Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe
-
Size
486KB
-
MD5
c5a39136605e8a32e2004d78a3917aed
-
SHA1
37a4278c12abca689dd625f3c52d0559b2d1eec3
-
SHA256
393466fa9f02ca3764fb97f867f2f080014f7de549b34ff99b1aabe74f714afb
-
SHA512
6bce607363a74c271be1873f586fef209104a6d34c1eb561bd5316b66b4b89465df6f6efb252b187df45bea950cdf3087003cd0060243e0d34d690389633e27a
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7KdQaQuINGBSd5kxYeKbunVfuqItjwPnBN5sz:/U5rCOTeiDKGa4sSd5yYbbMAIf+NZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2232 EA1.tmp 2248 EEF.tmp 2324 F3D.tmp 2240 F7B.tmp 2584 FBA.tmp 2684 1008.tmp 2588 1046.tmp 2572 1094.tmp 2640 10D2.tmp 2624 1120.tmp 2468 115F.tmp 2740 119D.tmp 3060 11DC.tmp 1388 122A.tmp 2636 1278.tmp 2000 12C6.tmp 1860 1304.tmp 1820 1342.tmp 1452 1381.tmp 2820 13BF.tmp 1960 13FE.tmp 1076 143C.tmp 764 148A.tmp 2260 14C8.tmp 1120 1507.tmp 1692 1545.tmp 2104 1584.tmp 1708 15C2.tmp 2084 1600.tmp 684 163F.tmp 500 168D.tmp 1500 16CB.tmp 588 170A.tmp 2268 1748.tmp 1600 1777.tmp 1404 17B5.tmp 452 17F4.tmp 3012 1832.tmp 2648 1870.tmp 1424 18AF.tmp 1360 18ED.tmp 1256 192C.tmp 332 196A.tmp 2016 19A8.tmp 1992 19D7.tmp 2064 1A16.tmp 2760 1A54.tmp 1596 1A92.tmp 1176 1AD1.tmp 2892 1B0F.tmp 2852 1B4E.tmp 2920 1B8C.tmp 1664 1BCA.tmp 1564 1C09.tmp 1716 1C47.tmp 2980 1C86.tmp 1204 1CC4.tmp 1320 1D02.tmp 1552 1D31.tmp 2300 1D70.tmp 1928 1DAE.tmp 2660 1DEC.tmp 2868 1E2B.tmp 2596 1E69.tmp -
Loads dropped DLL 64 IoCs
pid Process 2980 2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe 2232 EA1.tmp 2248 EEF.tmp 2324 F3D.tmp 2240 F7B.tmp 2584 FBA.tmp 2684 1008.tmp 2588 1046.tmp 2572 1094.tmp 2640 10D2.tmp 2624 1120.tmp 2468 115F.tmp 2740 119D.tmp 3060 11DC.tmp 1388 122A.tmp 2636 1278.tmp 2000 12C6.tmp 1860 1304.tmp 1820 1342.tmp 1452 1381.tmp 2820 13BF.tmp 1960 13FE.tmp 1076 143C.tmp 764 148A.tmp 2260 14C8.tmp 1120 1507.tmp 1692 1545.tmp 2104 1584.tmp 1708 15C2.tmp 2084 1600.tmp 684 163F.tmp 500 168D.tmp 1500 16CB.tmp 588 170A.tmp 2268 1748.tmp 1600 1777.tmp 1404 17B5.tmp 452 17F4.tmp 3012 1832.tmp 2648 1870.tmp 1424 18AF.tmp 1360 18ED.tmp 1256 192C.tmp 332 196A.tmp 2016 19A8.tmp 1992 19D7.tmp 2064 1A16.tmp 2760 1A54.tmp 1596 1A92.tmp 1176 1AD1.tmp 2892 1B0F.tmp 2852 1B4E.tmp 2920 1B8C.tmp 1664 1BCA.tmp 1564 1C09.tmp 1716 1C47.tmp 2980 1C86.tmp 1204 1CC4.tmp 1320 1D02.tmp 1552 1D31.tmp 2300 1D70.tmp 1928 1DAE.tmp 2660 1DEC.tmp 2868 1E2B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2232 2980 2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe 28 PID 2980 wrote to memory of 2232 2980 2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe 28 PID 2980 wrote to memory of 2232 2980 2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe 28 PID 2980 wrote to memory of 2232 2980 2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe 28 PID 2232 wrote to memory of 2248 2232 EA1.tmp 29 PID 2232 wrote to memory of 2248 2232 EA1.tmp 29 PID 2232 wrote to memory of 2248 2232 EA1.tmp 29 PID 2232 wrote to memory of 2248 2232 EA1.tmp 29 PID 2248 wrote to memory of 2324 2248 EEF.tmp 30 PID 2248 wrote to memory of 2324 2248 EEF.tmp 30 PID 2248 wrote to memory of 2324 2248 EEF.tmp 30 PID 2248 wrote to memory of 2324 2248 EEF.tmp 30 PID 2324 wrote to memory of 2240 2324 F3D.tmp 31 PID 2324 wrote to memory of 2240 2324 F3D.tmp 31 PID 2324 wrote to memory of 2240 2324 F3D.tmp 31 PID 2324 wrote to memory of 2240 2324 F3D.tmp 31 PID 2240 wrote to memory of 2584 2240 F7B.tmp 32 PID 2240 wrote to memory of 2584 2240 F7B.tmp 32 PID 2240 wrote to memory of 2584 2240 F7B.tmp 32 PID 2240 wrote to memory of 2584 2240 F7B.tmp 32 PID 2584 wrote to memory of 2684 2584 FBA.tmp 119 PID 2584 wrote to memory of 2684 2584 FBA.tmp 119 PID 2584 wrote to memory of 2684 2584 FBA.tmp 119 PID 2584 wrote to memory of 2684 2584 FBA.tmp 119 PID 2684 wrote to memory of 2588 2684 1008.tmp 33 PID 2684 wrote to memory of 2588 2684 1008.tmp 33 PID 2684 wrote to memory of 2588 2684 1008.tmp 33 PID 2684 wrote to memory of 2588 2684 1008.tmp 33 PID 2588 wrote to memory of 2572 2588 1046.tmp 118 PID 2588 wrote to memory of 2572 2588 1046.tmp 118 PID 2588 wrote to memory of 2572 2588 1046.tmp 118 PID 2588 wrote to memory of 2572 2588 1046.tmp 118 PID 2572 wrote to memory of 2640 2572 1094.tmp 117 PID 2572 wrote to memory of 2640 2572 1094.tmp 117 PID 2572 wrote to memory of 2640 2572 1094.tmp 117 PID 2572 wrote to memory of 2640 2572 1094.tmp 117 PID 2640 wrote to memory of 2624 2640 10D2.tmp 116 PID 2640 wrote to memory of 2624 2640 10D2.tmp 116 PID 2640 wrote to memory of 2624 2640 10D2.tmp 116 PID 2640 wrote to memory of 2624 2640 10D2.tmp 116 PID 2624 wrote to memory of 2468 2624 1120.tmp 115 PID 2624 wrote to memory of 2468 2624 1120.tmp 115 PID 2624 wrote to memory of 2468 2624 1120.tmp 115 PID 2624 wrote to memory of 2468 2624 1120.tmp 115 PID 2468 wrote to memory of 2740 2468 115F.tmp 114 PID 2468 wrote to memory of 2740 2468 115F.tmp 114 PID 2468 wrote to memory of 2740 2468 115F.tmp 114 PID 2468 wrote to memory of 2740 2468 115F.tmp 114 PID 2740 wrote to memory of 3060 2740 119D.tmp 34 PID 2740 wrote to memory of 3060 2740 119D.tmp 34 PID 2740 wrote to memory of 3060 2740 119D.tmp 34 PID 2740 wrote to memory of 3060 2740 119D.tmp 34 PID 3060 wrote to memory of 1388 3060 11DC.tmp 113 PID 3060 wrote to memory of 1388 3060 11DC.tmp 113 PID 3060 wrote to memory of 1388 3060 11DC.tmp 113 PID 3060 wrote to memory of 1388 3060 11DC.tmp 113 PID 1388 wrote to memory of 2636 1388 122A.tmp 112 PID 1388 wrote to memory of 2636 1388 122A.tmp 112 PID 1388 wrote to memory of 2636 1388 122A.tmp 112 PID 1388 wrote to memory of 2636 1388 122A.tmp 112 PID 2636 wrote to memory of 2000 2636 1278.tmp 111 PID 2636 wrote to memory of 2000 2636 1278.tmp 111 PID 2636 wrote to memory of 2000 2636 1278.tmp 111 PID 2636 wrote to memory of 2000 2636 1278.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_c5a39136605e8a32e2004d78a3917aed_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\EEF.tmp"C:\Users\Admin\AppData\Local\Temp\EEF.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\F7B.tmp"C:\Users\Admin\AppData\Local\Temp\F7B.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1D02.tmp"C:\Users\Admin\AppData\Local\Temp\1D02.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1046.tmp"C:\Users\Admin\AppData\Local\Temp\1046.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\1094.tmp"C:\Users\Admin\AppData\Local\Temp\1094.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\11DC.tmp"C:\Users\Admin\AppData\Local\Temp\11DC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\122A.tmp"C:\Users\Admin\AppData\Local\Temp\122A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\148A.tmp"C:\Users\Admin\AppData\Local\Temp\148A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Users\Admin\AppData\Local\Temp\14C8.tmp"C:\Users\Admin\AppData\Local\Temp\14C8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1507.tmp"C:\Users\Admin\AppData\Local\Temp\1507.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120
-
-
-
C:\Users\Admin\AppData\Local\Temp\1545.tmp"C:\Users\Admin\AppData\Local\Temp\1545.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\1584.tmp"C:\Users\Admin\AppData\Local\Temp\1584.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\163F.tmp"C:\Users\Admin\AppData\Local\Temp\163F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Users\Admin\AppData\Local\Temp\168D.tmp"C:\Users\Admin\AppData\Local\Temp\168D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:500 -
C:\Users\Admin\AppData\Local\Temp\16CB.tmp"C:\Users\Admin\AppData\Local\Temp\16CB.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1777.tmp"C:\Users\Admin\AppData\Local\Temp\1777.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\17B5.tmp"C:\Users\Admin\AppData\Local\Temp\17B5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\17F4.tmp"C:\Users\Admin\AppData\Local\Temp\17F4.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:452 -
C:\Users\Admin\AppData\Local\Temp\1832.tmp"C:\Users\Admin\AppData\Local\Temp\1832.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\1870.tmp"C:\Users\Admin\AppData\Local\Temp\1870.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\18AF.tmp"C:\Users\Admin\AppData\Local\Temp\18AF.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\18ED.tmp"C:\Users\Admin\AppData\Local\Temp\18ED.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\196A.tmp"C:\Users\Admin\AppData\Local\Temp\196A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:332 -
C:\Users\Admin\AppData\Local\Temp\19A8.tmp"C:\Users\Admin\AppData\Local\Temp\19A8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\19D7.tmp"C:\Users\Admin\AppData\Local\Temp\19D7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\1A16.tmp"C:\Users\Admin\AppData\Local\Temp\1A16.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1748.tmp"C:\Users\Admin\AppData\Local\Temp\1748.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268
-
C:\Users\Admin\AppData\Local\Temp\1A92.tmp"C:\Users\Admin\AppData\Local\Temp\1A92.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\1B8C.tmp"C:\Users\Admin\AppData\Local\Temp\1B8C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C47.tmp"C:\Users\Admin\AppData\Local\Temp\1C47.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\1C86.tmp"C:\Users\Admin\AppData\Local\Temp\1C86.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\1D70.tmp"C:\Users\Admin\AppData\Local\Temp\1D70.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C09.tmp"C:\Users\Admin\AppData\Local\Temp\1C09.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564
-
C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"1⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"2⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\1F24.tmp"C:\Users\Admin\AppData\Local\Temp\1F24.tmp"1⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\1F63.tmp"C:\Users\Admin\AppData\Local\Temp\1F63.tmp"2⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\1120.tmp"C:\Users\Admin\AppData\Local\Temp\1120.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"1⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\201E.tmp"C:\Users\Admin\AppData\Local\Temp\201E.tmp"2⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\205C.tmp"C:\Users\Admin\AppData\Local\Temp\205C.tmp"3⤵PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp"C:\Users\Admin\AppData\Local\Temp\20D9.tmp"1⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\2118.tmp"C:\Users\Admin\AppData\Local\Temp\2118.tmp"2⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"3⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\12C6.tmp"C:\Users\Admin\AppData\Local\Temp\12C6.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\209B.tmp"C:\Users\Admin\AppData\Local\Temp\209B.tmp"1⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"1⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2211.tmp"C:\Users\Admin\AppData\Local\Temp\2211.tmp"2⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"3⤵PID:1884
-
-
-
C:\Users\Admin\AppData\Local\Temp\2194.tmp"C:\Users\Admin\AppData\Local\Temp\2194.tmp"1⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"1⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"1⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\22BD.tmp"C:\Users\Admin\AppData\Local\Temp\22BD.tmp"2⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp"1⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\233A.tmp"C:\Users\Admin\AppData\Local\Temp\233A.tmp"2⤵PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\2378.tmp"C:\Users\Admin\AppData\Local\Temp\2378.tmp"1⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\23B6.tmp"C:\Users\Admin\AppData\Local\Temp\23B6.tmp"2⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\23F5.tmp"C:\Users\Admin\AppData\Local\Temp\23F5.tmp"3⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2433.tmp"C:\Users\Admin\AppData\Local\Temp\2433.tmp"4⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2472.tmp"C:\Users\Admin\AppData\Local\Temp\2472.tmp"5⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\24B0.tmp"C:\Users\Admin\AppData\Local\Temp\24B0.tmp"6⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\24EE.tmp"C:\Users\Admin\AppData\Local\Temp\24EE.tmp"7⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\252D.tmp"C:\Users\Admin\AppData\Local\Temp\252D.tmp"8⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"9⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"10⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\2646.tmp"C:\Users\Admin\AppData\Local\Temp\2646.tmp"11⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"12⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\26F1.tmp"C:\Users\Admin\AppData\Local\Temp\26F1.tmp"13⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\273F.tmp"C:\Users\Admin\AppData\Local\Temp\273F.tmp"14⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\279D.tmp"C:\Users\Admin\AppData\Local\Temp\279D.tmp"15⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"16⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp"17⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"18⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"19⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"20⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"21⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\29FD.tmp"C:\Users\Admin\AppData\Local\Temp\29FD.tmp"22⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"23⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"24⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"25⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"26⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"27⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"28⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"29⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"30⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"31⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"32⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"33⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"34⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2D38.tmp"C:\Users\Admin\AppData\Local\Temp\2D38.tmp"35⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2D76.tmp"C:\Users\Admin\AppData\Local\Temp\2D76.tmp"36⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"37⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"38⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"39⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2E70.tmp"C:\Users\Admin\AppData\Local\Temp\2E70.tmp"40⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"41⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2EED.tmp"C:\Users\Admin\AppData\Local\Temp\2EED.tmp"42⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"43⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"44⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"45⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"46⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\3025.tmp"C:\Users\Admin\AppData\Local\Temp\3025.tmp"47⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\3063.tmp"C:\Users\Admin\AppData\Local\Temp\3063.tmp"48⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\30A2.tmp"C:\Users\Admin\AppData\Local\Temp\30A2.tmp"49⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\30E0.tmp"C:\Users\Admin\AppData\Local\Temp\30E0.tmp"50⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\311E.tmp"C:\Users\Admin\AppData\Local\Temp\311E.tmp"51⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\315D.tmp"C:\Users\Admin\AppData\Local\Temp\315D.tmp"52⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"53⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\31DA.tmp"C:\Users\Admin\AppData\Local\Temp\31DA.tmp"54⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\3218.tmp"C:\Users\Admin\AppData\Local\Temp\3218.tmp"55⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\3256.tmp"C:\Users\Admin\AppData\Local\Temp\3256.tmp"56⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\3295.tmp"C:\Users\Admin\AppData\Local\Temp\3295.tmp"57⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"58⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3312.tmp"C:\Users\Admin\AppData\Local\Temp\3312.tmp"59⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"60⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"61⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"62⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"63⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"64⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"65⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"66⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"67⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\3562.tmp"C:\Users\Admin\AppData\Local\Temp\3562.tmp"68⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"69⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\35DF.tmp"C:\Users\Admin\AppData\Local\Temp\35DF.tmp"70⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"71⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\365C.tmp"C:\Users\Admin\AppData\Local\Temp\365C.tmp"72⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\369A.tmp"C:\Users\Admin\AppData\Local\Temp\369A.tmp"73⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\36D9.tmp"C:\Users\Admin\AppData\Local\Temp\36D9.tmp"74⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3717.tmp"C:\Users\Admin\AppData\Local\Temp\3717.tmp"75⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\3756.tmp"C:\Users\Admin\AppData\Local\Temp\3756.tmp"76⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\3794.tmp"C:\Users\Admin\AppData\Local\Temp\3794.tmp"77⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\37D2.tmp"C:\Users\Admin\AppData\Local\Temp\37D2.tmp"78⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\3811.tmp"C:\Users\Admin\AppData\Local\Temp\3811.tmp"79⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\384F.tmp"C:\Users\Admin\AppData\Local\Temp\384F.tmp"80⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\388E.tmp"C:\Users\Admin\AppData\Local\Temp\388E.tmp"81⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\38DC.tmp"C:\Users\Admin\AppData\Local\Temp\38DC.tmp"82⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"83⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3958.tmp"C:\Users\Admin\AppData\Local\Temp\3958.tmp"84⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\3997.tmp"C:\Users\Admin\AppData\Local\Temp\3997.tmp"85⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"86⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3A14.tmp"C:\Users\Admin\AppData\Local\Temp\3A14.tmp"87⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\3A52.tmp"C:\Users\Admin\AppData\Local\Temp\3A52.tmp"88⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\3AA0.tmp"C:\Users\Admin\AppData\Local\Temp\3AA0.tmp"89⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"90⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"91⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"92⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"93⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"94⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\3C16.tmp"C:\Users\Admin\AppData\Local\Temp\3C16.tmp"95⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\3C55.tmp"C:\Users\Admin\AppData\Local\Temp\3C55.tmp"96⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3C93.tmp"C:\Users\Admin\AppData\Local\Temp\3C93.tmp"97⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"98⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3D20.tmp"C:\Users\Admin\AppData\Local\Temp\3D20.tmp"99⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\3D5E.tmp"C:\Users\Admin\AppData\Local\Temp\3D5E.tmp"100⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"101⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"102⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3E19.tmp"C:\Users\Admin\AppData\Local\Temp\3E19.tmp"103⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\3E58.tmp"C:\Users\Admin\AppData\Local\Temp\3E58.tmp"104⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\3E96.tmp"C:\Users\Admin\AppData\Local\Temp\3E96.tmp"105⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\3ED4.tmp"C:\Users\Admin\AppData\Local\Temp\3ED4.tmp"106⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\3F13.tmp"C:\Users\Admin\AppData\Local\Temp\3F13.tmp"107⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3F51.tmp"C:\Users\Admin\AppData\Local\Temp\3F51.tmp"108⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\3F90.tmp"C:\Users\Admin\AppData\Local\Temp\3F90.tmp"109⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3FCE.tmp"C:\Users\Admin\AppData\Local\Temp\3FCE.tmp"110⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\400C.tmp"C:\Users\Admin\AppData\Local\Temp\400C.tmp"111⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\404B.tmp"C:\Users\Admin\AppData\Local\Temp\404B.tmp"112⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\4089.tmp"C:\Users\Admin\AppData\Local\Temp\4089.tmp"113⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\40C8.tmp"C:\Users\Admin\AppData\Local\Temp\40C8.tmp"114⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\4106.tmp"C:\Users\Admin\AppData\Local\Temp\4106.tmp"115⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\4144.tmp"C:\Users\Admin\AppData\Local\Temp\4144.tmp"116⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\4183.tmp"C:\Users\Admin\AppData\Local\Temp\4183.tmp"117⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\41C1.tmp"C:\Users\Admin\AppData\Local\Temp\41C1.tmp"118⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\4200.tmp"C:\Users\Admin\AppData\Local\Temp\4200.tmp"119⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\423E.tmp"C:\Users\Admin\AppData\Local\Temp\423E.tmp"120⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\427C.tmp"C:\Users\Admin\AppData\Local\Temp\427C.tmp"121⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\42BB.tmp"C:\Users\Admin\AppData\Local\Temp\42BB.tmp"122⤵PID:1828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-