Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 18:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-28_d2c2b22c497e6fd9bb4f3558e8f1b254_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-28_d2c2b22c497e6fd9bb4f3558e8f1b254_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-01-28_d2c2b22c497e6fd9bb4f3558e8f1b254_mafia.exe
-
Size
486KB
-
MD5
d2c2b22c497e6fd9bb4f3558e8f1b254
-
SHA1
317b9143a621e58c04325ed8efce7e57859435e1
-
SHA256
e858fce2031bfd7b05175c08d237516d64e62ebb66e2e178dad4d95bf7a02d73
-
SHA512
debdd772078f5258caef12c589935638c761b51ccac92212087b46718ace28365efc107253e726e148e056e4165d46c366b90c6e28d7b9c58109be2dae0e8519
-
SSDEEP
12288:5U5rCOTeiDlVSMsfVyh1lZxNbPEvNWNZ:5UQOJD3Sybx4WN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3044 25AA.tmp 3040 86A.tmp 2292 8A8.tmp 3064 8E6.tmp 2680 925.tmp 2620 973.tmp 2864 9C1.tmp 2764 A0F.tmp 2604 A4D.tmp 2640 A9B.tmp 2524 AF9.tmp 2960 B37.tmp 1496 B76.tmp 2780 BC4.tmp 2280 C02.tmp 1900 C50.tmp 2832 C9E.tmp 2788 CEC.tmp 2840 D3A.tmp 2940 D88.tmp 1656 DC6.tmp 1680 E14.tmp 632 E53.tmp 2060 2CEA.tmp 1440 ED0.tmp 1684 3D5E.tmp 2836 2DE4.tmp 2396 F8B.tmp 2260 FC9.tmp 792 1008.tmp 1156 1EE6.tmp 1092 1F15.tmp 1112 2F6A.tmp 1868 1111.tmp 2056 114F.tmp 656 3054.tmp 240 3092.tmp 296 20CA.tmp 2176 1249.tmp 2144 1287.tmp 1812 12B6.tmp 984 12E5.tmp 1932 1323.tmp 2320 41D1.tmp 1856 13A0.tmp 964 13DE.tmp 2880 141D.tmp 2220 145B.tmp 552 149A.tmp 1544 2404.tmp 2388 1516.tmp 1492 1555.tmp 1736 1593.tmp 1996 15C2.tmp 1584 3534.tmp 1692 162F.tmp 2028 166E.tmp 2560 16AC.tmp 1616 16EA.tmp 2340 1729.tmp 3036 1767.tmp 2696 17A6.tmp 2740 17E4.tmp 2816 1822.tmp -
Loads dropped DLL 64 IoCs
pid Process 2028 166E.tmp 3044 25AA.tmp 3040 86A.tmp 2292 8A8.tmp 3064 8E6.tmp 2680 925.tmp 2620 973.tmp 2864 9C1.tmp 2764 A0F.tmp 2604 A4D.tmp 2640 A9B.tmp 2524 AF9.tmp 2960 B37.tmp 1496 B76.tmp 2780 BC4.tmp 2280 C02.tmp 1900 C50.tmp 2832 C9E.tmp 2788 CEC.tmp 2840 D3A.tmp 2940 D88.tmp 1656 DC6.tmp 1680 E14.tmp 632 E53.tmp 2060 2CEA.tmp 1440 ED0.tmp 1684 3D5E.tmp 2836 2DE4.tmp 2396 F8B.tmp 2260 FC9.tmp 792 1008.tmp 1156 1EE6.tmp 1092 1F15.tmp 1112 2F6A.tmp 1868 1111.tmp 2056 114F.tmp 656 3054.tmp 240 3092.tmp 296 20CA.tmp 2176 1249.tmp 2144 1287.tmp 1812 12B6.tmp 984 12E5.tmp 1932 1323.tmp 2320 41D1.tmp 1856 13A0.tmp 964 13DE.tmp 2880 141D.tmp 2220 145B.tmp 552 149A.tmp 1544 2404.tmp 2388 1516.tmp 1492 1555.tmp 1736 1593.tmp 1996 15C2.tmp 1584 3534.tmp 1692 162F.tmp 2028 166E.tmp 2560 16AC.tmp 1616 16EA.tmp 2340 1729.tmp 3036 1767.tmp 2696 17A6.tmp 2740 17E4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3044 2028 166E.tmp 67 PID 2028 wrote to memory of 3044 2028 166E.tmp 67 PID 2028 wrote to memory of 3044 2028 166E.tmp 67 PID 2028 wrote to memory of 3044 2028 166E.tmp 67 PID 3044 wrote to memory of 3040 3044 25AA.tmp 296 PID 3044 wrote to memory of 3040 3044 25AA.tmp 296 PID 3044 wrote to memory of 3040 3044 25AA.tmp 296 PID 3044 wrote to memory of 3040 3044 25AA.tmp 296 PID 3040 wrote to memory of 2292 3040 86A.tmp 29 PID 3040 wrote to memory of 2292 3040 86A.tmp 29 PID 3040 wrote to memory of 2292 3040 86A.tmp 29 PID 3040 wrote to memory of 2292 3040 86A.tmp 29 PID 2292 wrote to memory of 3064 2292 8A8.tmp 295 PID 2292 wrote to memory of 3064 2292 8A8.tmp 295 PID 2292 wrote to memory of 3064 2292 8A8.tmp 295 PID 2292 wrote to memory of 3064 2292 8A8.tmp 295 PID 3064 wrote to memory of 2680 3064 8E6.tmp 294 PID 3064 wrote to memory of 2680 3064 8E6.tmp 294 PID 3064 wrote to memory of 2680 3064 8E6.tmp 294 PID 3064 wrote to memory of 2680 3064 8E6.tmp 294 PID 2680 wrote to memory of 2620 2680 925.tmp 293 PID 2680 wrote to memory of 2620 2680 925.tmp 293 PID 2680 wrote to memory of 2620 2680 925.tmp 293 PID 2680 wrote to memory of 2620 2680 925.tmp 293 PID 2620 wrote to memory of 2864 2620 973.tmp 292 PID 2620 wrote to memory of 2864 2620 973.tmp 292 PID 2620 wrote to memory of 2864 2620 973.tmp 292 PID 2620 wrote to memory of 2864 2620 973.tmp 292 PID 2864 wrote to memory of 2764 2864 9C1.tmp 291 PID 2864 wrote to memory of 2764 2864 9C1.tmp 291 PID 2864 wrote to memory of 2764 2864 9C1.tmp 291 PID 2864 wrote to memory of 2764 2864 9C1.tmp 291 PID 2764 wrote to memory of 2604 2764 A0F.tmp 290 PID 2764 wrote to memory of 2604 2764 A0F.tmp 290 PID 2764 wrote to memory of 2604 2764 A0F.tmp 290 PID 2764 wrote to memory of 2604 2764 A0F.tmp 290 PID 2604 wrote to memory of 2640 2604 A4D.tmp 289 PID 2604 wrote to memory of 2640 2604 A4D.tmp 289 PID 2604 wrote to memory of 2640 2604 A4D.tmp 289 PID 2604 wrote to memory of 2640 2604 A4D.tmp 289 PID 2640 wrote to memory of 2524 2640 A9B.tmp 288 PID 2640 wrote to memory of 2524 2640 A9B.tmp 288 PID 2640 wrote to memory of 2524 2640 A9B.tmp 288 PID 2640 wrote to memory of 2524 2640 A9B.tmp 288 PID 2524 wrote to memory of 2960 2524 AF9.tmp 286 PID 2524 wrote to memory of 2960 2524 AF9.tmp 286 PID 2524 wrote to memory of 2960 2524 AF9.tmp 286 PID 2524 wrote to memory of 2960 2524 AF9.tmp 286 PID 2960 wrote to memory of 1496 2960 B37.tmp 285 PID 2960 wrote to memory of 1496 2960 B37.tmp 285 PID 2960 wrote to memory of 1496 2960 B37.tmp 285 PID 2960 wrote to memory of 1496 2960 B37.tmp 285 PID 1496 wrote to memory of 2780 1496 B76.tmp 284 PID 1496 wrote to memory of 2780 1496 B76.tmp 284 PID 1496 wrote to memory of 2780 1496 B76.tmp 284 PID 1496 wrote to memory of 2780 1496 B76.tmp 284 PID 2780 wrote to memory of 2280 2780 BC4.tmp 283 PID 2780 wrote to memory of 2280 2780 BC4.tmp 283 PID 2780 wrote to memory of 2280 2780 BC4.tmp 283 PID 2780 wrote to memory of 2280 2780 BC4.tmp 283 PID 2280 wrote to memory of 1900 2280 C02.tmp 282 PID 2280 wrote to memory of 1900 2280 C02.tmp 282 PID 2280 wrote to memory of 1900 2280 C02.tmp 282 PID 2280 wrote to memory of 1900 2280 C02.tmp 282
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_d2c2b22c497e6fd9bb4f3558e8f1b254_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_d2c2b22c497e6fd9bb4f3558e8f1b254_mafia.exe"1⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\80C.tmp"C:\Users\Admin\AppData\Local\Temp\80C.tmp"2⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\8A8.tmp"C:\Users\Admin\AppData\Local\Temp\8A8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\8E6.tmp"C:\Users\Admin\AppData\Local\Temp\8E6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"1⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"1⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\F4C.tmp"C:\Users\Admin\AppData\Local\Temp\F4C.tmp"2⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\1046.tmp"C:\Users\Admin\AppData\Local\Temp\1046.tmp"1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\1084.tmp"C:\Users\Admin\AppData\Local\Temp\1084.tmp"2⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\1F53.tmp"C:\Users\Admin\AppData\Local\Temp\1F53.tmp"3⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\1F92.tmp"C:\Users\Admin\AppData\Local\Temp\1F92.tmp"4⤵PID:784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1F15.tmp"C:\Users\Admin\AppData\Local\Temp\1F15.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\10C3.tmp"C:\Users\Admin\AppData\Local\Temp\10C3.tmp"1⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\118E.tmp"C:\Users\Admin\AppData\Local\Temp\118E.tmp"1⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\11CC.tmp"C:\Users\Admin\AppData\Local\Temp\11CC.tmp"2⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\120A.tmp"C:\Users\Admin\AppData\Local\Temp\120A.tmp"3⤵PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\30D0.tmp"C:\Users\Admin\AppData\Local\Temp\30D0.tmp"3⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\310F.tmp"C:\Users\Admin\AppData\Local\Temp\310F.tmp"4⤵PID:2164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\1362.tmp"C:\Users\Admin\AppData\Local\Temp\1362.tmp"1⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"1⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2443.tmp"C:\Users\Admin\AppData\Local\Temp\2443.tmp"2⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"2⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"3⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\34C6.tmp"C:\Users\Admin\AppData\Local\Temp\34C6.tmp"4⤵PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"3⤵PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
-
-
C:\Users\Admin\AppData\Local\Temp\15F1.tmp"C:\Users\Admin\AppData\Local\Temp\15F1.tmp"1⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\166E.tmp"C:\Users\Admin\AppData\Local\Temp\166E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\16AC.tmp"C:\Users\Admin\AppData\Local\Temp\16AC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\1729.tmp"C:\Users\Admin\AppData\Local\Temp\1729.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\1767.tmp"C:\Users\Admin\AppData\Local\Temp\1767.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\17A6.tmp"C:\Users\Admin\AppData\Local\Temp\17A6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\17E4.tmp"C:\Users\Admin\AppData\Local\Temp\17E4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\1861.tmp"C:\Users\Admin\AppData\Local\Temp\1861.tmp"1⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\189F.tmp"C:\Users\Admin\AppData\Local\Temp\189F.tmp"2⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\190C.tmp"C:\Users\Admin\AppData\Local\Temp\190C.tmp"1⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\1989.tmp"C:\Users\Admin\AppData\Local\Temp\1989.tmp"1⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\19C8.tmp"C:\Users\Admin\AppData\Local\Temp\19C8.tmp"2⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\1A06.tmp"C:\Users\Admin\AppData\Local\Temp\1A06.tmp"3⤵PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"1⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"2⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"3⤵PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1B3E.tmp"C:\Users\Admin\AppData\Local\Temp\1B3E.tmp"1⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\1B7C.tmp"C:\Users\Admin\AppData\Local\Temp\1B7C.tmp"2⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"1⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\1C18.tmp"C:\Users\Admin\AppData\Local\Temp\1C18.tmp"2⤵PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\1C57.tmp"C:\Users\Admin\AppData\Local\Temp\1C57.tmp"1⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\1C95.tmp"C:\Users\Admin\AppData\Local\Temp\1C95.tmp"2⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\1D41.tmp"C:\Users\Admin\AppData\Local\Temp\1D41.tmp"1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"2⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\1E69.tmp"C:\Users\Admin\AppData\Local\Temp\1E69.tmp"1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"2⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\1FD0.tmp"C:\Users\Admin\AppData\Local\Temp\1FD0.tmp"1⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\200E.tmp"C:\Users\Admin\AppData\Local\Temp\200E.tmp"2⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\208B.tmp"C:\Users\Admin\AppData\Local\Temp\208B.tmp"1⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\20CA.tmp"C:\Users\Admin\AppData\Local\Temp\20CA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:296 -
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"3⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\1287.tmp"C:\Users\Admin\AppData\Local\Temp\1287.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\1249.tmp"C:\Users\Admin\AppData\Local\Temp\1249.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"1⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"2⤵PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"1⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"2⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp"1⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"2⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"3⤵PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"1⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\23C6.tmp"C:\Users\Admin\AppData\Local\Temp\23C6.tmp"2⤵PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\24C0.tmp"C:\Users\Admin\AppData\Local\Temp\24C0.tmp"1⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\24FE.tmp"C:\Users\Admin\AppData\Local\Temp\24FE.tmp"2⤵PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\15C2.tmp"C:\Users\Admin\AppData\Local\Temp\15C2.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\25AA.tmp"C:\Users\Admin\AppData\Local\Temp\25AA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"2⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\86A.tmp"C:\Users\Admin\AppData\Local\Temp\86A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\2626.tmp"C:\Users\Admin\AppData\Local\Temp\2626.tmp"1⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"2⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"3⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"2⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"1⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"1⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\4856.tmp"C:\Users\Admin\AppData\Local\Temp\4856.tmp"2⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\4894.tmp"C:\Users\Admin\AppData\Local\Temp\4894.tmp"3⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\194B.tmp"C:\Users\Admin\AppData\Local\Temp\194B.tmp"4⤵PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"4⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\4902.tmp"C:\Users\Admin\AppData\Local\Temp\4902.tmp"5⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\4950.tmp"C:\Users\Admin\AppData\Local\Temp\4950.tmp"6⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\49AD.tmp"C:\Users\Admin\AppData\Local\Temp\49AD.tmp"7⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\4A0B.tmp"C:\Users\Admin\AppData\Local\Temp\4A0B.tmp"8⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\4A59.tmp"C:\Users\Admin\AppData\Local\Temp\4A59.tmp"9⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"10⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"11⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"12⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"13⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"14⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"15⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp"16⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\4DE2.tmp"C:\Users\Admin\AppData\Local\Temp\4DE2.tmp"17⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"18⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"19⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\4EFA.tmp"C:\Users\Admin\AppData\Local\Temp\4EFA.tmp"20⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\4F48.tmp"C:\Users\Admin\AppData\Local\Temp\4F48.tmp"21⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"22⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\5013.tmp"C:\Users\Admin\AppData\Local\Temp\5013.tmp"23⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"24⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\50EE.tmp"C:\Users\Admin\AppData\Local\Temp\50EE.tmp"25⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\514B.tmp"C:\Users\Admin\AppData\Local\Temp\514B.tmp"26⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\5199.tmp"C:\Users\Admin\AppData\Local\Temp\5199.tmp"27⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\5206.tmp"C:\Users\Admin\AppData\Local\Temp\5206.tmp"28⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\52D1.tmp"C:\Users\Admin\AppData\Local\Temp\52D1.tmp"29⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\533E.tmp"C:\Users\Admin\AppData\Local\Temp\533E.tmp"30⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\538C.tmp"C:\Users\Admin\AppData\Local\Temp\538C.tmp"31⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\5409.tmp"C:\Users\Admin\AppData\Local\Temp\5409.tmp"32⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\5476.tmp"C:\Users\Admin\AppData\Local\Temp\5476.tmp"33⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\54C4.tmp"C:\Users\Admin\AppData\Local\Temp\54C4.tmp"34⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\5512.tmp"C:\Users\Admin\AppData\Local\Temp\5512.tmp"35⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\5570.tmp"C:\Users\Admin\AppData\Local\Temp\5570.tmp"36⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\55AE.tmp"C:\Users\Admin\AppData\Local\Temp\55AE.tmp"37⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\560C.tmp"C:\Users\Admin\AppData\Local\Temp\560C.tmp"38⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\5689.tmp"C:\Users\Admin\AppData\Local\Temp\5689.tmp"39⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\56C7.tmp"C:\Users\Admin\AppData\Local\Temp\56C7.tmp"40⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\5706.tmp"C:\Users\Admin\AppData\Local\Temp\5706.tmp"41⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\5744.tmp"C:\Users\Admin\AppData\Local\Temp\5744.tmp"42⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\5782.tmp"C:\Users\Admin\AppData\Local\Temp\5782.tmp"43⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\57C1.tmp"C:\Users\Admin\AppData\Local\Temp\57C1.tmp"44⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\57FF.tmp"C:\Users\Admin\AppData\Local\Temp\57FF.tmp"45⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\583E.tmp"C:\Users\Admin\AppData\Local\Temp\583E.tmp"46⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\587C.tmp"C:\Users\Admin\AppData\Local\Temp\587C.tmp"47⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"48⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\58F9.tmp"C:\Users\Admin\AppData\Local\Temp\58F9.tmp"49⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"50⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\5976.tmp"C:\Users\Admin\AppData\Local\Temp\5976.tmp"51⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\59A4.tmp"C:\Users\Admin\AppData\Local\Temp\59A4.tmp"52⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"53⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\5A50.tmp"C:\Users\Admin\AppData\Local\Temp\5A50.tmp"54⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"55⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"56⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\5B2A.tmp"C:\Users\Admin\AppData\Local\Temp\5B2A.tmp"57⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\5B98.tmp"C:\Users\Admin\AppData\Local\Temp\5B98.tmp"58⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\5C34.tmp"C:\Users\Admin\AppData\Local\Temp\5C34.tmp"59⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\5C72.tmp"C:\Users\Admin\AppData\Local\Temp\5C72.tmp"60⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\5CB0.tmp"C:\Users\Admin\AppData\Local\Temp\5CB0.tmp"61⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\5CEF.tmp"C:\Users\Admin\AppData\Local\Temp\5CEF.tmp"62⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\5D2D.tmp"C:\Users\Admin\AppData\Local\Temp\5D2D.tmp"63⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\5D6C.tmp"C:\Users\Admin\AppData\Local\Temp\5D6C.tmp"64⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\5DAA.tmp"C:\Users\Admin\AppData\Local\Temp\5DAA.tmp"65⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\5DE8.tmp"C:\Users\Admin\AppData\Local\Temp\5DE8.tmp"66⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\5E27.tmp"C:\Users\Admin\AppData\Local\Temp\5E27.tmp"67⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\5E65.tmp"C:\Users\Admin\AppData\Local\Temp\5E65.tmp"68⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\5EA4.tmp"C:\Users\Admin\AppData\Local\Temp\5EA4.tmp"69⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\5EE2.tmp"C:\Users\Admin\AppData\Local\Temp\5EE2.tmp"70⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\5F20.tmp"C:\Users\Admin\AppData\Local\Temp\5F20.tmp"71⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\5F5F.tmp"C:\Users\Admin\AppData\Local\Temp\5F5F.tmp"72⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\5F9D.tmp"C:\Users\Admin\AppData\Local\Temp\5F9D.tmp"73⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\5FDC.tmp"C:\Users\Admin\AppData\Local\Temp\5FDC.tmp"74⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\601A.tmp"C:\Users\Admin\AppData\Local\Temp\601A.tmp"75⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\6068.tmp"C:\Users\Admin\AppData\Local\Temp\6068.tmp"76⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\60B6.tmp"C:\Users\Admin\AppData\Local\Temp\60B6.tmp"77⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\60F4.tmp"C:\Users\Admin\AppData\Local\Temp\60F4.tmp"78⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\6133.tmp"C:\Users\Admin\AppData\Local\Temp\6133.tmp"79⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\6171.tmp"C:\Users\Admin\AppData\Local\Temp\6171.tmp"80⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\61B0.tmp"C:\Users\Admin\AppData\Local\Temp\61B0.tmp"81⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\61FE.tmp"C:\Users\Admin\AppData\Local\Temp\61FE.tmp"82⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\623C.tmp"C:\Users\Admin\AppData\Local\Temp\623C.tmp"83⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\627A.tmp"C:\Users\Admin\AppData\Local\Temp\627A.tmp"84⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\62C8.tmp"C:\Users\Admin\AppData\Local\Temp\62C8.tmp"85⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\6307.tmp"C:\Users\Admin\AppData\Local\Temp\6307.tmp"86⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\6345.tmp"C:\Users\Admin\AppData\Local\Temp\6345.tmp"87⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\6384.tmp"C:\Users\Admin\AppData\Local\Temp\6384.tmp"88⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\63D2.tmp"C:\Users\Admin\AppData\Local\Temp\63D2.tmp"89⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\6410.tmp"C:\Users\Admin\AppData\Local\Temp\6410.tmp"90⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\644F.tmp"C:\Users\Admin\AppData\Local\Temp\644F.tmp"91⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\648D.tmp"C:\Users\Admin\AppData\Local\Temp\648D.tmp"92⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\64DB.tmp"C:\Users\Admin\AppData\Local\Temp\64DB.tmp"93⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\6519.tmp"C:\Users\Admin\AppData\Local\Temp\6519.tmp"94⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\6558.tmp"C:\Users\Admin\AppData\Local\Temp\6558.tmp"95⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\6596.tmp"C:\Users\Admin\AppData\Local\Temp\6596.tmp"96⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\65D5.tmp"C:\Users\Admin\AppData\Local\Temp\65D5.tmp"97⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\6613.tmp"C:\Users\Admin\AppData\Local\Temp\6613.tmp"98⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\6651.tmp"C:\Users\Admin\AppData\Local\Temp\6651.tmp"99⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\6690.tmp"C:\Users\Admin\AppData\Local\Temp\6690.tmp"100⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\66DE.tmp"C:\Users\Admin\AppData\Local\Temp\66DE.tmp"101⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\672C.tmp"C:\Users\Admin\AppData\Local\Temp\672C.tmp"102⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\677A.tmp"C:\Users\Admin\AppData\Local\Temp\677A.tmp"103⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\67B8.tmp"C:\Users\Admin\AppData\Local\Temp\67B8.tmp"104⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\67F7.tmp"C:\Users\Admin\AppData\Local\Temp\67F7.tmp"105⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\6835.tmp"C:\Users\Admin\AppData\Local\Temp\6835.tmp"106⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\6873.tmp"C:\Users\Admin\AppData\Local\Temp\6873.tmp"107⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\68B2.tmp"C:\Users\Admin\AppData\Local\Temp\68B2.tmp"108⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\68F0.tmp"C:\Users\Admin\AppData\Local\Temp\68F0.tmp"109⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\692F.tmp"C:\Users\Admin\AppData\Local\Temp\692F.tmp"110⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\697D.tmp"C:\Users\Admin\AppData\Local\Temp\697D.tmp"111⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\69BB.tmp"C:\Users\Admin\AppData\Local\Temp\69BB.tmp"112⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\6A19.tmp"C:\Users\Admin\AppData\Local\Temp\6A19.tmp"113⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\6A57.tmp"C:\Users\Admin\AppData\Local\Temp\6A57.tmp"114⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\6A95.tmp"C:\Users\Admin\AppData\Local\Temp\6A95.tmp"115⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\6AE3.tmp"C:\Users\Admin\AppData\Local\Temp\6AE3.tmp"116⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\6B22.tmp"C:\Users\Admin\AppData\Local\Temp\6B22.tmp"117⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\6B70.tmp"C:\Users\Admin\AppData\Local\Temp\6B70.tmp"118⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\6BAE.tmp"C:\Users\Admin\AppData\Local\Temp\6BAE.tmp"119⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\6BED.tmp"C:\Users\Admin\AppData\Local\Temp\6BED.tmp"120⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\6C2B.tmp"C:\Users\Admin\AppData\Local\Temp\6C2B.tmp"121⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\6C79.tmp"C:\Users\Admin\AppData\Local\Temp\6C79.tmp"122⤵PID:1644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-