Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe
-
Size
486KB
-
MD5
fb9669b4e2f1dfb071986e28d71524d0
-
SHA1
cf291b2d6c173f07ba8afacc739361a9cbd5f008
-
SHA256
403bdfab7fb4486f7a575bf7262d70351f69d6786afe888a495df52e46f95cbd
-
SHA512
703a708da6b7446e7095cb2a8c88eaedbe0ec50576d83a92ce2c981465f49a4d8d120c6a41d501c7acfbc27b1ea36a90e60252e9260ab448e409c0429baf64b9
-
SSDEEP
12288:oU5rCOTeiD9ZeYavHaLxhS1xnst1gCuDGBNZ:oUQOJDPePHaLxOstqCuSBN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2516 B56.tmp 2684 BA4.tmp 2284 BF2.tmp 2736 C31.tmp 2832 C6F.tmp 2732 CBD.tmp 2824 CFC.tmp 2980 D69.tmp 864 DA7.tmp 2608 DE6.tmp 2680 E34.tmp 2652 E72.tmp 1524 EB0.tmp 3000 EFE.tmp 1720 F3D.tmp 2880 F8B.tmp 1260 FD9.tmp 1648 1027.tmp 1436 1075.tmp 2592 10C3.tmp 2940 1101.tmp 1584 1140.tmp 856 117E.tmp 1232 1249.tmp 2240 1287.tmp 2092 12C6.tmp 2028 1304.tmp 2056 1342.tmp 3032 1381.tmp 2060 13BF.tmp 336 140D.tmp 788 144C.tmp 1488 148A.tmp 1472 14C8.tmp 1856 1507.tmp 1804 1545.tmp 1752 1584.tmp 1088 15C2.tmp 2252 1600.tmp 1964 163F.tmp 1440 167D.tmp 1768 16BC.tmp 760 16FA.tmp 328 1738.tmp 2860 1777.tmp 916 17B5.tmp 2444 17F4.tmp 3064 1832.tmp 1064 1870.tmp 3052 18AF.tmp 2336 18ED.tmp 1504 192C.tmp 344 196A.tmp 3060 19A8.tmp 1576 19E7.tmp 1708 1A25.tmp 2468 1A64.tmp 2516 1AA2.tmp 2788 1AE0.tmp 2796 1B1F.tmp 2828 1B5D.tmp 2800 1B9C.tmp 2904 1BDA.tmp 2912 1C18.tmp -
Loads dropped DLL 64 IoCs
pid Process 2508 2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe 2516 B56.tmp 2684 BA4.tmp 2284 BF2.tmp 2736 C31.tmp 2832 C6F.tmp 2732 CBD.tmp 2824 CFC.tmp 2980 D69.tmp 864 DA7.tmp 2608 DE6.tmp 2680 E34.tmp 2652 E72.tmp 1524 EB0.tmp 3000 EFE.tmp 1720 F3D.tmp 2880 F8B.tmp 1260 FD9.tmp 1648 1027.tmp 1436 1075.tmp 2592 10C3.tmp 2940 1101.tmp 1584 1140.tmp 856 117E.tmp 1232 1249.tmp 2240 1287.tmp 2092 12C6.tmp 2028 1304.tmp 2056 1342.tmp 3032 1381.tmp 2060 13BF.tmp 336 140D.tmp 788 144C.tmp 1488 148A.tmp 1472 14C8.tmp 1856 1507.tmp 1804 1545.tmp 1752 1584.tmp 1088 15C2.tmp 2252 1600.tmp 1964 163F.tmp 1440 167D.tmp 1768 16BC.tmp 760 16FA.tmp 328 1738.tmp 2860 1777.tmp 916 17B5.tmp 2444 17F4.tmp 3064 1832.tmp 1064 1870.tmp 3052 18AF.tmp 2336 18ED.tmp 1504 192C.tmp 344 196A.tmp 3060 19A8.tmp 1576 19E7.tmp 1708 1A25.tmp 2468 1A64.tmp 2516 1AA2.tmp 2788 1AE0.tmp 2796 1B1F.tmp 2828 1B5D.tmp 2800 1B9C.tmp 2904 1BDA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2516 2508 2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe 28 PID 2508 wrote to memory of 2516 2508 2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe 28 PID 2508 wrote to memory of 2516 2508 2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe 28 PID 2508 wrote to memory of 2516 2508 2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe 28 PID 2516 wrote to memory of 2684 2516 B56.tmp 29 PID 2516 wrote to memory of 2684 2516 B56.tmp 29 PID 2516 wrote to memory of 2684 2516 B56.tmp 29 PID 2516 wrote to memory of 2684 2516 B56.tmp 29 PID 2684 wrote to memory of 2284 2684 BA4.tmp 30 PID 2684 wrote to memory of 2284 2684 BA4.tmp 30 PID 2684 wrote to memory of 2284 2684 BA4.tmp 30 PID 2684 wrote to memory of 2284 2684 BA4.tmp 30 PID 2284 wrote to memory of 2736 2284 BF2.tmp 31 PID 2284 wrote to memory of 2736 2284 BF2.tmp 31 PID 2284 wrote to memory of 2736 2284 BF2.tmp 31 PID 2284 wrote to memory of 2736 2284 BF2.tmp 31 PID 2736 wrote to memory of 2832 2736 C31.tmp 32 PID 2736 wrote to memory of 2832 2736 C31.tmp 32 PID 2736 wrote to memory of 2832 2736 C31.tmp 32 PID 2736 wrote to memory of 2832 2736 C31.tmp 32 PID 2832 wrote to memory of 2732 2832 C6F.tmp 33 PID 2832 wrote to memory of 2732 2832 C6F.tmp 33 PID 2832 wrote to memory of 2732 2832 C6F.tmp 33 PID 2832 wrote to memory of 2732 2832 C6F.tmp 33 PID 2732 wrote to memory of 2824 2732 CBD.tmp 93 PID 2732 wrote to memory of 2824 2732 CBD.tmp 93 PID 2732 wrote to memory of 2824 2732 CBD.tmp 93 PID 2732 wrote to memory of 2824 2732 CBD.tmp 93 PID 2824 wrote to memory of 2980 2824 CFC.tmp 34 PID 2824 wrote to memory of 2980 2824 CFC.tmp 34 PID 2824 wrote to memory of 2980 2824 CFC.tmp 34 PID 2824 wrote to memory of 2980 2824 CFC.tmp 34 PID 2980 wrote to memory of 864 2980 D69.tmp 92 PID 2980 wrote to memory of 864 2980 D69.tmp 92 PID 2980 wrote to memory of 864 2980 D69.tmp 92 PID 2980 wrote to memory of 864 2980 D69.tmp 92 PID 864 wrote to memory of 2608 864 DA7.tmp 91 PID 864 wrote to memory of 2608 864 DA7.tmp 91 PID 864 wrote to memory of 2608 864 DA7.tmp 91 PID 864 wrote to memory of 2608 864 DA7.tmp 91 PID 2608 wrote to memory of 2680 2608 DE6.tmp 90 PID 2608 wrote to memory of 2680 2608 DE6.tmp 90 PID 2608 wrote to memory of 2680 2608 DE6.tmp 90 PID 2608 wrote to memory of 2680 2608 DE6.tmp 90 PID 2680 wrote to memory of 2652 2680 E34.tmp 89 PID 2680 wrote to memory of 2652 2680 E34.tmp 89 PID 2680 wrote to memory of 2652 2680 E34.tmp 89 PID 2680 wrote to memory of 2652 2680 E34.tmp 89 PID 2652 wrote to memory of 1524 2652 E72.tmp 35 PID 2652 wrote to memory of 1524 2652 E72.tmp 35 PID 2652 wrote to memory of 1524 2652 E72.tmp 35 PID 2652 wrote to memory of 1524 2652 E72.tmp 35 PID 1524 wrote to memory of 3000 1524 EB0.tmp 88 PID 1524 wrote to memory of 3000 1524 EB0.tmp 88 PID 1524 wrote to memory of 3000 1524 EB0.tmp 88 PID 1524 wrote to memory of 3000 1524 EB0.tmp 88 PID 3000 wrote to memory of 1720 3000 EFE.tmp 87 PID 3000 wrote to memory of 1720 3000 EFE.tmp 87 PID 3000 wrote to memory of 1720 3000 EFE.tmp 87 PID 3000 wrote to memory of 1720 3000 EFE.tmp 87 PID 1720 wrote to memory of 2880 1720 F3D.tmp 86 PID 1720 wrote to memory of 2880 1720 F3D.tmp 86 PID 1720 wrote to memory of 2880 1720 F3D.tmp 86 PID 1720 wrote to memory of 2880 1720 F3D.tmp 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_fb9669b4e2f1dfb071986e28d71524d0_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\B56.tmp"C:\Users\Admin\AppData\Local\Temp\B56.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\BA4.tmp"C:\Users\Admin\AppData\Local\Temp\BA4.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\BF2.tmp"C:\Users\Admin\AppData\Local\Temp\BF2.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\C31.tmp"C:\Users\Admin\AppData\Local\Temp\C31.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\CFC.tmp"C:\Users\Admin\AppData\Local\Temp\CFC.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\DA7.tmp"C:\Users\Admin\AppData\Local\Temp\DA7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\EB0.tmp"C:\Users\Admin\AppData\Local\Temp\EB0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\EFE.tmp"C:\Users\Admin\AppData\Local\Temp\EFE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\117E.tmp"C:\Users\Admin\AppData\Local\Temp\117E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:856 -
C:\Users\Admin\AppData\Local\Temp\1249.tmp"C:\Users\Admin\AppData\Local\Temp\1249.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\1287.tmp"C:\Users\Admin\AppData\Local\Temp\1287.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\1140.tmp"C:\Users\Admin\AppData\Local\Temp\1140.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584
-
C:\Users\Admin\AppData\Local\Temp\12C6.tmp"C:\Users\Admin\AppData\Local\Temp\12C6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\1304.tmp"C:\Users\Admin\AppData\Local\Temp\1304.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\1342.tmp"C:\Users\Admin\AppData\Local\Temp\1342.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\1381.tmp"C:\Users\Admin\AppData\Local\Temp\1381.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\13BF.tmp"C:\Users\Admin\AppData\Local\Temp\13BF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Users\Admin\AppData\Local\Temp\148A.tmp"C:\Users\Admin\AppData\Local\Temp\148A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\14C8.tmp"C:\Users\Admin\AppData\Local\Temp\14C8.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\1507.tmp"C:\Users\Admin\AppData\Local\Temp\1507.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1545.tmp"C:\Users\Admin\AppData\Local\Temp\1545.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\1584.tmp"C:\Users\Admin\AppData\Local\Temp\1584.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\15C2.tmp"C:\Users\Admin\AppData\Local\Temp\15C2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\1600.tmp"C:\Users\Admin\AppData\Local\Temp\1600.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\163F.tmp"C:\Users\Admin\AppData\Local\Temp\163F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\167D.tmp"C:\Users\Admin\AppData\Local\Temp\167D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\16BC.tmp"C:\Users\Admin\AppData\Local\Temp\16BC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\16FA.tmp"C:\Users\Admin\AppData\Local\Temp\16FA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\1738.tmp"C:\Users\Admin\AppData\Local\Temp\1738.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:328 -
C:\Users\Admin\AppData\Local\Temp\1777.tmp"C:\Users\Admin\AppData\Local\Temp\1777.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\17B5.tmp"C:\Users\Admin\AppData\Local\Temp\17B5.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:916 -
C:\Users\Admin\AppData\Local\Temp\17F4.tmp"C:\Users\Admin\AppData\Local\Temp\17F4.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1870.tmp"C:\Users\Admin\AppData\Local\Temp\1870.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\18AF.tmp"C:\Users\Admin\AppData\Local\Temp\18AF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\18ED.tmp"C:\Users\Admin\AppData\Local\Temp\18ED.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\196A.tmp"C:\Users\Admin\AppData\Local\Temp\196A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:344
-
-
-
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\1A25.tmp"C:\Users\Admin\AppData\Local\Temp\1A25.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\1A64.tmp"C:\Users\Admin\AppData\Local\Temp\1A64.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468
-
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1C18.tmp"C:\Users\Admin\AppData\Local\Temp\1C18.tmp"4⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\1C57.tmp"C:\Users\Admin\AppData\Local\Temp\1C57.tmp"5⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\1C95.tmp"C:\Users\Admin\AppData\Local\Temp\1C95.tmp"6⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"7⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"8⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"9⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"10⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\1E79.tmp"C:\Users\Admin\AppData\Local\Temp\1E79.tmp"11⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"12⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\1F34.tmp"C:\Users\Admin\AppData\Local\Temp\1F34.tmp"13⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"14⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\200E.tmp"C:\Users\Admin\AppData\Local\Temp\200E.tmp"15⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\207C.tmp"C:\Users\Admin\AppData\Local\Temp\207C.tmp"16⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"17⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\20F8.tmp"C:\Users\Admin\AppData\Local\Temp\20F8.tmp"18⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2137.tmp"C:\Users\Admin\AppData\Local\Temp\2137.tmp"19⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"20⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"21⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2211.tmp"C:\Users\Admin\AppData\Local\Temp\2211.tmp"22⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"23⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"24⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\22DC.tmp"C:\Users\Admin\AppData\Local\Temp\22DC.tmp"25⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\231A.tmp"C:\Users\Admin\AppData\Local\Temp\231A.tmp"26⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2359.tmp"C:\Users\Admin\AppData\Local\Temp\2359.tmp"27⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2397.tmp"C:\Users\Admin\AppData\Local\Temp\2397.tmp"28⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\23D6.tmp"C:\Users\Admin\AppData\Local\Temp\23D6.tmp"29⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2414.tmp"C:\Users\Admin\AppData\Local\Temp\2414.tmp"30⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2452.tmp"C:\Users\Admin\AppData\Local\Temp\2452.tmp"31⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2491.tmp"C:\Users\Admin\AppData\Local\Temp\2491.tmp"32⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\24CF.tmp"C:\Users\Admin\AppData\Local\Temp\24CF.tmp"33⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\250E.tmp"C:\Users\Admin\AppData\Local\Temp\250E.tmp"34⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"35⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"36⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp"37⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\2607.tmp"C:\Users\Admin\AppData\Local\Temp\2607.tmp"38⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2646.tmp"C:\Users\Admin\AppData\Local\Temp\2646.tmp"39⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\2684.tmp"C:\Users\Admin\AppData\Local\Temp\2684.tmp"40⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"41⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"42⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"43⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"44⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"45⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\281A.tmp"C:\Users\Admin\AppData\Local\Temp\281A.tmp"46⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2858.tmp"C:\Users\Admin\AppData\Local\Temp\2858.tmp"47⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2896.tmp"C:\Users\Admin\AppData\Local\Temp\2896.tmp"48⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\28D5.tmp"C:\Users\Admin\AppData\Local\Temp\28D5.tmp"49⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2913.tmp"C:\Users\Admin\AppData\Local\Temp\2913.tmp"50⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\2952.tmp"C:\Users\Admin\AppData\Local\Temp\2952.tmp"51⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\2990.tmp"C:\Users\Admin\AppData\Local\Temp\2990.tmp"52⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\29CE.tmp"C:\Users\Admin\AppData\Local\Temp\29CE.tmp"53⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"54⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"55⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"56⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"57⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"58⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"59⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"60⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"61⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"62⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"63⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"64⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"65⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"66⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"67⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"68⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"69⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2E03.tmp"C:\Users\Admin\AppData\Local\Temp\2E03.tmp"70⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2E41.tmp"C:\Users\Admin\AppData\Local\Temp\2E41.tmp"71⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2E80.tmp"C:\Users\Admin\AppData\Local\Temp\2E80.tmp"72⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2EBE.tmp"C:\Users\Admin\AppData\Local\Temp\2EBE.tmp"73⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2EFC.tmp"C:\Users\Admin\AppData\Local\Temp\2EFC.tmp"74⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"75⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"76⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"77⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"78⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"79⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"80⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"81⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\30F0.tmp"C:\Users\Admin\AppData\Local\Temp\30F0.tmp"82⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\312E.tmp"C:\Users\Admin\AppData\Local\Temp\312E.tmp"83⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\316C.tmp"C:\Users\Admin\AppData\Local\Temp\316C.tmp"84⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\31AB.tmp"C:\Users\Admin\AppData\Local\Temp\31AB.tmp"85⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"86⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3237.tmp"C:\Users\Admin\AppData\Local\Temp\3237.tmp"87⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"88⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"89⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"90⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"91⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"92⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"93⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"94⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"95⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"96⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\34C6.tmp"C:\Users\Admin\AppData\Local\Temp\34C6.tmp"97⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\3514.tmp"C:\Users\Admin\AppData\Local\Temp\3514.tmp"98⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"99⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"100⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"101⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\360E.tmp"C:\Users\Admin\AppData\Local\Temp\360E.tmp"102⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"103⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"104⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"105⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\3717.tmp"C:\Users\Admin\AppData\Local\Temp\3717.tmp"106⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3756.tmp"C:\Users\Admin\AppData\Local\Temp\3756.tmp"107⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\3794.tmp"C:\Users\Admin\AppData\Local\Temp\3794.tmp"108⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\37E2.tmp"C:\Users\Admin\AppData\Local\Temp\37E2.tmp"109⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\3820.tmp"C:\Users\Admin\AppData\Local\Temp\3820.tmp"110⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\385F.tmp"C:\Users\Admin\AppData\Local\Temp\385F.tmp"111⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\389D.tmp"C:\Users\Admin\AppData\Local\Temp\389D.tmp"112⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\38DC.tmp"C:\Users\Admin\AppData\Local\Temp\38DC.tmp"113⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"114⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3958.tmp"C:\Users\Admin\AppData\Local\Temp\3958.tmp"115⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3997.tmp"C:\Users\Admin\AppData\Local\Temp\3997.tmp"116⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"117⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\3A14.tmp"C:\Users\Admin\AppData\Local\Temp\3A14.tmp"118⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3A52.tmp"C:\Users\Admin\AppData\Local\Temp\3A52.tmp"119⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3A90.tmp"C:\Users\Admin\AppData\Local\Temp\3A90.tmp"120⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"121⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"122⤵PID:988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-