Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe
-
Size
488KB
-
MD5
c6d7e769d33899ca33b3fa360d0b590f
-
SHA1
b7cd8e0d0ec870c7253473325a381e44b8e9183d
-
SHA256
124fa2256129c66522cb7e4d1b89da88a09392a96edc82c07279a14d2d65ec6f
-
SHA512
4257b216ec4ca2eb6a5c1169fbed7e789c6ac66b997d0de0c301f0d29a992732d09741c39af799cce7664ee9911e5b113a7381634b292f29f512ac7504bb794d
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7detZv9Y9QhpmrRhWkNfOJieiQRp9VLCtSx89:/U5rCOTeiDC+upmr+kgniqpzxLFM9NZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4572 4F0A.tmp 4060 4F78.tmp 868 5E9B.tmp 856 5EE9.tmp 2696 5081.tmp 2752 50CF.tmp 1228 513D.tmp 908 519A.tmp 1528 51E9.tmp 3736 5246.tmp 4636 52A4.tmp 4376 52F2.tmp 540 5350.tmp 1272 539E.tmp 3600 53EC.tmp 1888 543A.tmp 2496 54A8.tmp 1080 5505.tmp 1512 5554.tmp 2968 55A2.tmp 1008 55F0.tmp 2892 563E.tmp 4460 568C.tmp 4608 5832.tmp 3920 5890.tmp 3468 58DE.tmp 1420 592C.tmp 4788 598A.tmp 4364 59D8.tmp 2412 5A26.tmp 1548 5A74.tmp 3432 5AD2.tmp 3888 5B30.tmp 3260 5B7E.tmp 1932 5BCC.tmp 3164 5C1A.tmp 2532 5C68.tmp 4492 5CB6.tmp 4572 5D04.tmp 2036 5D62.tmp 4380 5DB0.tmp 3668 5DFE.tmp 2336 5E4C.tmp 868 5E9B.tmp 856 5EE9.tmp 3652 5F37.tmp 1232 5F85.tmp 1496 5FD3.tmp 1652 6021.tmp 3620 606F.tmp 388 60BD.tmp 3416 610C.tmp 2860 615A.tmp 2320 61A8.tmp 4736 61F6.tmp 4024 6234.tmp 1664 6283.tmp 4844 62D1.tmp 1424 631F.tmp 1552 636D.tmp 3732 63BB.tmp 1080 5505.tmp 3288 6457.tmp 3220 64A5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4572 4656 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 86 PID 4656 wrote to memory of 4572 4656 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 86 PID 4656 wrote to memory of 4572 4656 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 86 PID 4572 wrote to memory of 4060 4572 4F0A.tmp 88 PID 4572 wrote to memory of 4060 4572 4F0A.tmp 88 PID 4572 wrote to memory of 4060 4572 4F0A.tmp 88 PID 4060 wrote to memory of 868 4060 4F78.tmp 123 PID 4060 wrote to memory of 868 4060 4F78.tmp 123 PID 4060 wrote to memory of 868 4060 4F78.tmp 123 PID 868 wrote to memory of 856 868 5E9B.tmp 119 PID 868 wrote to memory of 856 868 5E9B.tmp 119 PID 868 wrote to memory of 856 868 5E9B.tmp 119 PID 856 wrote to memory of 2696 856 5EE9.tmp 93 PID 856 wrote to memory of 2696 856 5EE9.tmp 93 PID 856 wrote to memory of 2696 856 5EE9.tmp 93 PID 2696 wrote to memory of 2752 2696 5081.tmp 94 PID 2696 wrote to memory of 2752 2696 5081.tmp 94 PID 2696 wrote to memory of 2752 2696 5081.tmp 94 PID 2752 wrote to memory of 1228 2752 50CF.tmp 95 PID 2752 wrote to memory of 1228 2752 50CF.tmp 95 PID 2752 wrote to memory of 1228 2752 50CF.tmp 95 PID 1228 wrote to memory of 908 1228 513D.tmp 96 PID 1228 wrote to memory of 908 1228 513D.tmp 96 PID 1228 wrote to memory of 908 1228 513D.tmp 96 PID 908 wrote to memory of 1528 908 519A.tmp 97 PID 908 wrote to memory of 1528 908 519A.tmp 97 PID 908 wrote to memory of 1528 908 519A.tmp 97 PID 1528 wrote to memory of 3736 1528 51E9.tmp 98 PID 1528 wrote to memory of 3736 1528 51E9.tmp 98 PID 1528 wrote to memory of 3736 1528 51E9.tmp 98 PID 3736 wrote to memory of 4636 3736 5246.tmp 158 PID 3736 wrote to memory of 4636 3736 5246.tmp 158 PID 3736 wrote to memory of 4636 3736 5246.tmp 158 PID 4636 wrote to memory of 4376 4636 52A4.tmp 99 PID 4636 wrote to memory of 4376 4636 52A4.tmp 99 PID 4636 wrote to memory of 4376 4636 52A4.tmp 99 PID 4376 wrote to memory of 540 4376 52F2.tmp 157 PID 4376 wrote to memory of 540 4376 52F2.tmp 157 PID 4376 wrote to memory of 540 4376 52F2.tmp 157 PID 540 wrote to memory of 1272 540 5350.tmp 156 PID 540 wrote to memory of 1272 540 5350.tmp 156 PID 540 wrote to memory of 1272 540 5350.tmp 156 PID 1272 wrote to memory of 3600 1272 539E.tmp 155 PID 1272 wrote to memory of 3600 1272 539E.tmp 155 PID 1272 wrote to memory of 3600 1272 539E.tmp 155 PID 3600 wrote to memory of 1888 3600 53EC.tmp 154 PID 3600 wrote to memory of 1888 3600 53EC.tmp 154 PID 3600 wrote to memory of 1888 3600 53EC.tmp 154 PID 1888 wrote to memory of 2496 1888 543A.tmp 153 PID 1888 wrote to memory of 2496 1888 543A.tmp 153 PID 1888 wrote to memory of 2496 1888 543A.tmp 153 PID 2496 wrote to memory of 1080 2496 54A8.tmp 152 PID 2496 wrote to memory of 1080 2496 54A8.tmp 152 PID 2496 wrote to memory of 1080 2496 54A8.tmp 152 PID 1080 wrote to memory of 1512 1080 5505.tmp 151 PID 1080 wrote to memory of 1512 1080 5505.tmp 151 PID 1080 wrote to memory of 1512 1080 5505.tmp 151 PID 1512 wrote to memory of 2968 1512 5554.tmp 101 PID 1512 wrote to memory of 2968 1512 5554.tmp 101 PID 1512 wrote to memory of 2968 1512 5554.tmp 101 PID 2968 wrote to memory of 1008 2968 55A2.tmp 104 PID 2968 wrote to memory of 1008 2968 55A2.tmp 104 PID 2968 wrote to memory of 1008 2968 55A2.tmp 104 PID 1008 wrote to memory of 2892 1008 55F0.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\4F78.tmp"C:\Users\Admin\AppData\Local\Temp\4F78.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"4⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\5033.tmp"C:\Users\Admin\AppData\Local\Temp\5033.tmp"5⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\5081.tmp"C:\Users\Admin\AppData\Local\Temp\5081.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\50CF.tmp"C:\Users\Admin\AppData\Local\Temp\50CF.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\513D.tmp"C:\Users\Admin\AppData\Local\Temp\513D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\5246.tmp"C:\Users\Admin\AppData\Local\Temp\5246.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\52A4.tmp"C:\Users\Admin\AppData\Local\Temp\52A4.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"6⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"7⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"8⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"9⤵
- Executes dropped EXE
PID:1652
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\52F2.tmp"C:\Users\Admin\AppData\Local\Temp\52F2.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\55A2.tmp"C:\Users\Admin\AppData\Local\Temp\55A2.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp"1⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\5832.tmp"C:\Users\Admin\AppData\Local\Temp\5832.tmp"2⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\5890.tmp"C:\Users\Admin\AppData\Local\Temp\5890.tmp"3⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\58DE.tmp"C:\Users\Admin\AppData\Local\Temp\58DE.tmp"4⤵
- Executes dropped EXE
PID:3468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\563E.tmp"C:\Users\Admin\AppData\Local\Temp\563E.tmp"1⤵
- Executes dropped EXE
PID:2892
-
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"1⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\598A.tmp"C:\Users\Admin\AppData\Local\Temp\598A.tmp"2⤵
- Executes dropped EXE
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"1⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"2⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"1⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\5C68.tmp"C:\Users\Admin\AppData\Local\Temp\5C68.tmp"2⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"3⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\5D04.tmp"C:\Users\Admin\AppData\Local\Temp\5D04.tmp"4⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\5D62.tmp"C:\Users\Admin\AppData\Local\Temp\5D62.tmp"5⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\5DB0.tmp"C:\Users\Admin\AppData\Local\Temp\5DB0.tmp"6⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\5DFE.tmp"C:\Users\Admin\AppData\Local\Temp\5DFE.tmp"7⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"8⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"1⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\610C.tmp"C:\Users\Admin\AppData\Local\Temp\610C.tmp"2⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\615A.tmp"C:\Users\Admin\AppData\Local\Temp\615A.tmp"3⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\61A8.tmp"C:\Users\Admin\AppData\Local\Temp\61A8.tmp"4⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\61F6.tmp"C:\Users\Admin\AppData\Local\Temp\61F6.tmp"5⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\6234.tmp"C:\Users\Admin\AppData\Local\Temp\6234.tmp"6⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"7⤵
- Executes dropped EXE
PID:1664
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\606F.tmp"C:\Users\Admin\AppData\Local\Temp\606F.tmp"1⤵
- Executes dropped EXE
PID:3620
-
C:\Users\Admin\AppData\Local\Temp\62D1.tmp"C:\Users\Admin\AppData\Local\Temp\62D1.tmp"1⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\631F.tmp"C:\Users\Admin\AppData\Local\Temp\631F.tmp"2⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\636D.tmp"C:\Users\Admin\AppData\Local\Temp\636D.tmp"3⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\63BB.tmp"C:\Users\Admin\AppData\Local\Temp\63BB.tmp"4⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"5⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\6457.tmp"C:\Users\Admin\AppData\Local\Temp\6457.tmp"6⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"7⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\64F4.tmp"C:\Users\Admin\AppData\Local\Temp\64F4.tmp"8⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"9⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\65CE.tmp"C:\Users\Admin\AppData\Local\Temp\65CE.tmp"10⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\66A9.tmp"C:\Users\Admin\AppData\Local\Temp\66A9.tmp"11⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\6755.tmp"C:\Users\Admin\AppData\Local\Temp\6755.tmp"12⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\67E2.tmp"C:\Users\Admin\AppData\Local\Temp\67E2.tmp"13⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\686E.tmp"C:\Users\Admin\AppData\Local\Temp\686E.tmp"14⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\690A.tmp"C:\Users\Admin\AppData\Local\Temp\690A.tmp"15⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\6987.tmp"C:\Users\Admin\AppData\Local\Temp\6987.tmp"16⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\69D6.tmp"C:\Users\Admin\AppData\Local\Temp\69D6.tmp"17⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"18⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\6A91.tmp"C:\Users\Admin\AppData\Local\Temp\6A91.tmp"19⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"20⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"21⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"22⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"23⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\6C27.tmp"C:\Users\Admin\AppData\Local\Temp\6C27.tmp"24⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\6C85.tmp"C:\Users\Admin\AppData\Local\Temp\6C85.tmp"25⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"26⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\6D31.tmp"C:\Users\Admin\AppData\Local\Temp\6D31.tmp"27⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"28⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"29⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\6E4A.tmp"C:\Users\Admin\AppData\Local\Temp\6E4A.tmp"30⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\6E98.tmp"C:\Users\Admin\AppData\Local\Temp\6E98.tmp"31⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"32⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\6F54.tmp"C:\Users\Admin\AppData\Local\Temp\6F54.tmp"33⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"34⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\7000.tmp"C:\Users\Admin\AppData\Local\Temp\7000.tmp"35⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"36⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\70BB.tmp"C:\Users\Admin\AppData\Local\Temp\70BB.tmp"37⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"38⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\7157.tmp"C:\Users\Admin\AppData\Local\Temp\7157.tmp"39⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\71B5.tmp"C:\Users\Admin\AppData\Local\Temp\71B5.tmp"40⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\7223.tmp"C:\Users\Admin\AppData\Local\Temp\7223.tmp"41⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\7271.tmp"C:\Users\Admin\AppData\Local\Temp\7271.tmp"42⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\72CE.tmp"C:\Users\Admin\AppData\Local\Temp\72CE.tmp"43⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\732C.tmp"C:\Users\Admin\AppData\Local\Temp\732C.tmp"44⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"45⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"46⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\7445.tmp"C:\Users\Admin\AppData\Local\Temp\7445.tmp"47⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"48⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"49⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"50⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\75AD.tmp"C:\Users\Admin\AppData\Local\Temp\75AD.tmp"51⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"52⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\7659.tmp"C:\Users\Admin\AppData\Local\Temp\7659.tmp"53⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\76A7.tmp"C:\Users\Admin\AppData\Local\Temp\76A7.tmp"54⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\76F5.tmp"C:\Users\Admin\AppData\Local\Temp\76F5.tmp"55⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\7743.tmp"C:\Users\Admin\AppData\Local\Temp\7743.tmp"56⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"57⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\77FF.tmp"C:\Users\Admin\AppData\Local\Temp\77FF.tmp"58⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\784D.tmp"C:\Users\Admin\AppData\Local\Temp\784D.tmp"59⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp"60⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\78E9.tmp"C:\Users\Admin\AppData\Local\Temp\78E9.tmp"61⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\7937.tmp"C:\Users\Admin\AppData\Local\Temp\7937.tmp"62⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"63⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"64⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\7A31.tmp"C:\Users\Admin\AppData\Local\Temp\7A31.tmp"65⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"66⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\7ACD.tmp"C:\Users\Admin\AppData\Local\Temp\7ACD.tmp"67⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"68⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"69⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"70⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\7C25.tmp"C:\Users\Admin\AppData\Local\Temp\7C25.tmp"71⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"72⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"73⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"74⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\7D6D.tmp"C:\Users\Admin\AppData\Local\Temp\7D6D.tmp"75⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"76⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"77⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"78⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"79⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\7F23.tmp"C:\Users\Admin\AppData\Local\Temp\7F23.tmp"80⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\7F71.tmp"C:\Users\Admin\AppData\Local\Temp\7F71.tmp"81⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"82⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"83⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\807A.tmp"C:\Users\Admin\AppData\Local\Temp\807A.tmp"84⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\80D8.tmp"C:\Users\Admin\AppData\Local\Temp\80D8.tmp"85⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\8126.tmp"C:\Users\Admin\AppData\Local\Temp\8126.tmp"86⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\8184.tmp"C:\Users\Admin\AppData\Local\Temp\8184.tmp"87⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"88⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"89⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"90⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\82EB.tmp"C:\Users\Admin\AppData\Local\Temp\82EB.tmp"91⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"92⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\8397.tmp"C:\Users\Admin\AppData\Local\Temp\8397.tmp"93⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\83F5.tmp"C:\Users\Admin\AppData\Local\Temp\83F5.tmp"94⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\8443.tmp"C:\Users\Admin\AppData\Local\Temp\8443.tmp"95⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"96⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\84DF.tmp"C:\Users\Admin\AppData\Local\Temp\84DF.tmp"97⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\852E.tmp"C:\Users\Admin\AppData\Local\Temp\852E.tmp"98⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"99⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\85CA.tmp"C:\Users\Admin\AppData\Local\Temp\85CA.tmp"100⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"101⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\8685.tmp"C:\Users\Admin\AppData\Local\Temp\8685.tmp"102⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\86D3.tmp"C:\Users\Admin\AppData\Local\Temp\86D3.tmp"103⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\8722.tmp"C:\Users\Admin\AppData\Local\Temp\8722.tmp"104⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\877F.tmp"C:\Users\Admin\AppData\Local\Temp\877F.tmp"105⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"106⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"107⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\8879.tmp"C:\Users\Admin\AppData\Local\Temp\8879.tmp"108⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\88C7.tmp"C:\Users\Admin\AppData\Local\Temp\88C7.tmp"109⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\8916.tmp"C:\Users\Admin\AppData\Local\Temp\8916.tmp"110⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\8973.tmp"C:\Users\Admin\AppData\Local\Temp\8973.tmp"111⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\89C1.tmp"C:\Users\Admin\AppData\Local\Temp\89C1.tmp"112⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\8A10.tmp"C:\Users\Admin\AppData\Local\Temp\8A10.tmp"113⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"114⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"115⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"116⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"117⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"118⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\8C13.tmp"C:\Users\Admin\AppData\Local\Temp\8C13.tmp"119⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\8C71.tmp"C:\Users\Admin\AppData\Local\Temp\8C71.tmp"120⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"121⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"122⤵PID:2932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-