Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe
-
Size
520KB
-
MD5
ac1fe77549be44a685674613b39cd0f9
-
SHA1
5871736f8b018b6b7ffdb06e68228fa50e6c02f5
-
SHA256
1db7c7f866a599fcf873bb66bf5c92b36b1dbd9bf623c9b2f646d920ce22a5a3
-
SHA512
7d806aa0a0cb3ddfe7aab3c2fadc33ee1ff901ee05ad0277e3a007def731c59b8d980e65878b8d61ba004bf37a0198b0658535de43ff52237d31b779eb75d520
-
SSDEEP
6144:lLvd/XzCjUIF1UuXLyQjmOH+JjL6gMHLo+vZ0cVejkHuA8JdEnxoDQlrPeWKfps/:roRXOQjmOyuvCcVuJ5dMokLiZ6NZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1864 E34.tmp 2876 E82.tmp 2448 EC0.tmp 2812 EFE.tmp 2808 F3D.tmp 2980 2CEA.tmp 2096 FD9.tmp 2524 1017.tmp 2904 1056.tmp 2668 1094.tmp 2552 10F2.tmp 1852 1130.tmp 2840 117E.tmp 2700 11BC.tmp 2300 11FB.tmp 1676 1239.tmp 2328 1287.tmp 1632 12C6.tmp 1956 1304.tmp 1620 1342.tmp 2852 1381.tmp 1508 13CF.tmp 624 140D.tmp 1316 144C.tmp 2064 149A.tmp 2248 14D8.tmp 3000 1507.tmp 2164 1545.tmp 2836 1584.tmp 2204 15C2.tmp 488 1610.tmp 1028 164E.tmp 716 168D.tmp 1640 16CB.tmp 560 16FA.tmp 1184 1738.tmp 1560 1777.tmp 412 17B5.tmp 2440 17F4.tmp 2368 1822.tmp 1348 1861.tmp 1664 1890.tmp 1616 18CE.tmp 944 190C.tmp 1588 194B.tmp 908 1999.tmp 1872 19D7.tmp 2128 1A06.tmp 1252 1A44.tmp 3016 1A83.tmp 604 1AB2.tmp 2336 1AE0.tmp 880 1B1F.tmp 2136 1B4E.tmp 2424 1B8C.tmp 2512 1C09.tmp 2704 1C38.tmp 2932 1C76.tmp 2720 1CB4.tmp 2820 1CF3.tmp 2772 1D31.tmp 2632 1D70.tmp 2776 1DAE.tmp 2672 1DDD.tmp -
Loads dropped DLL 64 IoCs
pid Process 2512 2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe 1864 E34.tmp 2876 E82.tmp 2448 EC0.tmp 2812 EFE.tmp 2808 F3D.tmp 2980 2CEA.tmp 2096 FD9.tmp 2524 1017.tmp 2904 1056.tmp 2668 1094.tmp 2552 10F2.tmp 1852 1130.tmp 2840 117E.tmp 2700 11BC.tmp 2300 11FB.tmp 1676 1239.tmp 2328 1287.tmp 1632 12C6.tmp 1956 1304.tmp 1620 1342.tmp 2852 1381.tmp 1508 13CF.tmp 624 140D.tmp 1316 144C.tmp 2064 149A.tmp 2248 14D8.tmp 3000 1507.tmp 2164 1545.tmp 2836 1584.tmp 2204 15C2.tmp 488 1610.tmp 1028 164E.tmp 716 168D.tmp 1640 16CB.tmp 560 16FA.tmp 1184 1738.tmp 1560 1777.tmp 412 17B5.tmp 2440 17F4.tmp 2368 1822.tmp 1348 1861.tmp 1664 1890.tmp 1616 18CE.tmp 944 190C.tmp 1588 194B.tmp 908 1999.tmp 1872 19D7.tmp 2128 1A06.tmp 1252 1A44.tmp 3016 1A83.tmp 604 1AB2.tmp 2336 1AE0.tmp 880 1B1F.tmp 2136 1B4E.tmp 1716 1BCA.tmp 2512 1C09.tmp 2704 1C38.tmp 2932 1C76.tmp 2720 1CB4.tmp 2820 1CF3.tmp 2772 1D31.tmp 2632 1D70.tmp 2776 1DAE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1864 2512 2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe 28 PID 2512 wrote to memory of 1864 2512 2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe 28 PID 2512 wrote to memory of 1864 2512 2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe 28 PID 2512 wrote to memory of 1864 2512 2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe 28 PID 1864 wrote to memory of 2876 1864 E34.tmp 183 PID 1864 wrote to memory of 2876 1864 E34.tmp 183 PID 1864 wrote to memory of 2876 1864 E34.tmp 183 PID 1864 wrote to memory of 2876 1864 E34.tmp 183 PID 2876 wrote to memory of 2448 2876 E82.tmp 182 PID 2876 wrote to memory of 2448 2876 E82.tmp 182 PID 2876 wrote to memory of 2448 2876 E82.tmp 182 PID 2876 wrote to memory of 2448 2876 E82.tmp 182 PID 2448 wrote to memory of 2812 2448 EC0.tmp 29 PID 2448 wrote to memory of 2812 2448 EC0.tmp 29 PID 2448 wrote to memory of 2812 2448 EC0.tmp 29 PID 2448 wrote to memory of 2812 2448 EC0.tmp 29 PID 2812 wrote to memory of 2808 2812 EFE.tmp 181 PID 2812 wrote to memory of 2808 2812 EFE.tmp 181 PID 2812 wrote to memory of 2808 2812 EFE.tmp 181 PID 2812 wrote to memory of 2808 2812 EFE.tmp 181 PID 2808 wrote to memory of 2980 2808 F3D.tmp 81 PID 2808 wrote to memory of 2980 2808 F3D.tmp 81 PID 2808 wrote to memory of 2980 2808 F3D.tmp 81 PID 2808 wrote to memory of 2980 2808 F3D.tmp 81 PID 2980 wrote to memory of 2096 2980 2CEA.tmp 180 PID 2980 wrote to memory of 2096 2980 2CEA.tmp 180 PID 2980 wrote to memory of 2096 2980 2CEA.tmp 180 PID 2980 wrote to memory of 2096 2980 2CEA.tmp 180 PID 2096 wrote to memory of 2524 2096 FD9.tmp 179 PID 2096 wrote to memory of 2524 2096 FD9.tmp 179 PID 2096 wrote to memory of 2524 2096 FD9.tmp 179 PID 2096 wrote to memory of 2524 2096 FD9.tmp 179 PID 2524 wrote to memory of 2904 2524 1017.tmp 178 PID 2524 wrote to memory of 2904 2524 1017.tmp 178 PID 2524 wrote to memory of 2904 2524 1017.tmp 178 PID 2524 wrote to memory of 2904 2524 1017.tmp 178 PID 2904 wrote to memory of 2668 2904 1056.tmp 177 PID 2904 wrote to memory of 2668 2904 1056.tmp 177 PID 2904 wrote to memory of 2668 2904 1056.tmp 177 PID 2904 wrote to memory of 2668 2904 1056.tmp 177 PID 2668 wrote to memory of 2552 2668 1094.tmp 176 PID 2668 wrote to memory of 2552 2668 1094.tmp 176 PID 2668 wrote to memory of 2552 2668 1094.tmp 176 PID 2668 wrote to memory of 2552 2668 1094.tmp 176 PID 2552 wrote to memory of 1852 2552 10F2.tmp 175 PID 2552 wrote to memory of 1852 2552 10F2.tmp 175 PID 2552 wrote to memory of 1852 2552 10F2.tmp 175 PID 2552 wrote to memory of 1852 2552 10F2.tmp 175 PID 1852 wrote to memory of 2840 1852 1130.tmp 174 PID 1852 wrote to memory of 2840 1852 1130.tmp 174 PID 1852 wrote to memory of 2840 1852 1130.tmp 174 PID 1852 wrote to memory of 2840 1852 1130.tmp 174 PID 2840 wrote to memory of 2700 2840 117E.tmp 173 PID 2840 wrote to memory of 2700 2840 117E.tmp 173 PID 2840 wrote to memory of 2700 2840 117E.tmp 173 PID 2840 wrote to memory of 2700 2840 117E.tmp 173 PID 2700 wrote to memory of 2300 2700 11BC.tmp 172 PID 2700 wrote to memory of 2300 2700 11BC.tmp 172 PID 2700 wrote to memory of 2300 2700 11BC.tmp 172 PID 2700 wrote to memory of 2300 2700 11BC.tmp 172 PID 2300 wrote to memory of 1676 2300 11FB.tmp 171 PID 2300 wrote to memory of 1676 2300 11FB.tmp 171 PID 2300 wrote to memory of 1676 2300 11FB.tmp 171 PID 2300 wrote to memory of 1676 2300 11FB.tmp 171
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_ac1fe77549be44a685674613b39cd0f9_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C38.tmp"C:\Users\Admin\AppData\Local\Temp\1C38.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\1C76.tmp"C:\Users\Admin\AppData\Local\Temp\1C76.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\EFE.tmp"C:\Users\Admin\AppData\Local\Temp\EFE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\F9A.tmp"C:\Users\Admin\AppData\Local\Temp\F9A.tmp"1⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2D28.tmp"C:\Users\Admin\AppData\Local\Temp\2D28.tmp"2⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2D67.tmp"C:\Users\Admin\AppData\Local\Temp\2D67.tmp"3⤵PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"3⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"4⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"5⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"6⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"7⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"8⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\3562.tmp"C:\Users\Admin\AppData\Local\Temp\3562.tmp"9⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"10⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\35DF.tmp"C:\Users\Admin\AppData\Local\Temp\35DF.tmp"11⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\360E.tmp"C:\Users\Admin\AppData\Local\Temp\360E.tmp"12⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"13⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"14⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"15⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"16⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"17⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"18⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"19⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"20⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"21⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"22⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\38CC.tmp"C:\Users\Admin\AppData\Local\Temp\38CC.tmp"23⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"24⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3968.tmp"C:\Users\Admin\AppData\Local\Temp\3968.tmp"25⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"26⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\3A23.tmp"C:\Users\Admin\AppData\Local\Temp\3A23.tmp"27⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3A71.tmp"C:\Users\Admin\AppData\Local\Temp\3A71.tmp"28⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3AA0.tmp"C:\Users\Admin\AppData\Local\Temp\3AA0.tmp"29⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"30⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"31⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"32⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"33⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"34⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"35⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3C84.tmp"C:\Users\Admin\AppData\Local\Temp\3C84.tmp"36⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"37⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\3D10.tmp"C:\Users\Admin\AppData\Local\Temp\3D10.tmp"38⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\3D4E.tmp"C:\Users\Admin\AppData\Local\Temp\3D4E.tmp"39⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\3DAC.tmp"C:\Users\Admin\AppData\Local\Temp\3DAC.tmp"40⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"41⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\3E38.tmp"C:\Users\Admin\AppData\Local\Temp\3E38.tmp"42⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3E86.tmp"C:\Users\Admin\AppData\Local\Temp\3E86.tmp"43⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"44⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp"45⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"46⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"47⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3FED.tmp"C:\Users\Admin\AppData\Local\Temp\3FED.tmp"48⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\403B.tmp"C:\Users\Admin\AppData\Local\Temp\403B.tmp"49⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\407A.tmp"C:\Users\Admin\AppData\Local\Temp\407A.tmp"50⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\40C8.tmp"C:\Users\Admin\AppData\Local\Temp\40C8.tmp"51⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\4106.tmp"C:\Users\Admin\AppData\Local\Temp\4106.tmp"52⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\4144.tmp"C:\Users\Admin\AppData\Local\Temp\4144.tmp"53⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\4183.tmp"C:\Users\Admin\AppData\Local\Temp\4183.tmp"54⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\41C1.tmp"C:\Users\Admin\AppData\Local\Temp\41C1.tmp"55⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\4200.tmp"C:\Users\Admin\AppData\Local\Temp\4200.tmp"56⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\423E.tmp"C:\Users\Admin\AppData\Local\Temp\423E.tmp"57⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\427C.tmp"C:\Users\Admin\AppData\Local\Temp\427C.tmp"58⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\42BB.tmp"C:\Users\Admin\AppData\Local\Temp\42BB.tmp"59⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\42F9.tmp"C:\Users\Admin\AppData\Local\Temp\42F9.tmp"60⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\4338.tmp"C:\Users\Admin\AppData\Local\Temp\4338.tmp"61⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\4376.tmp"C:\Users\Admin\AppData\Local\Temp\4376.tmp"62⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\43B4.tmp"C:\Users\Admin\AppData\Local\Temp\43B4.tmp"63⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\43F3.tmp"C:\Users\Admin\AppData\Local\Temp\43F3.tmp"64⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\4431.tmp"C:\Users\Admin\AppData\Local\Temp\4431.tmp"65⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\4470.tmp"C:\Users\Admin\AppData\Local\Temp\4470.tmp"66⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\44AE.tmp"C:\Users\Admin\AppData\Local\Temp\44AE.tmp"67⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\44EC.tmp"C:\Users\Admin\AppData\Local\Temp\44EC.tmp"68⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\452B.tmp"C:\Users\Admin\AppData\Local\Temp\452B.tmp"69⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\4569.tmp"C:\Users\Admin\AppData\Local\Temp\4569.tmp"70⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\45A8.tmp"C:\Users\Admin\AppData\Local\Temp\45A8.tmp"71⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\45E6.tmp"C:\Users\Admin\AppData\Local\Temp\45E6.tmp"72⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\4624.tmp"C:\Users\Admin\AppData\Local\Temp\4624.tmp"73⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\4663.tmp"C:\Users\Admin\AppData\Local\Temp\4663.tmp"74⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\46A1.tmp"C:\Users\Admin\AppData\Local\Temp\46A1.tmp"75⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\46E0.tmp"C:\Users\Admin\AppData\Local\Temp\46E0.tmp"76⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\471E.tmp"C:\Users\Admin\AppData\Local\Temp\471E.tmp"77⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\475C.tmp"C:\Users\Admin\AppData\Local\Temp\475C.tmp"78⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\479B.tmp"C:\Users\Admin\AppData\Local\Temp\479B.tmp"79⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\47D9.tmp"C:\Users\Admin\AppData\Local\Temp\47D9.tmp"80⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\4818.tmp"C:\Users\Admin\AppData\Local\Temp\4818.tmp"81⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\4856.tmp"C:\Users\Admin\AppData\Local\Temp\4856.tmp"82⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\4894.tmp"C:\Users\Admin\AppData\Local\Temp\4894.tmp"83⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"84⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\4911.tmp"C:\Users\Admin\AppData\Local\Temp\4911.tmp"85⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\4950.tmp"C:\Users\Admin\AppData\Local\Temp\4950.tmp"86⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\498E.tmp"C:\Users\Admin\AppData\Local\Temp\498E.tmp"87⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\49CC.tmp"C:\Users\Admin\AppData\Local\Temp\49CC.tmp"88⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\4A0B.tmp"C:\Users\Admin\AppData\Local\Temp\4A0B.tmp"89⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\4A49.tmp"C:\Users\Admin\AppData\Local\Temp\4A49.tmp"90⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\4A88.tmp"C:\Users\Admin\AppData\Local\Temp\4A88.tmp"91⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"92⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\4B04.tmp"C:\Users\Admin\AppData\Local\Temp\4B04.tmp"93⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\4B43.tmp"C:\Users\Admin\AppData\Local\Temp\4B43.tmp"94⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\4B81.tmp"C:\Users\Admin\AppData\Local\Temp\4B81.tmp"95⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"96⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"97⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"98⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"99⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"100⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\4CF8.tmp"C:\Users\Admin\AppData\Local\Temp\4CF8.tmp"101⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\4D36.tmp"C:\Users\Admin\AppData\Local\Temp\4D36.tmp"102⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\4D74.tmp"C:\Users\Admin\AppData\Local\Temp\4D74.tmp"103⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"104⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"105⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\4E30.tmp"C:\Users\Admin\AppData\Local\Temp\4E30.tmp"106⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"107⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"108⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\4EEB.tmp"C:\Users\Admin\AppData\Local\Temp\4EEB.tmp"109⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\4F29.tmp"C:\Users\Admin\AppData\Local\Temp\4F29.tmp"110⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"111⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"112⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\4FE4.tmp"C:\Users\Admin\AppData\Local\Temp\4FE4.tmp"113⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp"114⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\5061.tmp"C:\Users\Admin\AppData\Local\Temp\5061.tmp"115⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"116⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\50DE.tmp"C:\Users\Admin\AppData\Local\Temp\50DE.tmp"117⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\511C.tmp"C:\Users\Admin\AppData\Local\Temp\511C.tmp"118⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\515B.tmp"C:\Users\Admin\AppData\Local\Temp\515B.tmp"119⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\5199.tmp"C:\Users\Admin\AppData\Local\Temp\5199.tmp"120⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\51D8.tmp"C:\Users\Admin\AppData\Local\Temp\51D8.tmp"121⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\5216.tmp"C:\Users\Admin\AppData\Local\Temp\5216.tmp"122⤵PID:1676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-