Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe
-
Size
486KB
-
MD5
d512ed2fb3c65c8b0bff681a3fa2efe9
-
SHA1
3ea210c1780b9832b1642608c67abdf61c950e1d
-
SHA256
3761462e4928d469e76a087c188c1c2c9c1d0047e341a2922d32c002186d41bc
-
SHA512
f0331b1a6fe7190c1b584387c54b6cccff248dfff0dcad6b00dd79d10856e15d018fa185c306da8f78138d092ee41beb2dbdf4527b4841d987dd6038237b1e62
-
SSDEEP
12288:oU5rCOTeiDJK/o6zrrCrWT85AQi/b3INZ:oUQOJDJKtrrMi1P/8N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2512 1390.tmp 2712 13CF.tmp 2792 141D.tmp 2676 146B.tmp 2228 14A9.tmp 2600 14F7.tmp 2704 1536.tmp 2564 1584.tmp 2632 15C2.tmp 3024 1620.tmp 1924 165E.tmp 2656 169C.tmp 3044 16DB.tmp 2316 1719.tmp 2448 1758.tmp 2452 1796.tmp 1504 17D4.tmp 1796 1813.tmp 2636 1851.tmp 2132 1890.tmp 1456 18DE.tmp 1268 192C.tmp 2040 19B8.tmp 2196 1A06.tmp 2052 1A44.tmp 1836 1A83.tmp 1244 1AE0.tmp 536 1B1F.tmp 696 1B5D.tmp 760 1B9C.tmp 1072 1BCA.tmp 2956 1C09.tmp 2604 1C47.tmp 2532 1C86.tmp 1880 1CC4.tmp 2428 1D02.tmp 848 1D41.tmp 1184 1D7F.tmp 552 1DBE.tmp 996 1DFC.tmp 1480 1E3A.tmp 1288 1E79.tmp 288 1EB7.tmp 1684 1EF6.tmp 928 1F34.tmp 1144 1F72.tmp 712 1FA1.tmp 2488 1FE0.tmp 2444 201E.tmp 1932 205C.tmp 796 209B.tmp 2124 20D9.tmp 2996 2118.tmp 1892 2156.tmp 1656 2194.tmp 2464 21D3.tmp 1676 2211.tmp 2764 2250.tmp 2760 228E.tmp 2756 22CC.tmp 2940 230B.tmp 2816 2349.tmp 2788 2397.tmp 2228 23E5.tmp -
Loads dropped DLL 64 IoCs
pid Process 2464 2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe 2512 1390.tmp 2712 13CF.tmp 2792 141D.tmp 2676 146B.tmp 2228 14A9.tmp 2600 14F7.tmp 2704 1536.tmp 2564 1584.tmp 2632 15C2.tmp 3024 1620.tmp 1924 165E.tmp 2656 169C.tmp 3044 16DB.tmp 2316 1719.tmp 2448 1758.tmp 2452 1796.tmp 1504 17D4.tmp 1796 1813.tmp 2636 1851.tmp 2132 1890.tmp 1456 18DE.tmp 1268 192C.tmp 2040 19B8.tmp 2196 1A06.tmp 2052 1A44.tmp 1836 1A83.tmp 1244 1AE0.tmp 536 1B1F.tmp 696 1B5D.tmp 760 1B9C.tmp 1072 1BCA.tmp 2956 1C09.tmp 2604 1C47.tmp 2532 1C86.tmp 1880 1CC4.tmp 2428 1D02.tmp 848 1D41.tmp 1184 1D7F.tmp 552 1DBE.tmp 996 1DFC.tmp 1480 1E3A.tmp 1288 1E79.tmp 288 1EB7.tmp 1684 1EF6.tmp 928 1F34.tmp 1144 1F72.tmp 712 1FA1.tmp 2488 1FE0.tmp 2444 201E.tmp 1932 205C.tmp 796 209B.tmp 2124 20D9.tmp 2996 2118.tmp 1892 2156.tmp 1656 2194.tmp 2464 21D3.tmp 1676 2211.tmp 2764 2250.tmp 2760 228E.tmp 2756 22CC.tmp 2940 230B.tmp 2816 2349.tmp 2788 2397.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2512 2464 2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe 28 PID 2464 wrote to memory of 2512 2464 2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe 28 PID 2464 wrote to memory of 2512 2464 2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe 28 PID 2464 wrote to memory of 2512 2464 2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe 28 PID 2512 wrote to memory of 2712 2512 1390.tmp 29 PID 2512 wrote to memory of 2712 2512 1390.tmp 29 PID 2512 wrote to memory of 2712 2512 1390.tmp 29 PID 2512 wrote to memory of 2712 2512 1390.tmp 29 PID 2712 wrote to memory of 2792 2712 13CF.tmp 30 PID 2712 wrote to memory of 2792 2712 13CF.tmp 30 PID 2712 wrote to memory of 2792 2712 13CF.tmp 30 PID 2712 wrote to memory of 2792 2712 13CF.tmp 30 PID 2792 wrote to memory of 2676 2792 141D.tmp 32 PID 2792 wrote to memory of 2676 2792 141D.tmp 32 PID 2792 wrote to memory of 2676 2792 141D.tmp 32 PID 2792 wrote to memory of 2676 2792 141D.tmp 32 PID 2676 wrote to memory of 2228 2676 146B.tmp 31 PID 2676 wrote to memory of 2228 2676 146B.tmp 31 PID 2676 wrote to memory of 2228 2676 146B.tmp 31 PID 2676 wrote to memory of 2228 2676 146B.tmp 31 PID 2228 wrote to memory of 2600 2228 14A9.tmp 33 PID 2228 wrote to memory of 2600 2228 14A9.tmp 33 PID 2228 wrote to memory of 2600 2228 14A9.tmp 33 PID 2228 wrote to memory of 2600 2228 14A9.tmp 33 PID 2600 wrote to memory of 2704 2600 14F7.tmp 35 PID 2600 wrote to memory of 2704 2600 14F7.tmp 35 PID 2600 wrote to memory of 2704 2600 14F7.tmp 35 PID 2600 wrote to memory of 2704 2600 14F7.tmp 35 PID 2704 wrote to memory of 2564 2704 1536.tmp 34 PID 2704 wrote to memory of 2564 2704 1536.tmp 34 PID 2704 wrote to memory of 2564 2704 1536.tmp 34 PID 2704 wrote to memory of 2564 2704 1536.tmp 34 PID 2564 wrote to memory of 2632 2564 1584.tmp 87 PID 2564 wrote to memory of 2632 2564 1584.tmp 87 PID 2564 wrote to memory of 2632 2564 1584.tmp 87 PID 2564 wrote to memory of 2632 2564 1584.tmp 87 PID 2632 wrote to memory of 3024 2632 15C2.tmp 86 PID 2632 wrote to memory of 3024 2632 15C2.tmp 86 PID 2632 wrote to memory of 3024 2632 15C2.tmp 86 PID 2632 wrote to memory of 3024 2632 15C2.tmp 86 PID 3024 wrote to memory of 1924 3024 1620.tmp 36 PID 3024 wrote to memory of 1924 3024 1620.tmp 36 PID 3024 wrote to memory of 1924 3024 1620.tmp 36 PID 3024 wrote to memory of 1924 3024 1620.tmp 36 PID 1924 wrote to memory of 2656 1924 165E.tmp 37 PID 1924 wrote to memory of 2656 1924 165E.tmp 37 PID 1924 wrote to memory of 2656 1924 165E.tmp 37 PID 1924 wrote to memory of 2656 1924 165E.tmp 37 PID 2656 wrote to memory of 3044 2656 169C.tmp 85 PID 2656 wrote to memory of 3044 2656 169C.tmp 85 PID 2656 wrote to memory of 3044 2656 169C.tmp 85 PID 2656 wrote to memory of 3044 2656 169C.tmp 85 PID 3044 wrote to memory of 2316 3044 16DB.tmp 38 PID 3044 wrote to memory of 2316 3044 16DB.tmp 38 PID 3044 wrote to memory of 2316 3044 16DB.tmp 38 PID 3044 wrote to memory of 2316 3044 16DB.tmp 38 PID 2316 wrote to memory of 2448 2316 1719.tmp 84 PID 2316 wrote to memory of 2448 2316 1719.tmp 84 PID 2316 wrote to memory of 2448 2316 1719.tmp 84 PID 2316 wrote to memory of 2448 2316 1719.tmp 84 PID 2448 wrote to memory of 2452 2448 1758.tmp 83 PID 2448 wrote to memory of 2452 2448 1758.tmp 83 PID 2448 wrote to memory of 2452 2448 1758.tmp 83 PID 2448 wrote to memory of 2452 2448 1758.tmp 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_d512ed2fb3c65c8b0bff681a3fa2efe9_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\1390.tmp"C:\Users\Admin\AppData\Local\Temp\1390.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\13CF.tmp"C:\Users\Admin\AppData\Local\Temp\13CF.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\146B.tmp"C:\Users\Admin\AppData\Local\Temp\146B.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14A9.tmp"C:\Users\Admin\AppData\Local\Temp\14A9.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\14F7.tmp"C:\Users\Admin\AppData\Local\Temp\14F7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\1536.tmp"C:\Users\Admin\AppData\Local\Temp\1536.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1584.tmp"C:\Users\Admin\AppData\Local\Temp\1584.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\15C2.tmp"C:\Users\Admin\AppData\Local\Temp\15C2.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\169C.tmp"C:\Users\Admin\AppData\Local\Temp\169C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\16DB.tmp"C:\Users\Admin\AppData\Local\Temp\16DB.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\19B8.tmp"C:\Users\Admin\AppData\Local\Temp\19B8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\1A06.tmp"C:\Users\Admin\AppData\Local\Temp\1A06.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\1A44.tmp"C:\Users\Admin\AppData\Local\Temp\1A44.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\1A83.tmp"C:\Users\Admin\AppData\Local\Temp\1A83.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536 -
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\1C09.tmp"C:\Users\Admin\AppData\Local\Temp\1C09.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\1C47.tmp"C:\Users\Admin\AppData\Local\Temp\1C47.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C86.tmp"C:\Users\Admin\AppData\Local\Temp\1C86.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\1D02.tmp"C:\Users\Admin\AppData\Local\Temp\1D02.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\1D41.tmp"C:\Users\Admin\AppData\Local\Temp\1D41.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\1DBE.tmp"C:\Users\Admin\AppData\Local\Temp\1DBE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:552 -
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996 -
C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1480
-
-
-
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:288 -
C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\1F34.tmp"C:\Users\Admin\AppData\Local\Temp\1F34.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:712 -
C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\201E.tmp"C:\Users\Admin\AppData\Local\Temp\201E.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\205C.tmp"C:\Users\Admin\AppData\Local\Temp\205C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\209B.tmp"C:\Users\Admin\AppData\Local\Temp\209B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\1E79.tmp"C:\Users\Admin\AppData\Local\Temp\1E79.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288
-
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp"C:\Users\Admin\AppData\Local\Temp\20D9.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\2118.tmp"C:\Users\Admin\AppData\Local\Temp\2118.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\2194.tmp"C:\Users\Admin\AppData\Local\Temp\2194.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\2211.tmp"C:\Users\Admin\AppData\Local\Temp\2211.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\18DE.tmp"C:\Users\Admin\AppData\Local\Temp\18DE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1456
-
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\22CC.tmp"C:\Users\Admin\AppData\Local\Temp\22CC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\230B.tmp"C:\Users\Admin\AppData\Local\Temp\230B.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\2349.tmp"C:\Users\Admin\AppData\Local\Temp\2349.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\2397.tmp"C:\Users\Admin\AppData\Local\Temp\2397.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"6⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\2443.tmp"C:\Users\Admin\AppData\Local\Temp\2443.tmp"7⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2491.tmp"C:\Users\Admin\AppData\Local\Temp\2491.tmp"8⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"9⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\251D.tmp"C:\Users\Admin\AppData\Local\Temp\251D.tmp"10⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"11⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\259A.tmp"C:\Users\Admin\AppData\Local\Temp\259A.tmp"12⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"13⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2626.tmp"C:\Users\Admin\AppData\Local\Temp\2626.tmp"14⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2674.tmp"C:\Users\Admin\AppData\Local\Temp\2674.tmp"15⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\26C2.tmp"C:\Users\Admin\AppData\Local\Temp\26C2.tmp"16⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"17⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"18⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"19⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"20⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"21⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2848.tmp"C:\Users\Admin\AppData\Local\Temp\2848.tmp"22⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"23⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\28C5.tmp"C:\Users\Admin\AppData\Local\Temp\28C5.tmp"24⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\2904.tmp"C:\Users\Admin\AppData\Local\Temp\2904.tmp"25⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2942.tmp"C:\Users\Admin\AppData\Local\Temp\2942.tmp"26⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"27⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"28⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\29FD.tmp"C:\Users\Admin\AppData\Local\Temp\29FD.tmp"29⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"30⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"31⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"32⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"33⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2B35.tmp"C:\Users\Admin\AppData\Local\Temp\2B35.tmp"34⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2B74.tmp"C:\Users\Admin\AppData\Local\Temp\2B74.tmp"35⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2BB2.tmp"C:\Users\Admin\AppData\Local\Temp\2BB2.tmp"36⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"37⤵PID:496
-
C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"38⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"39⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"40⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2CEA.tmp"C:\Users\Admin\AppData\Local\Temp\2CEA.tmp"41⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2D28.tmp"C:\Users\Admin\AppData\Local\Temp\2D28.tmp"42⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\2D67.tmp"C:\Users\Admin\AppData\Local\Temp\2D67.tmp"43⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\2DA5.tmp"C:\Users\Admin\AppData\Local\Temp\2DA5.tmp"44⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\2DE4.tmp"C:\Users\Admin\AppData\Local\Temp\2DE4.tmp"45⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"46⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2E70.tmp"C:\Users\Admin\AppData\Local\Temp\2E70.tmp"47⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"48⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2EED.tmp"C:\Users\Admin\AppData\Local\Temp\2EED.tmp"49⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"50⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"51⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"52⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"53⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\3025.tmp"C:\Users\Admin\AppData\Local\Temp\3025.tmp"54⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\3063.tmp"C:\Users\Admin\AppData\Local\Temp\3063.tmp"55⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\30A2.tmp"C:\Users\Admin\AppData\Local\Temp\30A2.tmp"56⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\30E0.tmp"C:\Users\Admin\AppData\Local\Temp\30E0.tmp"57⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\311E.tmp"C:\Users\Admin\AppData\Local\Temp\311E.tmp"58⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\315D.tmp"C:\Users\Admin\AppData\Local\Temp\315D.tmp"59⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"60⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\31DA.tmp"C:\Users\Admin\AppData\Local\Temp\31DA.tmp"61⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3218.tmp"C:\Users\Admin\AppData\Local\Temp\3218.tmp"62⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3266.tmp"C:\Users\Admin\AppData\Local\Temp\3266.tmp"63⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"64⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\32E3.tmp"C:\Users\Admin\AppData\Local\Temp\32E3.tmp"65⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3331.tmp"C:\Users\Admin\AppData\Local\Temp\3331.tmp"66⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"67⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"68⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"69⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"70⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"71⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\34C6.tmp"C:\Users\Admin\AppData\Local\Temp\34C6.tmp"72⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"73⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\3543.tmp"C:\Users\Admin\AppData\Local\Temp\3543.tmp"74⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"75⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\35C0.tmp"C:\Users\Admin\AppData\Local\Temp\35C0.tmp"76⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\35FE.tmp"C:\Users\Admin\AppData\Local\Temp\35FE.tmp"77⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\363D.tmp"C:\Users\Admin\AppData\Local\Temp\363D.tmp"78⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\367B.tmp"C:\Users\Admin\AppData\Local\Temp\367B.tmp"79⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\36BA.tmp"C:\Users\Admin\AppData\Local\Temp\36BA.tmp"80⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\36F8.tmp"C:\Users\Admin\AppData\Local\Temp\36F8.tmp"81⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3736.tmp"C:\Users\Admin\AppData\Local\Temp\3736.tmp"82⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3775.tmp"C:\Users\Admin\AppData\Local\Temp\3775.tmp"83⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\37B3.tmp"C:\Users\Admin\AppData\Local\Temp\37B3.tmp"84⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"85⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"86⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"87⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"88⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\38FB.tmp"C:\Users\Admin\AppData\Local\Temp\38FB.tmp"89⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"90⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"91⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\39B6.tmp"C:\Users\Admin\AppData\Local\Temp\39B6.tmp"92⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\39F4.tmp"C:\Users\Admin\AppData\Local\Temp\39F4.tmp"93⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3A33.tmp"C:\Users\Admin\AppData\Local\Temp\3A33.tmp"94⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\3A81.tmp"C:\Users\Admin\AppData\Local\Temp\3A81.tmp"95⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3ABF.tmp"C:\Users\Admin\AppData\Local\Temp\3ABF.tmp"96⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3AFE.tmp"C:\Users\Admin\AppData\Local\Temp\3AFE.tmp"97⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3B3C.tmp"C:\Users\Admin\AppData\Local\Temp\3B3C.tmp"98⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"99⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"100⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"101⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3C36.tmp"C:\Users\Admin\AppData\Local\Temp\3C36.tmp"102⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\3C74.tmp"C:\Users\Admin\AppData\Local\Temp\3C74.tmp"103⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3CB2.tmp"C:\Users\Admin\AppData\Local\Temp\3CB2.tmp"104⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"105⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"106⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"107⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"108⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"109⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\3E38.tmp"C:\Users\Admin\AppData\Local\Temp\3E38.tmp"110⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\3E77.tmp"C:\Users\Admin\AppData\Local\Temp\3E77.tmp"111⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\3EB5.tmp"C:\Users\Admin\AppData\Local\Temp\3EB5.tmp"112⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"113⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\3F32.tmp"C:\Users\Admin\AppData\Local\Temp\3F32.tmp"114⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3F70.tmp"C:\Users\Admin\AppData\Local\Temp\3F70.tmp"115⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\3FAF.tmp"C:\Users\Admin\AppData\Local\Temp\3FAF.tmp"116⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\3FED.tmp"C:\Users\Admin\AppData\Local\Temp\3FED.tmp"117⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\402C.tmp"C:\Users\Admin\AppData\Local\Temp\402C.tmp"118⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\406A.tmp"C:\Users\Admin\AppData\Local\Temp\406A.tmp"119⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\40B8.tmp"C:\Users\Admin\AppData\Local\Temp\40B8.tmp"120⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\40F6.tmp"C:\Users\Admin\AppData\Local\Temp\40F6.tmp"121⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\4135.tmp"C:\Users\Admin\AppData\Local\Temp\4135.tmp"122⤵PID:932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-