.tmp 3468 79C4.tmp 1012 7A8F.tmp 4192 7B1B.tmp 2912 7BC7.tmp 4780 7C73.tmp 4700 7D2F.tmp 3600 7DAC.tmp 1760 7E48.tmp 4548 7EE4.tmp 2928 7F61.tmp 4236 7FFD.tmp 1384 80A9.tmp 1336 8146.tmp 2368 81C3.tmp 3284 826E.tmp 2444 830B.tmp 1648 8378.tmp 4944 8424.tmp 3444 84DF.tmp 3480 880C.tmp 4692 88B8.tmp 3584 8954.tmp 352 89E1.tmp 5044 8A8D.tmp 224 8CCF.tmp 2276 8DC9.tmp 4876 8EA3.tmp 3252 8F40.tmp 2508 8FEC.tmp 1732 9191.tmp 2188 922E.tmp 1572 92DA.tmp 2952 9376.tmp 4940 93E3.tmp 3880 9460.tmp 5076 94BE.tmp 5116 952B.tmp 4840 9942.tmp 4908 99CF.tmp 4060 9A5B.tmp 3504 9AF8.tmp 2856 9C9E.tmp 3696 9D1B.tmp 668 9DB7.tmp 1612 9E43.tmp 4700 9EC0.tmp 784 9F6C.tmp 1164 9FF9.tmp 2928 A0C4.tmp 4632 A141.tmp 1624 A1AE.tmp 2368 A20C.tmp 2636 A289.tmp 1492 A306.tmp 3920 A3A2.tmp 3776 A410.tmp 4944 A48D.tmp 2192 A519.tmp 2960 A7B9.tmp 1292 A827.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3708 wrote to memory of 4252 3708 2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe 85 PID 3708 wrote to memory of 4252 3708 2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe 85 PID 3708 wrote to memory of 4252 3708 2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe 85 PID 4252 wrote to memory of 1180 4252 7668.tmp 87 PID 4252 wrote to memory of 1180 4252 7668.tmp 87 PID 4252 wrote to memory of 1180 4252 7668.tmp 87 PID 1180 wrote to memory of 5048 1180 76F5.tmp 88 PID 1180 wrote to memory of 5048 1180 76F5.tmp 88 PID 1180 wrote to memory of 5048 1180 76F5.tmp 88 PID 5048 wrote to memory of 5116 5048 77A1.tmp 90 PID 5048 wrote to memory of 5116 5048 77A1.tmp 90 PID 5048 wrote to memory of 5116 5048 77A1.tmp 90 PID 5116 wrote to memory of 3468 5116 78D9.tmp 91 PID 5116 wrote to memory of 3468 5116 78D9.tmp 91 PID 5116 wrote to memory of 3468 5116 78D9.tmp 91 PID 3468 wrote to memory of 1012 3468 79C4.tmp 93 PID 3468 wrote to memory of 1012 3468 79C4.tmp 93 PID 3468 wrote to memory of 1012 3468 79C4.tmp 93 PID 1012 wrote to memory of 4192 1012 7A8F.tmp 94 PID 1012 wrote to memory of 4192 1012 7A8F.tmp 94 PID 1012 wrote to memory of 4192 1012 7A8F.tmp 94 PID 4192 wrote to memory of 2912 4192 7B1B.tmp 95 PID 4192 wrote to memory of 2912 4192 7B1B.tmp 95 PID 4192 wrote to memory of 2912 4192 7B1B.tmp 95 PID 2912 wrote to memory of 4780 2912 7BC7.tmp 96 PID 2912 wrote to memory of 4780 2912 7BC7.tmp 96 PID 2912 wrote to memory of 4780 2912 7BC7.tmp 96 PID 4780 wrote to memory of 4700 4780 7C73.tmp 97 PID 4780 wrote to memory of 4700 4780 7C73.tmp 97 PID 4780 wrote to memory of 4700 4780 7C73.tmp 97 PID 4700 wrote to memory of 3600 4700 7D2F.tmp 98 PID 4700 wrote to memory of 3600 4700 7D2F.tmp 98 PID 4700 wrote to memory of 3600 4700 7D2F.tmp 98 PID 3600 wrote to memory of 1760 3600 7DAC.tmp 99 PID 3600 wrote to memory of 1760 3600 7DAC.tmp 99 PID 3600 wrote to memory of 1760 3600 7DAC.tmp 99 PID 1760 wrote to memory of 4548 1760 7E48.tmp 100 PID 1760 wrote to memory of 4548 1760 7E48.tmp 100 PID 1760 wrote to memory of 4548 1760 7E48.tmp 100 PID 4548 wrote to memory of 2928 4548 7EE4.tmp 101 PID 4548 wrote to memory of 2928 4548 7EE4.tmp 101 PID 4548 wrote to memory of 2928 4548 7EE4.tmp 101 PID 2928 wrote to memory of 4236 2928 7F61.tmp 102 PID 2928 wrote to memory of 4236 2928 7F61.tmp 102 PID 2928 wrote to memory of 4236 2928 7F61.tmp 102 PID 4236 wrote to memory of 1384 4236 7FFD.tmp 103 PID 4236 wrote to memory of 1384 4236 7FFD.tmp 103 PID 4236 wrote to memory of 1384 4236 7FFD.tmp 103 PID 1384 wrote to memory of 1336 1384 80A9.tmp 104 PID 1384 wrote to memory of 1336 1384 80A9.tmp 104 PID 1384 wrote to memory of 1336 1384 80A9.tmp 104 PID 1336 wrote to memory of 2368 1336 8146.tmp 105 PID 1336 wrote to memory of 2368 1336 8146.tmp 105 PID 1336 wrote to memory of 2368 1336 8146.tmp 105 PID 2368 wrote to memory of 3284 2368 81C3.tmp 106 PID 2368 wrote to memory of 3284 2368 81C3.tmp 106 PID 2368 wrote to memory of 3284 2368 81C3.tmp 106 PID 3284 wrote to memory of 2444 3284 826E.tmp 107 PID 3284 wrote to memory of 2444 3284 826E.tmp 107 PID 3284 wrote to memory of 2444 3284 826E.tmp 107 PID 2444 wrote to memory of 1648 2444 830B.tmp 110 PID 2444 wrote to memory of 1648 2444 830B.tmp 110 PID 2444 wrote to memory of 1648 2444 830B.tmp 110 PID 1648 wrote to memory of 4944 1648 8378.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_de892a449efe04833129632ba3c4b608_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\76F5.tmp"C:\Users\Admin\AppData\Local\Temp\76F5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\78D9.tmp"C:\Users\Admin\AppData\Local\Temp\78D9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\79C4.tmp"C:\Users\Admin\AppData\Local\Temp\79C4.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\7F61.tmp"C:\Users\Admin\AppData\Local\Temp\7F61.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\80A9.tmp"C:\Users\Admin\AppData\Local\Temp\80A9.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\8146.tmp"C:\Users\Admin\AppData\Local\Temp\8146.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\81C3.tmp"C:\Users\Admin\AppData\Local\Temp\81C3.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\8378.tmp"C:\Users\Admin\AppData\Local\Temp\8378.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\8424.tmp"C:\Users\Admin\AppData\Local\Temp\8424.tmp"23⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\84DF.tmp"C:\Users\Admin\AppData\Local\Temp\84DF.tmp"24⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\880C.tmp"C:\Users\Admin\AppData\Local\Temp\880C.tmp"25⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\88B8.tmp"C:\Users\Admin\AppData\Local\Temp\88B8.tmp"26⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"27⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\89E1.tmp"C:\Users\Admin\AppData\Local\Temp\89E1.tmp"28⤵
- Executes dropped EXE
PID:352 -
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"29⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"30⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"31⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"32⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\8F40.tmp"C:\Users\Admin\AppData\Local\Temp\8F40.tmp"33⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"34⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\90E6.tmp"C:\Users\Admin\AppData\Local\Temp\90E6.tmp"35⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\9191.tmp"C:\Users\Admin\AppData\Local\Temp\9191.tmp"36⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"37⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\92DA.tmp"C:\Users\Admin\AppData\Local\Temp\92DA.tmp"38⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"39⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\93E3.tmp"C:\Users\Admin\AppData\Local\Temp\93E3.tmp"40⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\9460.tmp"C:\Users\Admin\AppData\Local\Temp\9460.tmp"41⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\94BE.tmp"C:\Users\Admin\AppData\Local\Temp\94BE.tmp"42⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\952B.tmp"C:\Users\Admin\AppData\Local\Temp\952B.tmp"43⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"44⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\99CF.tmp"C:\Users\Admin\AppData\Local\Temp\99CF.tmp"45⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"46⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\9AF8.tmp"C:\Users\Admin\AppData\Local\Temp\9AF8.tmp"47⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\9C9E.tmp"C:\Users\Admin\AppData\Local\Temp\9C9E.tmp"48⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"49⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\9DB7.tmp"C:\Users\Admin\AppData\Local\Temp\9DB7.tmp"50⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\9E43.tmp"C:\Users\Admin\AppData\Local\Temp\9E43.tmp"51⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"52⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"53⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"54⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"55⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"56⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"57⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\A20C.tmp"C:\Users\Admin\AppData\Local\Temp\A20C.tmp"58⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\A289.tmp"C:\Users\Admin\AppData\Local\Temp\A289.tmp"59⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\A306.tmp"C:\Users\Admin\AppData\Local\Temp\A306.tmp"60⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"61⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\A410.tmp"C:\Users\Admin\AppData\Local\Temp\A410.tmp"62⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\A48D.tmp"C:\Users\Admin\AppData\Local\Temp\A48D.tmp"63⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\A519.tmp"C:\Users\Admin\AppData\Local\Temp\A519.tmp"64⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"65⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"66⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\A894.tmp"C:\Users\Admin\AppData\Local\Temp\A894.tmp"67⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\A921.tmp"C:\Users\Admin\AppData\Local\Temp\A921.tmp"68⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"69⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"70⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\AA98.tmp"C:\Users\Admin\AppData\Local\Temp\AA98.tmp"71⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"72⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\AD66.tmp"C:\Users\Admin\AppData\Local\Temp\AD66.tmp"73⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"74⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"75⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\AEED.tmp"C:\Users\Admin\AppData\Local\Temp\AEED.tmp"76⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"77⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\B026.tmp"C:\Users\Admin\AppData\Local\Temp\B026.tmp"78⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\B120.tmp"C:\Users\Admin\AppData\Local\Temp\B120.tmp"79⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"80⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\B323.tmp"C:\Users\Admin\AppData\Local\Temp\B323.tmp"81⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\B40E.tmp"C:\Users\Admin\AppData\Local\Temp\B40E.tmp"82⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\B4B9.tmp"C:\Users\Admin\AppData\Local\Temp\B4B9.tmp"83⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"84⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"85⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\B72A.tmp"C:\Users\Admin\AppData\Local\Temp\B72A.tmp"86⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\B805.tmp"C:\Users\Admin\AppData\Local\Temp\B805.tmp"87⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\B882.tmp"C:\Users\Admin\AppData\Local\Temp\B882.tmp"88⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"89⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"90⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"91⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"92⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"93⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"94⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"95⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"96⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"97⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"98⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\BF77.tmp"C:\Users\Admin\AppData\Local\Temp\BF77.tmp"99⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\C004.tmp"C:\Users\Admin\AppData\Local\Temp\C004.tmp"100⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\C091.tmp"C:\Users\Admin\AppData\Local\Temp\C091.tmp"101⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"102⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"103⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"104⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"105⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"106⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"107⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"108⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"109⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\C553.tmp"C:\Users\Admin\AppData\Local\Temp\C553.tmp"110⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"111⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\C63E.tmp"C:\Users\Admin\AppData\Local\Temp\C63E.tmp"112⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"113⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"114⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"115⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"116⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"117⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"118⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"119⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"120⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\D36D.tmp"C:\Users\Admin\AppData\Local\Temp\D36D.tmp"121⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\D409.tmp"C:\Users\Admin\AppData\Local\Temp\D409.tmp"122⤵PID:980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-