Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe
-
Size
530KB
-
MD5
80b26ebc039062a781ae3fcd479293c8
-
SHA1
ad34b3643b6a44dc43d905b18910d78b08553b5b
-
SHA256
5e150609d068517fb63720def97bb75325df2aaddea7c6213a1cd593834d6af9
-
SHA512
99e69d138e502f9b0b56d2506ac9f0f1b7ca384f0680f460f79449c4959948a0562a4536c88437eae8f92d3f76b177ad8de293937e017f4fae946fb1a57a96a3
-
SSDEEP
12288:AU5rCOTeiogmKrwbdZUcppkeXSinWsUqNZulFVg0M1:AUQOJoFKwbdZUcppk/mWsUqNclFV/M1
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4432 414F.tmp 4348 41EB.tmp 4912 4249.tmp 2832 42B6.tmp 1664 5091.tmp 3036 4352.tmp 3676 517B.tmp 336 43EE.tmp 4680 444C.tmp 2952 449A.tmp 4688 44E8.tmp 868 4546.tmp 4760 4594.tmp 1040 45E2.tmp 432 54A8.tmp 4696 467F.tmp 1924 46CD.tmp 3784 472B.tmp 4484 4779.tmp 5040 47C7.tmp 3768 4815.tmp 1408 4863.tmp 464 48B1.tmp 3396 48FF.tmp 1228 495D.tmp 316 49AB.tmp 4544 49F9.tmp 1456 4A47.tmp 1184 4AA5.tmp 1720 4AF3.tmp 1224 4B41.tmp 1948 4B9F.tmp 592 4BFD.tmp 4140 4C4B.tmp 808 4C99.tmp 4308 4CE7.tmp 1528 4D35.tmp 1296 4D93.tmp 3832 4DE1.tmp 4388 4E3F.tmp 3644 4E7E.tmp 776 4ECC.tmp 2968 4F58.tmp 4748 4FA6.tmp 4804 4FF5.tmp 2752 5043.tmp 1664 5091.tmp 4404 50DF.tmp 3572 512D.tmp 3676 517B.tmp 2288 51C9.tmp 4532 5217.tmp 2784 5266.tmp 4576 52B4.tmp 4476 5302.tmp 1548 5350.tmp 4440 539E.tmp 4756 53DD.tmp 2492 541B.tmp 432 54A8.tmp 4712 5563.tmp 3932 562E.tmp 3504 56BB.tmp 1044 5767.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4432 1496 2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe 84 PID 1496 wrote to memory of 4432 1496 2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe 84 PID 1496 wrote to memory of 4432 1496 2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe 84 PID 4432 wrote to memory of 4348 4432 414F.tmp 86 PID 4432 wrote to memory of 4348 4432 414F.tmp 86 PID 4432 wrote to memory of 4348 4432 414F.tmp 86 PID 4348 wrote to memory of 4912 4348 41EB.tmp 88 PID 4348 wrote to memory of 4912 4348 41EB.tmp 88 PID 4348 wrote to memory of 4912 4348 41EB.tmp 88 PID 4912 wrote to memory of 2832 4912 4249.tmp 90 PID 4912 wrote to memory of 2832 4912 4249.tmp 90 PID 4912 wrote to memory of 2832 4912 4249.tmp 90 PID 2832 wrote to memory of 1664 2832 42B6.tmp 138 PID 2832 wrote to memory of 1664 2832 42B6.tmp 138 PID 2832 wrote to memory of 1664 2832 42B6.tmp 138 PID 1664 wrote to memory of 3036 1664 5091.tmp 92 PID 1664 wrote to memory of 3036 1664 5091.tmp 92 PID 1664 wrote to memory of 3036 1664 5091.tmp 92 PID 3036 wrote to memory of 3676 3036 4352.tmp 141 PID 3036 wrote to memory of 3676 3036 4352.tmp 141 PID 3036 wrote to memory of 3676 3036 4352.tmp 141 PID 3676 wrote to memory of 336 3676 517B.tmp 94 PID 3676 wrote to memory of 336 3676 517B.tmp 94 PID 3676 wrote to memory of 336 3676 517B.tmp 94 PID 336 wrote to memory of 4680 336 43EE.tmp 95 PID 336 wrote to memory of 4680 336 43EE.tmp 95 PID 336 wrote to memory of 4680 336 43EE.tmp 95 PID 4680 wrote to memory of 2952 4680 444C.tmp 96 PID 4680 wrote to memory of 2952 4680 444C.tmp 96 PID 4680 wrote to memory of 2952 4680 444C.tmp 96 PID 2952 wrote to memory of 4688 2952 449A.tmp 97 PID 2952 wrote to memory of 4688 2952 449A.tmp 97 PID 2952 wrote to memory of 4688 2952 449A.tmp 97 PID 4688 wrote to memory of 868 4688 44E8.tmp 98 PID 4688 wrote to memory of 868 4688 44E8.tmp 98 PID 4688 wrote to memory of 868 4688 44E8.tmp 98 PID 868 wrote to memory of 4760 868 4546.tmp 99 PID 868 wrote to memory of 4760 868 4546.tmp 99 PID 868 wrote to memory of 4760 868 4546.tmp 99 PID 4760 wrote to memory of 1040 4760 4594.tmp 100 PID 4760 wrote to memory of 1040 4760 4594.tmp 100 PID 4760 wrote to memory of 1040 4760 4594.tmp 100 PID 1040 wrote to memory of 432 1040 45E2.tmp 151 PID 1040 wrote to memory of 432 1040 45E2.tmp 151 PID 1040 wrote to memory of 432 1040 45E2.tmp 151 PID 432 wrote to memory of 4696 432 54A8.tmp 103 PID 432 wrote to memory of 4696 432 54A8.tmp 103 PID 432 wrote to memory of 4696 432 54A8.tmp 103 PID 4696 wrote to memory of 1924 4696 467F.tmp 102 PID 4696 wrote to memory of 1924 4696 467F.tmp 102 PID 4696 wrote to memory of 1924 4696 467F.tmp 102 PID 1924 wrote to memory of 3784 1924 46CD.tmp 104 PID 1924 wrote to memory of 3784 1924 46CD.tmp 104 PID 1924 wrote to memory of 3784 1924 46CD.tmp 104 PID 3784 wrote to memory of 4484 3784 472B.tmp 105 PID 3784 wrote to memory of 4484 3784 472B.tmp 105 PID 3784 wrote to memory of 4484 3784 472B.tmp 105 PID 4484 wrote to memory of 5040 4484 4779.tmp 106 PID 4484 wrote to memory of 5040 4484 4779.tmp 106 PID 4484 wrote to memory of 5040 4484 4779.tmp 106 PID 5040 wrote to memory of 3768 5040 47C7.tmp 107 PID 5040 wrote to memory of 3768 5040 47C7.tmp 107 PID 5040 wrote to memory of 3768 5040 47C7.tmp 107 PID 3768 wrote to memory of 1408 3768 4815.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_80b26ebc039062a781ae3fcd479293c8_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\414F.tmp"C:\Users\Admin\AppData\Local\Temp\414F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\41EB.tmp"C:\Users\Admin\AppData\Local\Temp\41EB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\4249.tmp"C:\Users\Admin\AppData\Local\Temp\4249.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\42B6.tmp"C:\Users\Admin\AppData\Local\Temp\42B6.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\4304.tmp"C:\Users\Admin\AppData\Local\Temp\4304.tmp"6⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\4352.tmp"C:\Users\Admin\AppData\Local\Temp\4352.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\43A0.tmp"C:\Users\Admin\AppData\Local\Temp\43A0.tmp"8⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\43EE.tmp"C:\Users\Admin\AppData\Local\Temp\43EE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\444C.tmp"C:\Users\Admin\AppData\Local\Temp\444C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\449A.tmp"C:\Users\Admin\AppData\Local\Temp\449A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\44E8.tmp"C:\Users\Admin\AppData\Local\Temp\44E8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\4546.tmp"C:\Users\Admin\AppData\Local\Temp\4546.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\4594.tmp"C:\Users\Admin\AppData\Local\Temp\4594.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\45E2.tmp"C:\Users\Admin\AppData\Local\Temp\45E2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\4631.tmp"C:\Users\Admin\AppData\Local\Temp\4631.tmp"16⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\467F.tmp"C:\Users\Admin\AppData\Local\Temp\467F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\46CD.tmp"C:\Users\Admin\AppData\Local\Temp\46CD.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\472B.tmp"C:\Users\Admin\AppData\Local\Temp\472B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\4779.tmp"C:\Users\Admin\AppData\Local\Temp\4779.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\47C7.tmp"C:\Users\Admin\AppData\Local\Temp\47C7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\4815.tmp"C:\Users\Admin\AppData\Local\Temp\4815.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\4863.tmp"C:\Users\Admin\AppData\Local\Temp\4863.tmp"6⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\48B1.tmp"C:\Users\Admin\AppData\Local\Temp\48B1.tmp"7⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\48FF.tmp"C:\Users\Admin\AppData\Local\Temp\48FF.tmp"8⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\495D.tmp"C:\Users\Admin\AppData\Local\Temp\495D.tmp"9⤵
- Executes dropped EXE
PID:1228
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\49AB.tmp"C:\Users\Admin\AppData\Local\Temp\49AB.tmp"1⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\49F9.tmp"C:\Users\Admin\AppData\Local\Temp\49F9.tmp"2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\4AA5.tmp"C:\Users\Admin\AppData\Local\Temp\4AA5.tmp"1⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\4AF3.tmp"C:\Users\Admin\AppData\Local\Temp\4AF3.tmp"2⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\4B41.tmp"C:\Users\Admin\AppData\Local\Temp\4B41.tmp"3⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\4B9F.tmp"C:\Users\Admin\AppData\Local\Temp\4B9F.tmp"4⤵
- Executes dropped EXE
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4A47.tmp"C:\Users\Admin\AppData\Local\Temp\4A47.tmp"1⤵
- Executes dropped EXE
PID:1456
-
C:\Users\Admin\AppData\Local\Temp\4BFD.tmp"C:\Users\Admin\AppData\Local\Temp\4BFD.tmp"1⤵
- Executes dropped EXE
PID:592 -
C:\Users\Admin\AppData\Local\Temp\4C4B.tmp"C:\Users\Admin\AppData\Local\Temp\4C4B.tmp"2⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\4C99.tmp"C:\Users\Admin\AppData\Local\Temp\4C99.tmp"3⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"4⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\4D35.tmp"C:\Users\Admin\AppData\Local\Temp\4D35.tmp"5⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"6⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"7⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"8⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"9⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"10⤵
- Executes dropped EXE
PID:776
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"1⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"2⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"3⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"4⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\5043.tmp"C:\Users\Admin\AppData\Local\Temp\5043.tmp"5⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\5091.tmp"C:\Users\Admin\AppData\Local\Temp\5091.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\50DF.tmp"C:\Users\Admin\AppData\Local\Temp\50DF.tmp"7⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\512D.tmp"C:\Users\Admin\AppData\Local\Temp\512D.tmp"8⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\517B.tmp"C:\Users\Admin\AppData\Local\Temp\517B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\51C9.tmp"C:\Users\Admin\AppData\Local\Temp\51C9.tmp"10⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\5217.tmp"C:\Users\Admin\AppData\Local\Temp\5217.tmp"11⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"12⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"13⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\5302.tmp"C:\Users\Admin\AppData\Local\Temp\5302.tmp"14⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"15⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"16⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\53DD.tmp"C:\Users\Admin\AppData\Local\Temp\53DD.tmp"17⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\541B.tmp"C:\Users\Admin\AppData\Local\Temp\541B.tmp"18⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\54A8.tmp"C:\Users\Admin\AppData\Local\Temp\54A8.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"20⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\562E.tmp"C:\Users\Admin\AppData\Local\Temp\562E.tmp"21⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\56BB.tmp"C:\Users\Admin\AppData\Local\Temp\56BB.tmp"22⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"23⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\5832.tmp"C:\Users\Admin\AppData\Local\Temp\5832.tmp"24⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\5880.tmp"C:\Users\Admin\AppData\Local\Temp\5880.tmp"25⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\58CE.tmp"C:\Users\Admin\AppData\Local\Temp\58CE.tmp"26⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\590D.tmp"C:\Users\Admin\AppData\Local\Temp\590D.tmp"27⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\595B.tmp"C:\Users\Admin\AppData\Local\Temp\595B.tmp"28⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"29⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"30⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"31⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"32⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"33⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\5B20.tmp"C:\Users\Admin\AppData\Local\Temp\5B20.tmp"34⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"35⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"36⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\5C0A.tmp"C:\Users\Admin\AppData\Local\Temp\5C0A.tmp"37⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"38⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\5D43.tmp"C:\Users\Admin\AppData\Local\Temp\5D43.tmp"39⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"40⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"41⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\5E8B.tmp"C:\Users\Admin\AppData\Local\Temp\5E8B.tmp"42⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"43⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"44⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\5F95.tmp"C:\Users\Admin\AppData\Local\Temp\5F95.tmp"45⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"46⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\6050.tmp"C:\Users\Admin\AppData\Local\Temp\6050.tmp"47⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\60AE.tmp"C:\Users\Admin\AppData\Local\Temp\60AE.tmp"48⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\60FC.tmp"C:\Users\Admin\AppData\Local\Temp\60FC.tmp"49⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\615A.tmp"C:\Users\Admin\AppData\Local\Temp\615A.tmp"50⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\61A8.tmp"C:\Users\Admin\AppData\Local\Temp\61A8.tmp"51⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\6206.tmp"C:\Users\Admin\AppData\Local\Temp\6206.tmp"52⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"53⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\62A2.tmp"C:\Users\Admin\AppData\Local\Temp\62A2.tmp"54⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\6300.tmp"C:\Users\Admin\AppData\Local\Temp\6300.tmp"55⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\635D.tmp"C:\Users\Admin\AppData\Local\Temp\635D.tmp"56⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\63BB.tmp"C:\Users\Admin\AppData\Local\Temp\63BB.tmp"57⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"58⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\6477.tmp"C:\Users\Admin\AppData\Local\Temp\6477.tmp"59⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\64D4.tmp"C:\Users\Admin\AppData\Local\Temp\64D4.tmp"60⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\6532.tmp"C:\Users\Admin\AppData\Local\Temp\6532.tmp"61⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\6590.tmp"C:\Users\Admin\AppData\Local\Temp\6590.tmp"62⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"63⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"64⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\66A9.tmp"C:\Users\Admin\AppData\Local\Temp\66A9.tmp"65⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\6707.tmp"C:\Users\Admin\AppData\Local\Temp\6707.tmp"66⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\6765.tmp"C:\Users\Admin\AppData\Local\Temp\6765.tmp"67⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\67C2.tmp"C:\Users\Admin\AppData\Local\Temp\67C2.tmp"68⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"69⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\686E.tmp"C:\Users\Admin\AppData\Local\Temp\686E.tmp"70⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\68CC.tmp"C:\Users\Admin\AppData\Local\Temp\68CC.tmp"71⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\692A.tmp"C:\Users\Admin\AppData\Local\Temp\692A.tmp"72⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\6978.tmp"C:\Users\Admin\AppData\Local\Temp\6978.tmp"73⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\69C6.tmp"C:\Users\Admin\AppData\Local\Temp\69C6.tmp"74⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"75⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\6A81.tmp"C:\Users\Admin\AppData\Local\Temp\6A81.tmp"76⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"77⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"78⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"79⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"80⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\6C27.tmp"C:\Users\Admin\AppData\Local\Temp\6C27.tmp"81⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\6C75.tmp"C:\Users\Admin\AppData\Local\Temp\6C75.tmp"82⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"83⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\6D21.tmp"C:\Users\Admin\AppData\Local\Temp\6D21.tmp"84⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"85⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"86⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"87⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"88⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"89⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\6F25.tmp"C:\Users\Admin\AppData\Local\Temp\6F25.tmp"90⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"91⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\6FC1.tmp"C:\Users\Admin\AppData\Local\Temp\6FC1.tmp"92⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"93⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\706D.tmp"C:\Users\Admin\AppData\Local\Temp\706D.tmp"94⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\70CB.tmp"C:\Users\Admin\AppData\Local\Temp\70CB.tmp"95⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\7119.tmp"C:\Users\Admin\AppData\Local\Temp\7119.tmp"96⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\7167.tmp"C:\Users\Admin\AppData\Local\Temp\7167.tmp"97⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"98⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\7213.tmp"C:\Users\Admin\AppData\Local\Temp\7213.tmp"99⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"100⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\72AF.tmp"C:\Users\Admin\AppData\Local\Temp\72AF.tmp"101⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"102⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp"103⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\73B9.tmp"C:\Users\Admin\AppData\Local\Temp\73B9.tmp"104⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\7417.tmp"C:\Users\Admin\AppData\Local\Temp\7417.tmp"105⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\7474.tmp"C:\Users\Admin\AppData\Local\Temp\7474.tmp"106⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\74C2.tmp"C:\Users\Admin\AppData\Local\Temp\74C2.tmp"107⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\7511.tmp"C:\Users\Admin\AppData\Local\Temp\7511.tmp"108⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\755F.tmp"C:\Users\Admin\AppData\Local\Temp\755F.tmp"109⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\75AD.tmp"C:\Users\Admin\AppData\Local\Temp\75AD.tmp"110⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\75FB.tmp"C:\Users\Admin\AppData\Local\Temp\75FB.tmp"111⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\7649.tmp"C:\Users\Admin\AppData\Local\Temp\7649.tmp"112⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\76A7.tmp"C:\Users\Admin\AppData\Local\Temp\76A7.tmp"113⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\76F5.tmp"C:\Users\Admin\AppData\Local\Temp\76F5.tmp"114⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\7733.tmp"C:\Users\Admin\AppData\Local\Temp\7733.tmp"115⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\7782.tmp"C:\Users\Admin\AppData\Local\Temp\7782.tmp"116⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\77D0.tmp"C:\Users\Admin\AppData\Local\Temp\77D0.tmp"117⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"118⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\786C.tmp"C:\Users\Admin\AppData\Local\Temp\786C.tmp"119⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"120⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\7908.tmp"C:\Users\Admin\AppData\Local\Temp\7908.tmp"121⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\7956.tmp"C:\Users\Admin\AppData\Local\Temp\7956.tmp"122⤵PID:2468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-