Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe
-
Size
486KB
-
MD5
641bd0dbbcd671a0f9c64cbf7c062126
-
SHA1
0f59b73a4402d99e37729431d9209b339f970723
-
SHA256
dc905c5525f62a59b43073ff764ee1c337030d24dffb5eb830126d000e94c4ec
-
SHA512
9e6c50f0ae882aac4baafa2709c6652061e1e6f99d09fc6cf95fa1e721d86f4dbc511add797f4618884874a10d024c54e6a3eb2e29aef265e1622b2f03e0566c
-
SSDEEP
12288:/U5rCOTeiDm64qrcfun+6vtAU6WXkBNZ:/UQOJDmXk62yU6MkBN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2620 78.tmp 1740 49F.tmp 4832 606.tmp 3376 7FA.tmp 3328 C5F.tmp 1472 D49.tmp 4316 ED0.tmp 4640 FDA.tmp 1680 10F3.tmp 1536 11CE.tmp 4736 12A8.tmp 4508 13A2.tmp 3120 148D.tmp 5096 1577.tmp 1104 1652.tmp 3616 175B.tmp 3044 1836.tmp 924 18E2.tmp 1712 197E.tmp 1716 1D28.tmp 1888 1DC4.tmp 1036 1EDD.tmp 2704 1FA8.tmp 3468 20B2.tmp 3800 218D.tmp 3980 22D5.tmp 4808 23EE.tmp 3860 24C9.tmp 3756 27F5.tmp 2556 28C1.tmp 552 2A66.tmp 3056 2D35.tmp 5112 2E3F.tmp 4668 2F68.tmp 4064 30B0.tmp 3352 314C.tmp 3152 32E2.tmp 4464 33EC.tmp 4332 3498.tmp 2900 3553.tmp 1900 367C.tmp 1960 3795.tmp 3512 3803.tmp 4324 39F7.tmp 2256 3AE1.tmp 2692 3B4F.tmp 4552 3D81.tmp 532 3F56.tmp 4932 3FE2.tmp 3328 408E.tmp 796 411B.tmp 4280 45ED.tmp 4640 466A.tmp 1884 4707.tmp 1968 4793.tmp 1180 485E.tmp 4200 48EB.tmp 4800 4CF2.tmp 2292 4D8E.tmp 2260 4E2B.tmp 1448 4E98.tmp 1168 4F34.tmp 1156 501F.tmp 2064 508C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2620 1492 2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe 86 PID 1492 wrote to memory of 2620 1492 2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe 86 PID 1492 wrote to memory of 2620 1492 2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe 86 PID 2620 wrote to memory of 1740 2620 78.tmp 87 PID 2620 wrote to memory of 1740 2620 78.tmp 87 PID 2620 wrote to memory of 1740 2620 78.tmp 87 PID 1740 wrote to memory of 4832 1740 49F.tmp 88 PID 1740 wrote to memory of 4832 1740 49F.tmp 88 PID 1740 wrote to memory of 4832 1740 49F.tmp 88 PID 4832 wrote to memory of 3376 4832 606.tmp 90 PID 4832 wrote to memory of 3376 4832 606.tmp 90 PID 4832 wrote to memory of 3376 4832 606.tmp 90 PID 3376 wrote to memory of 3328 3376 7FA.tmp 91 PID 3376 wrote to memory of 3328 3376 7FA.tmp 91 PID 3376 wrote to memory of 3328 3376 7FA.tmp 91 PID 3328 wrote to memory of 1472 3328 C5F.tmp 92 PID 3328 wrote to memory of 1472 3328 C5F.tmp 92 PID 3328 wrote to memory of 1472 3328 C5F.tmp 92 PID 1472 wrote to memory of 4316 1472 D49.tmp 94 PID 1472 wrote to memory of 4316 1472 D49.tmp 94 PID 1472 wrote to memory of 4316 1472 D49.tmp 94 PID 4316 wrote to memory of 4640 4316 ED0.tmp 95 PID 4316 wrote to memory of 4640 4316 ED0.tmp 95 PID 4316 wrote to memory of 4640 4316 ED0.tmp 95 PID 4640 wrote to memory of 1680 4640 FDA.tmp 96 PID 4640 wrote to memory of 1680 4640 FDA.tmp 96 PID 4640 wrote to memory of 1680 4640 FDA.tmp 96 PID 1680 wrote to memory of 1536 1680 10F3.tmp 97 PID 1680 wrote to memory of 1536 1680 10F3.tmp 97 PID 1680 wrote to memory of 1536 1680 10F3.tmp 97 PID 1536 wrote to memory of 4736 1536 11CE.tmp 98 PID 1536 wrote to memory of 4736 1536 11CE.tmp 98 PID 1536 wrote to memory of 4736 1536 11CE.tmp 98 PID 4736 wrote to memory of 4508 4736 12A8.tmp 99 PID 4736 wrote to memory of 4508 4736 12A8.tmp 99 PID 4736 wrote to memory of 4508 4736 12A8.tmp 99 PID 4508 wrote to memory of 3120 4508 13A2.tmp 100 PID 4508 wrote to memory of 3120 4508 13A2.tmp 100 PID 4508 wrote to memory of 3120 4508 13A2.tmp 100 PID 3120 wrote to memory of 5096 3120 148D.tmp 101 PID 3120 wrote to memory of 5096 3120 148D.tmp 101 PID 3120 wrote to memory of 5096 3120 148D.tmp 101 PID 5096 wrote to memory of 1104 5096 1577.tmp 102 PID 5096 wrote to memory of 1104 5096 1577.tmp 102 PID 5096 wrote to memory of 1104 5096 1577.tmp 102 PID 1104 wrote to memory of 3616 1104 1652.tmp 103 PID 1104 wrote to memory of 3616 1104 1652.tmp 103 PID 1104 wrote to memory of 3616 1104 1652.tmp 103 PID 3616 wrote to memory of 3044 3616 175B.tmp 104 PID 3616 wrote to memory of 3044 3616 175B.tmp 104 PID 3616 wrote to memory of 3044 3616 175B.tmp 104 PID 3044 wrote to memory of 924 3044 1836.tmp 105 PID 3044 wrote to memory of 924 3044 1836.tmp 105 PID 3044 wrote to memory of 924 3044 1836.tmp 105 PID 924 wrote to memory of 1712 924 18E2.tmp 106 PID 924 wrote to memory of 1712 924 18E2.tmp 106 PID 924 wrote to memory of 1712 924 18E2.tmp 106 PID 1712 wrote to memory of 1716 1712 197E.tmp 107 PID 1712 wrote to memory of 1716 1712 197E.tmp 107 PID 1712 wrote to memory of 1716 1712 197E.tmp 107 PID 1716 wrote to memory of 1888 1716 1D28.tmp 108 PID 1716 wrote to memory of 1888 1716 1D28.tmp 108 PID 1716 wrote to memory of 1888 1716 1D28.tmp 108 PID 1888 wrote to memory of 1036 1888 1DC4.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_641bd0dbbcd671a0f9c64cbf7c062126_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\7FA.tmp"C:\Users\Admin\AppData\Local\Temp\7FA.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\C5F.tmp"C:\Users\Admin\AppData\Local\Temp\C5F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\FDA.tmp"C:\Users\Admin\AppData\Local\Temp\FDA.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\11CE.tmp"C:\Users\Admin\AppData\Local\Temp\11CE.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\1577.tmp"C:\Users\Admin\AppData\Local\Temp\1577.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\1652.tmp"C:\Users\Admin\AppData\Local\Temp\1652.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\1836.tmp"C:\Users\Admin\AppData\Local\Temp\1836.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\197E.tmp"C:\Users\Admin\AppData\Local\Temp\197E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"23⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"24⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\20B2.tmp"C:\Users\Admin\AppData\Local\Temp\20B2.tmp"25⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"26⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"27⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\23EE.tmp"C:\Users\Admin\AppData\Local\Temp\23EE.tmp"28⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\24C9.tmp"C:\Users\Admin\AppData\Local\Temp\24C9.tmp"29⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"30⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"31⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"32⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"33⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"34⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\2F68.tmp"C:\Users\Admin\AppData\Local\Temp\2F68.tmp"35⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"36⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\314C.tmp"C:\Users\Admin\AppData\Local\Temp\314C.tmp"37⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"38⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"39⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"40⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"41⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"42⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"43⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"44⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\39F7.tmp"C:\Users\Admin\AppData\Local\Temp\39F7.tmp"45⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"46⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"47⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"48⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\3F56.tmp"C:\Users\Admin\AppData\Local\Temp\3F56.tmp"49⤵
- Executes dropped EXE
PID:532 -
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"50⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"51⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"52⤵
- Executes dropped EXE
PID:796 -
C:\Users\Admin\AppData\Local\Temp\45ED.tmp"C:\Users\Admin\AppData\Local\Temp\45ED.tmp"53⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"54⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\4707.tmp"C:\Users\Admin\AppData\Local\Temp\4707.tmp"55⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"56⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"57⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\48EB.tmp"C:\Users\Admin\AppData\Local\Temp\48EB.tmp"58⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"59⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"60⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"61⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\4E98.tmp"C:\Users\Admin\AppData\Local\Temp\4E98.tmp"62⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"63⤵
- Executes dropped EXE
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\501F.tmp"C:\Users\Admin\AppData\Local\Temp\501F.tmp"64⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\508C.tmp"C:\Users\Admin\AppData\Local\Temp\508C.tmp"65⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\5176.tmp"C:\Users\Admin\AppData\Local\Temp\5176.tmp"66⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"67⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"68⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"69⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"70⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"71⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"72⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"73⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\5733.tmp"C:\Users\Admin\AppData\Local\Temp\5733.tmp"74⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\582D.tmp"C:\Users\Admin\AppData\Local\Temp\582D.tmp"75⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\589B.tmp"C:\Users\Admin\AppData\Local\Temp\589B.tmp"76⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\5927.tmp"C:\Users\Admin\AppData\Local\Temp\5927.tmp"77⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\5995.tmp"C:\Users\Admin\AppData\Local\Temp\5995.tmp"78⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\5A21.tmp"C:\Users\Admin\AppData\Local\Temp\5A21.tmp"79⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"80⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"81⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\5C15.tmp"C:\Users\Admin\AppData\Local\Temp\5C15.tmp"82⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"83⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"84⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"85⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"86⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"87⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"88⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"89⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\606B.tmp"C:\Users\Admin\AppData\Local\Temp\606B.tmp"90⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\6165.tmp"C:\Users\Admin\AppData\Local\Temp\6165.tmp"91⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"92⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\62AD.tmp"C:\Users\Admin\AppData\Local\Temp\62AD.tmp"93⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\631A.tmp"C:\Users\Admin\AppData\Local\Temp\631A.tmp"94⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\63A7.tmp"C:\Users\Admin\AppData\Local\Temp\63A7.tmp"95⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\6472.tmp"C:\Users\Admin\AppData\Local\Temp\6472.tmp"96⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\64FE.tmp"C:\Users\Admin\AppData\Local\Temp\64FE.tmp"97⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\658B.tmp"C:\Users\Admin\AppData\Local\Temp\658B.tmp"98⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\66D3.tmp"C:\Users\Admin\AppData\Local\Temp\66D3.tmp"99⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\6741.tmp"C:\Users\Admin\AppData\Local\Temp\6741.tmp"100⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\67CD.tmp"C:\Users\Admin\AppData\Local\Temp\67CD.tmp"101⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\685A.tmp"C:\Users\Admin\AppData\Local\Temp\685A.tmp"102⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"103⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\6973.tmp"C:\Users\Admin\AppData\Local\Temp\6973.tmp"104⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"105⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"106⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\6B29.tmp"C:\Users\Admin\AppData\Local\Temp\6B29.tmp"107⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"108⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\6C61.tmp"C:\Users\Admin\AppData\Local\Temp\6C61.tmp"109⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"110⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"111⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"112⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\6E36.tmp"C:\Users\Admin\AppData\Local\Temp\6E36.tmp"113⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"114⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\6FBC.tmp"C:\Users\Admin\AppData\Local\Temp\6FBC.tmp"115⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"116⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\70C6.tmp"C:\Users\Admin\AppData\Local\Temp\70C6.tmp"117⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\7153.tmp"C:\Users\Admin\AppData\Local\Temp\7153.tmp"118⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"119⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\72AA.tmp"C:\Users\Admin\AppData\Local\Temp\72AA.tmp"120⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\7347.tmp"C:\Users\Admin\AppData\Local\Temp\7347.tmp"121⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"122⤵PID:3800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-