Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe
-
Size
487KB
-
MD5
1200e0f1cc63e8dcacc163044133c573
-
SHA1
819bcd45f7399afacc91230b659f26dcf46ab091
-
SHA256
fb15594216912a09fab64cac252fe310af8c23418c1ed42baed1cd0cc55fd4dd
-
SHA512
488158fb17dcee7882d9bb85b61672be64a1b41af5c772d829b853113ddbfb526fc1ff132fb1b66ba6f349f6181053198d2c693a28e1edc8bc1fcfc109ae4d37
-
SSDEEP
12288:HU5rCOTeiJqItq7aqX3JIHgI7mZAMvt8HKm2UpaJNZ:HUQOJJqeq77X5IHgVAmwlpQN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4364 B44C.tmp 568 B527.tmp 3940 B640.tmp 2788 B892.tmp 3396 BA95.tmp 2092 BB61.tmp 1008 BC0C.tmp 1300 BCE7.tmp 4600 BDB2.tmp 2100 BECC.tmp 3768 BF49.tmp 3124 BFD5.tmp 4328 C091.tmp 1528 C17B.tmp 4796 C256.tmp 3232 C302.tmp 1128 C3FC.tmp 1348 C4E6.tmp 348 C5A2.tmp 1388 C60F.tmp 1120 C6F9.tmp 4184 C7B5.tmp 764 C841.tmp 432 C8FD.tmp 3456 C9A9.tmp 2648 CA64.tmp 4620 CB20.tmp 2704 CBAC.tmp 4404 CC58.tmp 392 CCF5.tmp 1016 CDC0.tmp 4448 CE7B.tmp 4064 CF17.tmp 4964 CFF2.tmp 1700 D06F.tmp 4904 D0FC.tmp 2848 D188.tmp 3432 D225.tmp 2700 D2B1.tmp 456 D34E.tmp 2336 D3BB.tmp 1436 D448.tmp 2080 D4D4.tmp 4664 D580.tmp 3244 D62C.tmp 1300 D6B9.tmp 648 D726.tmp 4672 D7A3.tmp 3768 D830.tmp 3772 D8EB.tmp 2780 D978.tmp 4132 D9F5.tmp 4272 DA72.tmp 3252 DADF.tmp 3964 DB8B.tmp 1348 DC08.tmp 3176 DC66.tmp 3100 DD02.tmp 2424 DDAE.tmp 4164 DE0C.tmp 996 DEA8.tmp 5020 DF25.tmp 764 DFC1.tmp 2228 E02E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 4364 3300 2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe 86 PID 3300 wrote to memory of 4364 3300 2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe 86 PID 3300 wrote to memory of 4364 3300 2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe 86 PID 4364 wrote to memory of 568 4364 B44C.tmp 87 PID 4364 wrote to memory of 568 4364 B44C.tmp 87 PID 4364 wrote to memory of 568 4364 B44C.tmp 87 PID 568 wrote to memory of 3940 568 B527.tmp 89 PID 568 wrote to memory of 3940 568 B527.tmp 89 PID 568 wrote to memory of 3940 568 B527.tmp 89 PID 3940 wrote to memory of 2788 3940 B640.tmp 91 PID 3940 wrote to memory of 2788 3940 B640.tmp 91 PID 3940 wrote to memory of 2788 3940 B640.tmp 91 PID 2788 wrote to memory of 3396 2788 B892.tmp 92 PID 2788 wrote to memory of 3396 2788 B892.tmp 92 PID 2788 wrote to memory of 3396 2788 B892.tmp 92 PID 3396 wrote to memory of 2092 3396 BA95.tmp 94 PID 3396 wrote to memory of 2092 3396 BA95.tmp 94 PID 3396 wrote to memory of 2092 3396 BA95.tmp 94 PID 2092 wrote to memory of 1008 2092 BB61.tmp 95 PID 2092 wrote to memory of 1008 2092 BB61.tmp 95 PID 2092 wrote to memory of 1008 2092 BB61.tmp 95 PID 1008 wrote to memory of 1300 1008 BC0C.tmp 96 PID 1008 wrote to memory of 1300 1008 BC0C.tmp 96 PID 1008 wrote to memory of 1300 1008 BC0C.tmp 96 PID 1300 wrote to memory of 4600 1300 BCE7.tmp 97 PID 1300 wrote to memory of 4600 1300 BCE7.tmp 97 PID 1300 wrote to memory of 4600 1300 BCE7.tmp 97 PID 4600 wrote to memory of 2100 4600 BDB2.tmp 98 PID 4600 wrote to memory of 2100 4600 BDB2.tmp 98 PID 4600 wrote to memory of 2100 4600 BDB2.tmp 98 PID 2100 wrote to memory of 3768 2100 BECC.tmp 99 PID 2100 wrote to memory of 3768 2100 BECC.tmp 99 PID 2100 wrote to memory of 3768 2100 BECC.tmp 99 PID 3768 wrote to memory of 3124 3768 BF49.tmp 100 PID 3768 wrote to memory of 3124 3768 BF49.tmp 100 PID 3768 wrote to memory of 3124 3768 BF49.tmp 100 PID 3124 wrote to memory of 4328 3124 BFD5.tmp 101 PID 3124 wrote to memory of 4328 3124 BFD5.tmp 101 PID 3124 wrote to memory of 4328 3124 BFD5.tmp 101 PID 4328 wrote to memory of 1528 4328 C091.tmp 102 PID 4328 wrote to memory of 1528 4328 C091.tmp 102 PID 4328 wrote to memory of 1528 4328 C091.tmp 102 PID 1528 wrote to memory of 4796 1528 C17B.tmp 103 PID 1528 wrote to memory of 4796 1528 C17B.tmp 103 PID 1528 wrote to memory of 4796 1528 C17B.tmp 103 PID 4796 wrote to memory of 3232 4796 C256.tmp 104 PID 4796 wrote to memory of 3232 4796 C256.tmp 104 PID 4796 wrote to memory of 3232 4796 C256.tmp 104 PID 3232 wrote to memory of 1128 3232 C302.tmp 105 PID 3232 wrote to memory of 1128 3232 C302.tmp 105 PID 3232 wrote to memory of 1128 3232 C302.tmp 105 PID 1128 wrote to memory of 1348 1128 C3FC.tmp 106 PID 1128 wrote to memory of 1348 1128 C3FC.tmp 106 PID 1128 wrote to memory of 1348 1128 C3FC.tmp 106 PID 1348 wrote to memory of 348 1348 C4E6.tmp 107 PID 1348 wrote to memory of 348 1348 C4E6.tmp 107 PID 1348 wrote to memory of 348 1348 C4E6.tmp 107 PID 348 wrote to memory of 1388 348 C5A2.tmp 110 PID 348 wrote to memory of 1388 348 C5A2.tmp 110 PID 348 wrote to memory of 1388 348 C5A2.tmp 110 PID 1388 wrote to memory of 1120 1388 C60F.tmp 111 PID 1388 wrote to memory of 1120 1388 C60F.tmp 111 PID 1388 wrote to memory of 1120 1388 C60F.tmp 111 PID 1120 wrote to memory of 4184 1120 C6F9.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_1200e0f1cc63e8dcacc163044133c573_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\B527.tmp"C:\Users\Admin\AppData\Local\Temp\B527.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\B892.tmp"C:\Users\Admin\AppData\Local\Temp\B892.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\BA95.tmp"C:\Users\Admin\AppData\Local\Temp\BA95.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\BC0C.tmp"C:\Users\Admin\AppData\Local\Temp\BC0C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\C091.tmp"C:\Users\Admin\AppData\Local\Temp\C091.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\C17B.tmp"C:\Users\Admin\AppData\Local\Temp\C17B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\C256.tmp"C:\Users\Admin\AppData\Local\Temp\C256.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\C302.tmp"C:\Users\Admin\AppData\Local\Temp\C302.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"23⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"24⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"25⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"26⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\CA64.tmp"C:\Users\Admin\AppData\Local\Temp\CA64.tmp"27⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"28⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"29⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\CC58.tmp"C:\Users\Admin\AppData\Local\Temp\CC58.tmp"30⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"31⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"32⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\CE7B.tmp"C:\Users\Admin\AppData\Local\Temp\CE7B.tmp"33⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\CF17.tmp"C:\Users\Admin\AppData\Local\Temp\CF17.tmp"34⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"35⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"36⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"37⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\D188.tmp"C:\Users\Admin\AppData\Local\Temp\D188.tmp"38⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\D225.tmp"C:\Users\Admin\AppData\Local\Temp\D225.tmp"39⤵
- Executes dropped EXE
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"40⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"41⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"42⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\D448.tmp"C:\Users\Admin\AppData\Local\Temp\D448.tmp"43⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"44⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"45⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"46⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"47⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\D726.tmp"C:\Users\Admin\AppData\Local\Temp\D726.tmp"48⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"49⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\D830.tmp"C:\Users\Admin\AppData\Local\Temp\D830.tmp"50⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"51⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"52⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"53⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"54⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"55⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"56⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\DC08.tmp"C:\Users\Admin\AppData\Local\Temp\DC08.tmp"57⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"58⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"59⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"60⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"61⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"62⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"63⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"64⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\E02E.tmp"C:\Users\Admin\AppData\Local\Temp\E02E.tmp"65⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"66⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\E186.tmp"C:\Users\Admin\AppData\Local\Temp\E186.tmp"67⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\E213.tmp"C:\Users\Admin\AppData\Local\Temp\E213.tmp"68⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"69⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"70⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"71⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"72⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"73⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\E520.tmp"C:\Users\Admin\AppData\Local\Temp\E520.tmp"74⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"75⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"76⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\E753.tmp"C:\Users\Admin\AppData\Local\Temp\E753.tmp"77⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"78⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\E85C.tmp"C:\Users\Admin\AppData\Local\Temp\E85C.tmp"79⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\E908.tmp"C:\Users\Admin\AppData\Local\Temp\E908.tmp"80⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\E975.tmp"C:\Users\Admin\AppData\Local\Temp\E975.tmp"81⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\EA12.tmp"C:\Users\Admin\AppData\Local\Temp\EA12.tmp"82⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"83⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"84⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\EB98.tmp"C:\Users\Admin\AppData\Local\Temp\EB98.tmp"85⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\EC06.tmp"C:\Users\Admin\AppData\Local\Temp\EC06.tmp"86⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"87⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"88⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"89⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"90⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"91⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\EF03.tmp"C:\Users\Admin\AppData\Local\Temp\EF03.tmp"92⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"93⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\F00D.tmp"C:\Users\Admin\AppData\Local\Temp\F00D.tmp"94⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\F06B.tmp"C:\Users\Admin\AppData\Local\Temp\F06B.tmp"95⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\F0D8.tmp"C:\Users\Admin\AppData\Local\Temp\F0D8.tmp"96⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"97⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"98⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\F25F.tmp"C:\Users\Admin\AppData\Local\Temp\F25F.tmp"99⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\F2FB.tmp"C:\Users\Admin\AppData\Local\Temp\F2FB.tmp"100⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"101⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"102⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"103⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"104⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"105⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"106⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"107⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"108⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"109⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"110⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"111⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"112⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"113⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"114⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\FB77.tmp"C:\Users\Admin\AppData\Local\Temp\FB77.tmp"115⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"116⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"117⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\FD5B.tmp"C:\Users\Admin\AppData\Local\Temp\FD5B.tmp"118⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"119⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp"120⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"121⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"122⤵PID:3360
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-