Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe
-
Size
486KB
-
MD5
b341701b0e9f9f817fb38748f5e58104
-
SHA1
9199da81b5c3fef4fb2462add8fcf657ab1673f6
-
SHA256
860aea89156db53a3fbe4319afa4b3c26262c5bf0bb2bbbfe3cc8a0608ba43ac
-
SHA512
f3390d1f7398e3bce8a6d8abfb33a9356f175729e127e3b3cea84282afc04c765af2a8adf05fb8802ffae1e4f1b051034140886eacedc6fec23afa4a3e573387
-
SSDEEP
12288:/U5rCOTeiDnDCEbwIwEoSvoRQLN5yYZrnPFCHiNZ:/UQOJDDCFL98frnPFCHiN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2292 3FA9.tmp 2104 4006.tmp 3076 4064.tmp 2532 4D26.tmp 1988 4100.tmp 1964 415E.tmp 3380 41BC.tmp 4116 421A.tmp 3244 4268.tmp 2208 4DD2.tmp 1072 4304.tmp 1800 4352.tmp 4260 43A0.tmp 5028 43EE.tmp 4996 443D.tmp 2620 448B.tmp 2400 44D9.tmp 3608 4527.tmp 4308 4575.tmp 2852 45C3.tmp 3624 4621.tmp 3664 466F.tmp 4548 46BD.tmp 1224 471B.tmp 3172 4769.tmp 3648 47B7.tmp 976 4805.tmp 432 4853.tmp 3576 56EA.tmp 3968 48F0.tmp 1920 494D.tmp 4356 499C.tmp 3544 49EA.tmp 4868 4A86.tmp 1460 4AD4.tmp 2292 4B13.tmp 1908 4B61.tmp 1344 4BAF.tmp 1808 4BED.tmp 2348 4C3B.tmp 400 4C8A.tmp 5092 4CD8.tmp 2532 4D26.tmp 4032 4D84.tmp 2208 4DD2.tmp 864 4E20.tmp 2652 4E6E.tmp 4608 4EBC.tmp 4260 43A0.tmp 4412 4F58.tmp 4716 4F97.tmp 3596 4FE5.tmp 2620 448B.tmp 4552 5081.tmp 4880 50CF.tmp 1316 511D.tmp 2436 516C.tmp 4640 51AA.tmp 1620 51E9.tmp 1752 5237.tmp 4220 5285.tmp 1592 52D3.tmp 1232 5311.tmp 3816 5360.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 2292 636 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 86 PID 636 wrote to memory of 2292 636 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 86 PID 636 wrote to memory of 2292 636 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 86 PID 2292 wrote to memory of 2104 2292 4B13.tmp 89 PID 2292 wrote to memory of 2104 2292 4B13.tmp 89 PID 2292 wrote to memory of 2104 2292 4B13.tmp 89 PID 2104 wrote to memory of 3076 2104 4006.tmp 90 PID 2104 wrote to memory of 3076 2104 4006.tmp 90 PID 2104 wrote to memory of 3076 2104 4006.tmp 90 PID 3076 wrote to memory of 2532 3076 4064.tmp 147 PID 3076 wrote to memory of 2532 3076 4064.tmp 147 PID 3076 wrote to memory of 2532 3076 4064.tmp 147 PID 2532 wrote to memory of 1988 2532 4D26.tmp 93 PID 2532 wrote to memory of 1988 2532 4D26.tmp 93 PID 2532 wrote to memory of 1988 2532 4D26.tmp 93 PID 1988 wrote to memory of 1964 1988 4100.tmp 94 PID 1988 wrote to memory of 1964 1988 4100.tmp 94 PID 1988 wrote to memory of 1964 1988 4100.tmp 94 PID 1964 wrote to memory of 3380 1964 415E.tmp 95 PID 1964 wrote to memory of 3380 1964 415E.tmp 95 PID 1964 wrote to memory of 3380 1964 415E.tmp 95 PID 3380 wrote to memory of 4116 3380 41BC.tmp 96 PID 3380 wrote to memory of 4116 3380 41BC.tmp 96 PID 3380 wrote to memory of 4116 3380 41BC.tmp 96 PID 4116 wrote to memory of 3244 4116 421A.tmp 97 PID 4116 wrote to memory of 3244 4116 421A.tmp 97 PID 4116 wrote to memory of 3244 4116 421A.tmp 97 PID 3244 wrote to memory of 2208 3244 4268.tmp 122 PID 3244 wrote to memory of 2208 3244 4268.tmp 122 PID 3244 wrote to memory of 2208 3244 4268.tmp 122 PID 2208 wrote to memory of 1072 2208 4DD2.tmp 99 PID 2208 wrote to memory of 1072 2208 4DD2.tmp 99 PID 2208 wrote to memory of 1072 2208 4DD2.tmp 99 PID 1072 wrote to memory of 1800 1072 4304.tmp 100 PID 1072 wrote to memory of 1800 1072 4304.tmp 100 PID 1072 wrote to memory of 1800 1072 4304.tmp 100 PID 1800 wrote to memory of 4260 1800 4352.tmp 167 PID 1800 wrote to memory of 4260 1800 4352.tmp 167 PID 1800 wrote to memory of 4260 1800 4352.tmp 167 PID 4260 wrote to memory of 5028 4260 43A0.tmp 102 PID 4260 wrote to memory of 5028 4260 43A0.tmp 102 PID 4260 wrote to memory of 5028 4260 43A0.tmp 102 PID 5028 wrote to memory of 4996 5028 43EE.tmp 101 PID 5028 wrote to memory of 4996 5028 43EE.tmp 101 PID 5028 wrote to memory of 4996 5028 43EE.tmp 101 PID 4996 wrote to memory of 2620 4996 443D.tmp 166 PID 4996 wrote to memory of 2620 4996 443D.tmp 166 PID 4996 wrote to memory of 2620 4996 443D.tmp 166 PID 2620 wrote to memory of 2400 2620 448B.tmp 165 PID 2620 wrote to memory of 2400 2620 448B.tmp 165 PID 2620 wrote to memory of 2400 2620 448B.tmp 165 PID 2400 wrote to memory of 3608 2400 44D9.tmp 104 PID 2400 wrote to memory of 3608 2400 44D9.tmp 104 PID 2400 wrote to memory of 3608 2400 44D9.tmp 104 PID 3608 wrote to memory of 4308 3608 4527.tmp 103 PID 3608 wrote to memory of 4308 3608 4527.tmp 103 PID 3608 wrote to memory of 4308 3608 4527.tmp 103 PID 4308 wrote to memory of 2852 4308 4575.tmp 105 PID 4308 wrote to memory of 2852 4308 4575.tmp 105 PID 4308 wrote to memory of 2852 4308 4575.tmp 105 PID 2852 wrote to memory of 3624 2852 45C3.tmp 106 PID 2852 wrote to memory of 3624 2852 45C3.tmp 106 PID 2852 wrote to memory of 3624 2852 45C3.tmp 106 PID 3624 wrote to memory of 3664 3624 4621.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\3FA9.tmp"C:\Users\Admin\AppData\Local\Temp\3FA9.tmp"2⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\4006.tmp"C:\Users\Admin\AppData\Local\Temp\4006.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\4064.tmp"C:\Users\Admin\AppData\Local\Temp\4064.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\40B2.tmp"C:\Users\Admin\AppData\Local\Temp\40B2.tmp"5⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\4100.tmp"C:\Users\Admin\AppData\Local\Temp\4100.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\415E.tmp"C:\Users\Admin\AppData\Local\Temp\415E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\41BC.tmp"C:\Users\Admin\AppData\Local\Temp\41BC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\421A.tmp"C:\Users\Admin\AppData\Local\Temp\421A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\4268.tmp"C:\Users\Admin\AppData\Local\Temp\4268.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\42B6.tmp"C:\Users\Admin\AppData\Local\Temp\42B6.tmp"11⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\4304.tmp"C:\Users\Admin\AppData\Local\Temp\4304.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\4352.tmp"C:\Users\Admin\AppData\Local\Temp\4352.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\43A0.tmp"C:\Users\Admin\AppData\Local\Temp\43A0.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp"6⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\4E20.tmp"C:\Users\Admin\AppData\Local\Temp\4E20.tmp"8⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"9⤵
- Executes dropped EXE
PID:2652
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B61.tmp"C:\Users\Admin\AppData\Local\Temp\4B61.tmp"3⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\4BAF.tmp"C:\Users\Admin\AppData\Local\Temp\4BAF.tmp"4⤵
- Executes dropped EXE
PID:1344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\443D.tmp"C:\Users\Admin\AppData\Local\Temp\443D.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\448B.tmp"C:\Users\Admin\AppData\Local\Temp\448B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\43EE.tmp"C:\Users\Admin\AppData\Local\Temp\43EE.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028
-
C:\Users\Admin\AppData\Local\Temp\4575.tmp"C:\Users\Admin\AppData\Local\Temp\4575.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\45C3.tmp"C:\Users\Admin\AppData\Local\Temp\45C3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\4621.tmp"C:\Users\Admin\AppData\Local\Temp\4621.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\466F.tmp"C:\Users\Admin\AppData\Local\Temp\466F.tmp"4⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\46BD.tmp"C:\Users\Admin\AppData\Local\Temp\46BD.tmp"5⤵
- Executes dropped EXE
PID:4548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4527.tmp"C:\Users\Admin\AppData\Local\Temp\4527.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608
-
C:\Users\Admin\AppData\Local\Temp\494D.tmp"C:\Users\Admin\AppData\Local\Temp\494D.tmp"1⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\499C.tmp"C:\Users\Admin\AppData\Local\Temp\499C.tmp"2⤵
- Executes dropped EXE
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\49EA.tmp"C:\Users\Admin\AppData\Local\Temp\49EA.tmp"1⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\4A38.tmp"C:\Users\Admin\AppData\Local\Temp\4A38.tmp"2⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\4A86.tmp"C:\Users\Admin\AppData\Local\Temp\4A86.tmp"3⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"4⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\4B13.tmp"C:\Users\Admin\AppData\Local\Temp\4B13.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4BED.tmp"C:\Users\Admin\AppData\Local\Temp\4BED.tmp"1⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"2⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"3⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"4⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\4D26.tmp"C:\Users\Admin\AppData\Local\Temp\4D26.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"1⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"2⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"3⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\4F97.tmp"C:\Users\Admin\AppData\Local\Temp\4F97.tmp"4⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\4FE5.tmp"C:\Users\Admin\AppData\Local\Temp\4FE5.tmp"5⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\5033.tmp"C:\Users\Admin\AppData\Local\Temp\5033.tmp"6⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\44D9.tmp"C:\Users\Admin\AppData\Local\Temp\44D9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5081.tmp"C:\Users\Admin\AppData\Local\Temp\5081.tmp"1⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\50CF.tmp"C:\Users\Admin\AppData\Local\Temp\50CF.tmp"2⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\511D.tmp"C:\Users\Admin\AppData\Local\Temp\511D.tmp"3⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\516C.tmp"C:\Users\Admin\AppData\Local\Temp\516C.tmp"4⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\51AA.tmp"C:\Users\Admin\AppData\Local\Temp\51AA.tmp"5⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"6⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\5237.tmp"C:\Users\Admin\AppData\Local\Temp\5237.tmp"7⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\5285.tmp"C:\Users\Admin\AppData\Local\Temp\5285.tmp"8⤵
- Executes dropped EXE
PID:4220
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5311.tmp"C:\Users\Admin\AppData\Local\Temp\5311.tmp"1⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\5360.tmp"C:\Users\Admin\AppData\Local\Temp\5360.tmp"2⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\53AE.tmp"C:\Users\Admin\AppData\Local\Temp\53AE.tmp"3⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"4⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"5⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\5488.tmp"C:\Users\Admin\AppData\Local\Temp\5488.tmp"6⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\54C7.tmp"C:\Users\Admin\AppData\Local\Temp\54C7.tmp"7⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\5515.tmp"C:\Users\Admin\AppData\Local\Temp\5515.tmp"8⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"9⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"10⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"11⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"12⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\56EA.tmp"C:\Users\Admin\AppData\Local\Temp\56EA.tmp"13⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"14⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"15⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"16⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"17⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\59C8.tmp"C:\Users\Admin\AppData\Local\Temp\59C8.tmp"18⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"19⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"20⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"21⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"22⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"23⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"24⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"25⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\5D43.tmp"C:\Users\Admin\AppData\Local\Temp\5D43.tmp"26⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\5D91.tmp"C:\Users\Admin\AppData\Local\Temp\5D91.tmp"27⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"28⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"29⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"30⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"31⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"32⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"33⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"34⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"35⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"36⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\60CD.tmp"C:\Users\Admin\AppData\Local\Temp\60CD.tmp"37⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"38⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\6169.tmp"C:\Users\Admin\AppData\Local\Temp\6169.tmp"39⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"40⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\6206.tmp"C:\Users\Admin\AppData\Local\Temp\6206.tmp"41⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"42⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\62B1.tmp"C:\Users\Admin\AppData\Local\Temp\62B1.tmp"43⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\6300.tmp"C:\Users\Admin\AppData\Local\Temp\6300.tmp"44⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\634E.tmp"C:\Users\Admin\AppData\Local\Temp\634E.tmp"45⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\63AB.tmp"C:\Users\Admin\AppData\Local\Temp\63AB.tmp"46⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"47⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\6457.tmp"C:\Users\Admin\AppData\Local\Temp\6457.tmp"48⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"49⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"50⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"51⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"52⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"53⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\663C.tmp"C:\Users\Admin\AppData\Local\Temp\663C.tmp"54⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\6699.tmp"C:\Users\Admin\AppData\Local\Temp\6699.tmp"55⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\66F7.tmp"C:\Users\Admin\AppData\Local\Temp\66F7.tmp"56⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\6755.tmp"C:\Users\Admin\AppData\Local\Temp\6755.tmp"57⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\67B3.tmp"C:\Users\Admin\AppData\Local\Temp\67B3.tmp"58⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"59⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"60⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"61⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"62⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"63⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"64⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\69E5.tmp"C:\Users\Admin\AppData\Local\Temp\69E5.tmp"65⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"66⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\6A81.tmp"C:\Users\Admin\AppData\Local\Temp\6A81.tmp"67⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"68⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"69⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\6B7B.tmp"C:\Users\Admin\AppData\Local\Temp\6B7B.tmp"70⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"71⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\6C18.tmp"C:\Users\Admin\AppData\Local\Temp\6C18.tmp"72⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\6C66.tmp"C:\Users\Admin\AppData\Local\Temp\6C66.tmp"73⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"74⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\6D02.tmp"C:\Users\Admin\AppData\Local\Temp\6D02.tmp"75⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"76⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"77⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"78⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"79⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\6E89.tmp"C:\Users\Admin\AppData\Local\Temp\6E89.tmp"80⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"81⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\6F35.tmp"C:\Users\Admin\AppData\Local\Temp\6F35.tmp"82⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\6F83.tmp"C:\Users\Admin\AppData\Local\Temp\6F83.tmp"83⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"84⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\703E.tmp"C:\Users\Admin\AppData\Local\Temp\703E.tmp"85⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\708C.tmp"C:\Users\Admin\AppData\Local\Temp\708C.tmp"86⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\70DA.tmp"C:\Users\Admin\AppData\Local\Temp\70DA.tmp"87⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"88⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\7186.tmp"C:\Users\Admin\AppData\Local\Temp\7186.tmp"89⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\71E4.tmp"C:\Users\Admin\AppData\Local\Temp\71E4.tmp"90⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\7232.tmp"C:\Users\Admin\AppData\Local\Temp\7232.tmp"91⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\7290.tmp"C:\Users\Admin\AppData\Local\Temp\7290.tmp"92⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\72DE.tmp"C:\Users\Admin\AppData\Local\Temp\72DE.tmp"93⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\733C.tmp"C:\Users\Admin\AppData\Local\Temp\733C.tmp"94⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"95⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\73D8.tmp"C:\Users\Admin\AppData\Local\Temp\73D8.tmp"96⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"97⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"98⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"99⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"100⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"101⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"102⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\7639.tmp"C:\Users\Admin\AppData\Local\Temp\7639.tmp"103⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\7688.tmp"C:\Users\Admin\AppData\Local\Temp\7688.tmp"104⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\76D6.tmp"C:\Users\Admin\AppData\Local\Temp\76D6.tmp"105⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"106⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\7772.tmp"C:\Users\Admin\AppData\Local\Temp\7772.tmp"107⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"108⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"109⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\786C.tmp"C:\Users\Admin\AppData\Local\Temp\786C.tmp"110⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"111⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\7908.tmp"C:\Users\Admin\AppData\Local\Temp\7908.tmp"112⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\7956.tmp"C:\Users\Admin\AppData\Local\Temp\7956.tmp"113⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\79B4.tmp"C:\Users\Admin\AppData\Local\Temp\79B4.tmp"114⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\7A02.tmp"C:\Users\Admin\AppData\Local\Temp\7A02.tmp"115⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\7A50.tmp"C:\Users\Admin\AppData\Local\Temp\7A50.tmp"116⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"117⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"118⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"119⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\7B89.tmp"C:\Users\Admin\AppData\Local\Temp\7B89.tmp"120⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"121⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\7C25.tmp"C:\Users\Admin\AppData\Local\Temp\7C25.tmp"122⤵PID:2012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-