Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe
-
Size
486KB
-
MD5
32e9c7e43a506f82a52645876e80d51f
-
SHA1
018337edf641a60a47a5f1a16f36a5c69d3abb05
-
SHA256
3204642496d12390daa48f5c42abe94debe30a866c754d8204fca60e0b606172
-
SHA512
5cbe3b68e65888bc9d45d207663cea4f86ddfabde492544d9cca9c980283f2497f140d734be85788f9d80664e44bfd70ca503c5da9afb8e0eab4cfbc38d66c12
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7IpE32dtitLv8Qs0RKfdfAq8XfGV8LiglyT61:/U5rCOTeiDl3gXsKfUOVP4ZJUG9NZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3932 4779.tmp 2524 47D6.tmp 2964 4834.tmp 3544 4882.tmp 2540 48D0.tmp 3572 495D.tmp 2400 49AB.tmp 3156 49F9.tmp 2684 4A38.tmp 4704 4A86.tmp 2612 4AD4.tmp 3340 4B32.tmp 3192 4B80.tmp 1948 4BCE.tmp 3040 4C1C.tmp 1520 4C6A.tmp 4500 4CC8.tmp 4508 4D16.tmp 4124 4D64.tmp 4612 4DB2.tmp 2396 4E01.tmp 4132 4E4F.tmp 2740 4E9D.tmp 3132 4EEB.tmp 116 4F39.tmp 2920 4F87.tmp 4784 4FD5.tmp 2108 5023.tmp 1064 5E7B.tmp 4168 50DF.tmp 2940 512D.tmp 4256 517B.tmp 2764 51C9.tmp 2496 5217.tmp 1196 5266.tmp 3248 52B4.tmp 924 52F2.tmp 556 5340.tmp 1972 539E.tmp 4824 53EC.tmp 2524 47D6.tmp 3720 54D7.tmp 1212 5525.tmp 2504 5563.tmp 4248 55B1.tmp 3188 55FF.tmp 2780 563E.tmp 1756 568C.tmp 2544 56DA.tmp 3552 5728.tmp 2712 5776.tmp 4136 57C5.tmp 5000 5813.tmp 3920 5851.tmp 4004 589F.tmp 3620 58ED.tmp 2980 592C.tmp 5036 596A.tmp 4500 4CC8.tmp 4508 4D16.tmp 5108 5A55.tmp 4524 5A93.tmp 3472 5AD2.tmp 4340 5B10.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 3932 3184 2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe 97 PID 3184 wrote to memory of 3932 3184 2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe 97 PID 3184 wrote to memory of 3932 3184 2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe 97 PID 3932 wrote to memory of 2524 3932 4779.tmp 96 PID 3932 wrote to memory of 2524 3932 4779.tmp 96 PID 3932 wrote to memory of 2524 3932 4779.tmp 96 PID 2524 wrote to memory of 2964 2524 47D6.tmp 95 PID 2524 wrote to memory of 2964 2524 47D6.tmp 95 PID 2524 wrote to memory of 2964 2524 47D6.tmp 95 PID 2964 wrote to memory of 3544 2964 4834.tmp 94 PID 2964 wrote to memory of 3544 2964 4834.tmp 94 PID 2964 wrote to memory of 3544 2964 4834.tmp 94 PID 3544 wrote to memory of 2540 3544 4882.tmp 21 PID 3544 wrote to memory of 2540 3544 4882.tmp 21 PID 3544 wrote to memory of 2540 3544 4882.tmp 21 PID 2540 wrote to memory of 3572 2540 48D0.tmp 93 PID 2540 wrote to memory of 3572 2540 48D0.tmp 93 PID 2540 wrote to memory of 3572 2540 48D0.tmp 93 PID 3572 wrote to memory of 2400 3572 495D.tmp 92 PID 3572 wrote to memory of 2400 3572 495D.tmp 92 PID 3572 wrote to memory of 2400 3572 495D.tmp 92 PID 2400 wrote to memory of 3156 2400 49AB.tmp 22 PID 2400 wrote to memory of 3156 2400 49AB.tmp 22 PID 2400 wrote to memory of 3156 2400 49AB.tmp 22 PID 3156 wrote to memory of 2684 3156 49F9.tmp 23 PID 3156 wrote to memory of 2684 3156 49F9.tmp 23 PID 3156 wrote to memory of 2684 3156 49F9.tmp 23 PID 2684 wrote to memory of 4704 2684 4A38.tmp 91 PID 2684 wrote to memory of 4704 2684 4A38.tmp 91 PID 2684 wrote to memory of 4704 2684 4A38.tmp 91 PID 4704 wrote to memory of 2612 4704 4A86.tmp 90 PID 4704 wrote to memory of 2612 4704 4A86.tmp 90 PID 4704 wrote to memory of 2612 4704 4A86.tmp 90 PID 2612 wrote to memory of 3340 2612 4AD4.tmp 24 PID 2612 wrote to memory of 3340 2612 4AD4.tmp 24 PID 2612 wrote to memory of 3340 2612 4AD4.tmp 24 PID 3340 wrote to memory of 3192 3340 4B32.tmp 89 PID 3340 wrote to memory of 3192 3340 4B32.tmp 89 PID 3340 wrote to memory of 3192 3340 4B32.tmp 89 PID 3192 wrote to memory of 1948 3192 4B80.tmp 88 PID 3192 wrote to memory of 1948 3192 4B80.tmp 88 PID 3192 wrote to memory of 1948 3192 4B80.tmp 88 PID 1948 wrote to memory of 3040 1948 4BCE.tmp 87 PID 1948 wrote to memory of 3040 1948 4BCE.tmp 87 PID 1948 wrote to memory of 3040 1948 4BCE.tmp 87 PID 3040 wrote to memory of 1520 3040 4C1C.tmp 25 PID 3040 wrote to memory of 1520 3040 4C1C.tmp 25 PID 3040 wrote to memory of 1520 3040 4C1C.tmp 25 PID 1520 wrote to memory of 4500 1520 4C6A.tmp 86 PID 1520 wrote to memory of 4500 1520 4C6A.tmp 86 PID 1520 wrote to memory of 4500 1520 4C6A.tmp 86 PID 4500 wrote to memory of 4508 4500 4CC8.tmp 85 PID 4500 wrote to memory of 4508 4500 4CC8.tmp 85 PID 4500 wrote to memory of 4508 4500 4CC8.tmp 85 PID 4508 wrote to memory of 4124 4508 4D16.tmp 26 PID 4508 wrote to memory of 4124 4508 4D16.tmp 26 PID 4508 wrote to memory of 4124 4508 4D16.tmp 26 PID 4124 wrote to memory of 4612 4124 4D64.tmp 84 PID 4124 wrote to memory of 4612 4124 4D64.tmp 84 PID 4124 wrote to memory of 4612 4124 4D64.tmp 84 PID 4612 wrote to memory of 2396 4612 4DB2.tmp 83 PID 4612 wrote to memory of 2396 4612 4DB2.tmp 83 PID 4612 wrote to memory of 2396 4612 4DB2.tmp 83 PID 2396 wrote to memory of 4132 2396 4E01.tmp 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_32e9c7e43a506f82a52645876e80d51f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\4779.tmp"C:\Users\Admin\AppData\Local\Temp\4779.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\48D0.tmp"C:\Users\Admin\AppData\Local\Temp\48D0.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\495D.tmp"C:\Users\Admin\AppData\Local\Temp\495D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\49F9.tmp"C:\Users\Admin\AppData\Local\Temp\49F9.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\4A38.tmp"C:\Users\Admin\AppData\Local\Temp\4A38.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\4A86.tmp"C:\Users\Admin\AppData\Local\Temp\4A86.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B32.tmp"C:\Users\Admin\AppData\Local\Temp\4B32.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\4B80.tmp"C:\Users\Admin\AppData\Local\Temp\4B80.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\4CC8.tmp"C:\Users\Admin\AppData\Local\Temp\4CC8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\4D64.tmp"C:\Users\Admin\AppData\Local\Temp\4D64.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\51C9.tmp"C:\Users\Admin\AppData\Local\Temp\51C9.tmp"1⤵
- Executes dropped EXE
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\5217.tmp"C:\Users\Admin\AppData\Local\Temp\5217.tmp"2⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"3⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"4⤵
- Executes dropped EXE
PID:3248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\52F2.tmp"C:\Users\Admin\AppData\Local\Temp\52F2.tmp"1⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\5340.tmp"C:\Users\Admin\AppData\Local\Temp\5340.tmp"2⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"3⤵
- Executes dropped EXE
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"1⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"2⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\54D7.tmp"C:\Users\Admin\AppData\Local\Temp\54D7.tmp"1⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\5525.tmp"C:\Users\Admin\AppData\Local\Temp\5525.tmp"2⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"3⤵
- Executes dropped EXE
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\5488.tmp"C:\Users\Admin\AppData\Local\Temp\5488.tmp"1⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\4834.tmp"C:\Users\Admin\AppData\Local\Temp\4834.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"1⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"2⤵
- Executes dropped EXE
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\563E.tmp"C:\Users\Admin\AppData\Local\Temp\563E.tmp"1⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp"2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\56DA.tmp"C:\Users\Admin\AppData\Local\Temp\56DA.tmp"1⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\5728.tmp"C:\Users\Admin\AppData\Local\Temp\5728.tmp"2⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\5776.tmp"C:\Users\Admin\AppData\Local\Temp\5776.tmp"3⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\57C5.tmp"C:\Users\Admin\AppData\Local\Temp\57C5.tmp"4⤵
- Executes dropped EXE
PID:4136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5813.tmp"C:\Users\Admin\AppData\Local\Temp\5813.tmp"1⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"2⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\589F.tmp"C:\Users\Admin\AppData\Local\Temp\589F.tmp"3⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\58ED.tmp"C:\Users\Admin\AppData\Local\Temp\58ED.tmp"4⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"5⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\596A.tmp"C:\Users\Admin\AppData\Local\Temp\596A.tmp"6⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\59B9.tmp"C:\Users\Admin\AppData\Local\Temp\59B9.tmp"7⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\4D16.tmp"C:\Users\Admin\AppData\Local\Temp\4D16.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A07.tmp"C:\Users\Admin\AppData\Local\Temp\5A07.tmp"1⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\5A55.tmp"C:\Users\Admin\AppData\Local\Temp\5A55.tmp"2⤵
- Executes dropped EXE
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\5A93.tmp"C:\Users\Admin\AppData\Local\Temp\5A93.tmp"1⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"2⤵
- Executes dropped EXE
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\5B10.tmp"C:\Users\Admin\AppData\Local\Temp\5B10.tmp"1⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"2⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"3⤵PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"1⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"2⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"3⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"4⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"5⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"6⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"7⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"8⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"9⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"10⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\5F27.tmp"C:\Users\Admin\AppData\Local\Temp\5F27.tmp"11⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"12⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\6031.tmp"C:\Users\Admin\AppData\Local\Temp\6031.tmp"13⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\608F.tmp"C:\Users\Admin\AppData\Local\Temp\608F.tmp"14⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\614A.tmp"C:\Users\Admin\AppData\Local\Temp\614A.tmp"15⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\6215.tmp"C:\Users\Admin\AppData\Local\Temp\6215.tmp"16⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\62E0.tmp"C:\Users\Admin\AppData\Local\Temp\62E0.tmp"17⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"18⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\6428.tmp"C:\Users\Admin\AppData\Local\Temp\6428.tmp"19⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"20⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"21⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"22⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"23⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\65FD.tmp"C:\Users\Admin\AppData\Local\Temp\65FD.tmp"24⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"25⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\66A9.tmp"C:\Users\Admin\AppData\Local\Temp\66A9.tmp"26⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\66F7.tmp"C:\Users\Admin\AppData\Local\Temp\66F7.tmp"27⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\6755.tmp"C:\Users\Admin\AppData\Local\Temp\6755.tmp"28⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\67B3.tmp"C:\Users\Admin\AppData\Local\Temp\67B3.tmp"29⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\6801.tmp"C:\Users\Admin\AppData\Local\Temp\6801.tmp"30⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\684F.tmp"C:\Users\Admin\AppData\Local\Temp\684F.tmp"31⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"32⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"33⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"34⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\69A7.tmp"C:\Users\Admin\AppData\Local\Temp\69A7.tmp"35⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\69F5.tmp"C:\Users\Admin\AppData\Local\Temp\69F5.tmp"36⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\6A43.tmp"C:\Users\Admin\AppData\Local\Temp\6A43.tmp"37⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"38⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"39⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"40⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"41⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"42⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"43⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\6C85.tmp"C:\Users\Admin\AppData\Local\Temp\6C85.tmp"44⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"45⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\6D21.tmp"C:\Users\Admin\AppData\Local\Temp\6D21.tmp"46⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"47⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"48⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"49⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\6E89.tmp"C:\Users\Admin\AppData\Local\Temp\6E89.tmp"50⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\6ED7.tmp"C:\Users\Admin\AppData\Local\Temp\6ED7.tmp"51⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\6F25.tmp"C:\Users\Admin\AppData\Local\Temp\6F25.tmp"52⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"53⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"54⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"55⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\706D.tmp"C:\Users\Admin\AppData\Local\Temp\706D.tmp"56⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\70BB.tmp"C:\Users\Admin\AppData\Local\Temp\70BB.tmp"57⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"58⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\7167.tmp"C:\Users\Admin\AppData\Local\Temp\7167.tmp"59⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\71B5.tmp"C:\Users\Admin\AppData\Local\Temp\71B5.tmp"60⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\7203.tmp"C:\Users\Admin\AppData\Local\Temp\7203.tmp"61⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\7251.tmp"C:\Users\Admin\AppData\Local\Temp\7251.tmp"62⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\72A0.tmp"C:\Users\Admin\AppData\Local\Temp\72A0.tmp"63⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"64⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\734B.tmp"C:\Users\Admin\AppData\Local\Temp\734B.tmp"65⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\73A9.tmp"C:\Users\Admin\AppData\Local\Temp\73A9.tmp"66⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\73F7.tmp"C:\Users\Admin\AppData\Local\Temp\73F7.tmp"67⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\7445.tmp"C:\Users\Admin\AppData\Local\Temp\7445.tmp"68⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"69⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"70⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\7520.tmp"C:\Users\Admin\AppData\Local\Temp\7520.tmp"71⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\756E.tmp"C:\Users\Admin\AppData\Local\Temp\756E.tmp"72⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\75BC.tmp"C:\Users\Admin\AppData\Local\Temp\75BC.tmp"73⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"74⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\7659.tmp"C:\Users\Admin\AppData\Local\Temp\7659.tmp"75⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\76A7.tmp"C:\Users\Admin\AppData\Local\Temp\76A7.tmp"76⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\7705.tmp"C:\Users\Admin\AppData\Local\Temp\7705.tmp"77⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\7753.tmp"C:\Users\Admin\AppData\Local\Temp\7753.tmp"78⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"79⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\77EF.tmp"C:\Users\Admin\AppData\Local\Temp\77EF.tmp"80⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\783D.tmp"C:\Users\Admin\AppData\Local\Temp\783D.tmp"81⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\788B.tmp"C:\Users\Admin\AppData\Local\Temp\788B.tmp"82⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\78E9.tmp"C:\Users\Admin\AppData\Local\Temp\78E9.tmp"83⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\7937.tmp"C:\Users\Admin\AppData\Local\Temp\7937.tmp"84⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"85⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"86⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\7A21.tmp"C:\Users\Admin\AppData\Local\Temp\7A21.tmp"87⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\7A70.tmp"C:\Users\Admin\AppData\Local\Temp\7A70.tmp"88⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\7AAE.tmp"C:\Users\Admin\AppData\Local\Temp\7AAE.tmp"89⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"90⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"91⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\7B98.tmp"C:\Users\Admin\AppData\Local\Temp\7B98.tmp"92⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"93⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\7C35.tmp"C:\Users\Admin\AppData\Local\Temp\7C35.tmp"94⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\7C83.tmp"C:\Users\Admin\AppData\Local\Temp\7C83.tmp"95⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"96⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"97⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"98⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"99⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\7E38.tmp"C:\Users\Admin\AppData\Local\Temp\7E38.tmp"100⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\7E86.tmp"C:\Users\Admin\AppData\Local\Temp\7E86.tmp"101⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"102⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\7F32.tmp"C:\Users\Admin\AppData\Local\Temp\7F32.tmp"103⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\7F80.tmp"C:\Users\Admin\AppData\Local\Temp\7F80.tmp"104⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"105⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"106⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\806B.tmp"C:\Users\Admin\AppData\Local\Temp\806B.tmp"107⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"108⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\8107.tmp"C:\Users\Admin\AppData\Local\Temp\8107.tmp"109⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"110⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"111⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\81F1.tmp"C:\Users\Admin\AppData\Local\Temp\81F1.tmp"112⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"113⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"114⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\82EB.tmp"C:\Users\Admin\AppData\Local\Temp\82EB.tmp"115⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"116⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\8388.tmp"C:\Users\Admin\AppData\Local\Temp\8388.tmp"117⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"118⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\8424.tmp"C:\Users\Admin\AppData\Local\Temp\8424.tmp"119⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"120⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\84D0.tmp"C:\Users\Admin\AppData\Local\Temp\84D0.tmp"121⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\851E.tmp"C:\Users\Admin\AppData\Local\Temp\851E.tmp"122⤵PID:2560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-