Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe
-
Size
486KB
-
MD5
ca7c63735a57d0aa21560c4167b9ed6d
-
SHA1
8531f4747c73fd45d2ca3f9f09556d46bfd42265
-
SHA256
72d0185e703d8b2c5ac572a2bc8e24acb64862ff49ae59d19fddf58af533168a
-
SHA512
32ebc25a974ef8782d017caae7a1d0bcb218ab86ee6f0a38b4faf678fd36ba885d85f661ec3078ec380ec74a7429014a241b5023e936f85ac47afe0d04438ff9
-
SSDEEP
12288:oU5rCOTeiDETv8kiE0z6Vo4vjHQNuby19NZ:oUQOJDE0E0z6V1HQNubU9N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4952 4AB5.tmp 2248 4B22.tmp 1880 4B70.tmp 2368 4BBE.tmp 2572 4C1C.tmp 4040 4C6A.tmp 3340 4CC8.tmp 2744 4D16.tmp 5084 4D64.tmp 2420 4DB2.tmp 4592 4E10.tmp 1332 4E8D.tmp 436 4EEB.tmp 5000 4F58.tmp 2172 4FB6.tmp 1036 5004.tmp 2304 5062.tmp 4420 50B0.tmp 2388 50FE.tmp 4628 514C.tmp 1716 51AA.tmp 1300 51F8.tmp 1188 5256.tmp 5104 52B4.tmp 3540 5302.tmp 3560 5350.tmp 3404 539E.tmp 4360 541B.tmp 2588 5469.tmp 4216 54C7.tmp 4004 5525.tmp 1616 5582.tmp 3436 55D1.tmp 1844 561F.tmp 4668 566D.tmp 4848 56BB.tmp 560 5728.tmp 1556 5786.tmp 4556 68DC.tmp 4528 692A.tmp 4344 5880.tmp 568 58CE.tmp 2108 6A62.tmp 2256 6AB0.tmp 460 59C8.tmp 2492 5A16.tmp 424 5A64.tmp 3144 5AB3.tmp 2356 5B01.tmp 4744 5B4F.tmp 1280 5BAD.tmp 3336 5BFB.tmp 1900 5C49.tmp 4032 5C97.tmp 4472 5CE5.tmp 2336 5D33.tmp 872 5D81.tmp 5000 6F73.tmp 4144 7000.tmp 444 708C.tmp 2172 4FB6.tmp 5032 5F37.tmp 4468 5F85.tmp 5068 5FE3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4952 3660 2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe 87 PID 3660 wrote to memory of 4952 3660 2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe 87 PID 3660 wrote to memory of 4952 3660 2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe 87 PID 4952 wrote to memory of 2248 4952 4AB5.tmp 88 PID 4952 wrote to memory of 2248 4952 4AB5.tmp 88 PID 4952 wrote to memory of 2248 4952 4AB5.tmp 88 PID 2248 wrote to memory of 1880 2248 4B22.tmp 91 PID 2248 wrote to memory of 1880 2248 4B22.tmp 91 PID 2248 wrote to memory of 1880 2248 4B22.tmp 91 PID 1880 wrote to memory of 2368 1880 4B70.tmp 92 PID 1880 wrote to memory of 2368 1880 4B70.tmp 92 PID 1880 wrote to memory of 2368 1880 4B70.tmp 92 PID 2368 wrote to memory of 2572 2368 4BBE.tmp 93 PID 2368 wrote to memory of 2572 2368 4BBE.tmp 93 PID 2368 wrote to memory of 2572 2368 4BBE.tmp 93 PID 2572 wrote to memory of 4040 2572 4C1C.tmp 95 PID 2572 wrote to memory of 4040 2572 4C1C.tmp 95 PID 2572 wrote to memory of 4040 2572 4C1C.tmp 95 PID 4040 wrote to memory of 3340 4040 4C6A.tmp 97 PID 4040 wrote to memory of 3340 4040 4C6A.tmp 97 PID 4040 wrote to memory of 3340 4040 4C6A.tmp 97 PID 3340 wrote to memory of 2744 3340 4CC8.tmp 96 PID 3340 wrote to memory of 2744 3340 4CC8.tmp 96 PID 3340 wrote to memory of 2744 3340 4CC8.tmp 96 PID 2744 wrote to memory of 5084 2744 4D16.tmp 98 PID 2744 wrote to memory of 5084 2744 4D16.tmp 98 PID 2744 wrote to memory of 5084 2744 4D16.tmp 98 PID 5084 wrote to memory of 2420 5084 4D64.tmp 99 PID 5084 wrote to memory of 2420 5084 4D64.tmp 99 PID 5084 wrote to memory of 2420 5084 4D64.tmp 99 PID 2420 wrote to memory of 4592 2420 4DB2.tmp 201 PID 2420 wrote to memory of 4592 2420 4DB2.tmp 201 PID 2420 wrote to memory of 4592 2420 4DB2.tmp 201 PID 4592 wrote to memory of 1332 4592 4E10.tmp 100 PID 4592 wrote to memory of 1332 4592 4E10.tmp 100 PID 4592 wrote to memory of 1332 4592 4E10.tmp 100 PID 1332 wrote to memory of 436 1332 4E8D.tmp 200 PID 1332 wrote to memory of 436 1332 4E8D.tmp 200 PID 1332 wrote to memory of 436 1332 4E8D.tmp 200 PID 436 wrote to memory of 5000 436 4EEB.tmp 199 PID 436 wrote to memory of 5000 436 4EEB.tmp 199 PID 436 wrote to memory of 5000 436 4EEB.tmp 199 PID 5000 wrote to memory of 2172 5000 4F58.tmp 197 PID 5000 wrote to memory of 2172 5000 4F58.tmp 197 PID 5000 wrote to memory of 2172 5000 4F58.tmp 197 PID 2172 wrote to memory of 1036 2172 4FB6.tmp 195 PID 2172 wrote to memory of 1036 2172 4FB6.tmp 195 PID 2172 wrote to memory of 1036 2172 4FB6.tmp 195 PID 1036 wrote to memory of 2304 1036 5004.tmp 102 PID 1036 wrote to memory of 2304 1036 5004.tmp 102 PID 1036 wrote to memory of 2304 1036 5004.tmp 102 PID 2304 wrote to memory of 4420 2304 5062.tmp 194 PID 2304 wrote to memory of 4420 2304 5062.tmp 194 PID 2304 wrote to memory of 4420 2304 5062.tmp 194 PID 4420 wrote to memory of 2388 4420 50B0.tmp 193 PID 4420 wrote to memory of 2388 4420 50B0.tmp 193 PID 4420 wrote to memory of 2388 4420 50B0.tmp 193 PID 2388 wrote to memory of 4628 2388 50FE.tmp 103 PID 2388 wrote to memory of 4628 2388 50FE.tmp 103 PID 2388 wrote to memory of 4628 2388 50FE.tmp 103 PID 4628 wrote to memory of 1716 4628 514C.tmp 192 PID 4628 wrote to memory of 1716 4628 514C.tmp 192 PID 4628 wrote to memory of 1716 4628 514C.tmp 192 PID 1716 wrote to memory of 1300 1716 51AA.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_ca7c63735a57d0aa21560c4167b9ed6d_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\4B22.tmp"C:\Users\Admin\AppData\Local\Temp\4B22.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\4B70.tmp"C:\Users\Admin\AppData\Local\Temp\4B70.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\4CC8.tmp"C:\Users\Admin\AppData\Local\Temp\4CC8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4D16.tmp"C:\Users\Admin\AppData\Local\Temp\4D16.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\4D64.tmp"C:\Users\Admin\AppData\Local\Temp\4D64.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\4E10.tmp"C:\Users\Admin\AppData\Local\Temp\4E10.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\4EEB.tmp"C:\Users\Admin\AppData\Local\Temp\4EEB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\5062.tmp"C:\Users\Admin\AppData\Local\Temp\5062.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\50B0.tmp"C:\Users\Admin\AppData\Local\Temp\50B0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\51AA.tmp"C:\Users\Admin\AppData\Local\Temp\51AA.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"1⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\5256.tmp"C:\Users\Admin\AppData\Local\Temp\5256.tmp"2⤵
- Executes dropped EXE
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\561F.tmp"C:\Users\Admin\AppData\Local\Temp\561F.tmp"1⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\566D.tmp"C:\Users\Admin\AppData\Local\Temp\566D.tmp"2⤵
- Executes dropped EXE
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\56BB.tmp"C:\Users\Admin\AppData\Local\Temp\56BB.tmp"1⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\5728.tmp"C:\Users\Admin\AppData\Local\Temp\5728.tmp"2⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\5786.tmp"C:\Users\Admin\AppData\Local\Temp\5786.tmp"3⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\57E4.tmp"C:\Users\Admin\AppData\Local\Temp\57E4.tmp"4⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\5832.tmp"C:\Users\Admin\AppData\Local\Temp\5832.tmp"5⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\5880.tmp"C:\Users\Admin\AppData\Local\Temp\5880.tmp"6⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\58CE.tmp"C:\Users\Admin\AppData\Local\Temp\58CE.tmp"7⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"8⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\597A.tmp"C:\Users\Admin\AppData\Local\Temp\597A.tmp"9⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\59C8.tmp"C:\Users\Admin\AppData\Local\Temp\59C8.tmp"10⤵
- Executes dropped EXE
PID:460 -
C:\Users\Admin\AppData\Local\Temp\5A16.tmp"C:\Users\Admin\AppData\Local\Temp\5A16.tmp"11⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\5A64.tmp"C:\Users\Admin\AppData\Local\Temp\5A64.tmp"12⤵
- Executes dropped EXE
PID:424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6AB0.tmp"C:\Users\Admin\AppData\Local\Temp\6AB0.tmp"9⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"10⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"11⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"12⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"13⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"14⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\6C85.tmp"C:\Users\Admin\AppData\Local\Temp\6C85.tmp"15⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"16⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"17⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"18⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"19⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\6F06.tmp"C:\Users\Admin\AppData\Local\Temp\6F06.tmp"20⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"21⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\7000.tmp"C:\Users\Admin\AppData\Local\Temp\7000.tmp"22⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\708C.tmp"C:\Users\Admin\AppData\Local\Temp\708C.tmp"23⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"24⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\7196.tmp"C:\Users\Admin\AppData\Local\Temp\7196.tmp"25⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\71F4.tmp"C:\Users\Admin\AppData\Local\Temp\71F4.tmp"26⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"27⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"28⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp"29⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\73B9.tmp"C:\Users\Admin\AppData\Local\Temp\73B9.tmp"30⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"31⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"32⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"33⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\75FB.tmp"C:\Users\Admin\AppData\Local\Temp\75FB.tmp"34⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"35⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\76E5.tmp"C:\Users\Admin\AppData\Local\Temp\76E5.tmp"36⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\7743.tmp"C:\Users\Admin\AppData\Local\Temp\7743.tmp"37⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"38⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"39⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\788B.tmp"C:\Users\Admin\AppData\Local\Temp\788B.tmp"40⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\78E9.tmp"C:\Users\Admin\AppData\Local\Temp\78E9.tmp"41⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\7947.tmp"C:\Users\Admin\AppData\Local\Temp\7947.tmp"42⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"43⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\79F3.tmp"C:\Users\Admin\AppData\Local\Temp\79F3.tmp"44⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\7A41.tmp"C:\Users\Admin\AppData\Local\Temp\7A41.tmp"45⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"46⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"47⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"48⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\7B98.tmp"C:\Users\Admin\AppData\Local\Temp\7B98.tmp"49⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"50⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\7C54.tmp"C:\Users\Admin\AppData\Local\Temp\7C54.tmp"51⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"52⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\7D00.tmp"C:\Users\Admin\AppData\Local\Temp\7D00.tmp"53⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\7D4E.tmp"C:\Users\Admin\AppData\Local\Temp\7D4E.tmp"54⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"55⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"56⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\7E38.tmp"C:\Users\Admin\AppData\Local\Temp\7E38.tmp"57⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\7E86.tmp"C:\Users\Admin\AppData\Local\Temp\7E86.tmp"58⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"59⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\7F42.tmp"C:\Users\Admin\AppData\Local\Temp\7F42.tmp"60⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\7F90.tmp"C:\Users\Admin\AppData\Local\Temp\7F90.tmp"61⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"62⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"63⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\80A9.tmp"C:\Users\Admin\AppData\Local\Temp\80A9.tmp"64⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"65⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\8146.tmp"C:\Users\Admin\AppData\Local\Temp\8146.tmp"66⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"67⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\81F1.tmp"C:\Users\Admin\AppData\Local\Temp\81F1.tmp"68⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"69⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\829D.tmp"C:\Users\Admin\AppData\Local\Temp\829D.tmp"70⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\82EB.tmp"C:\Users\Admin\AppData\Local\Temp\82EB.tmp"71⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\8349.tmp"C:\Users\Admin\AppData\Local\Temp\8349.tmp"72⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\83A7.tmp"C:\Users\Admin\AppData\Local\Temp\83A7.tmp"73⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"74⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\8453.tmp"C:\Users\Admin\AppData\Local\Temp\8453.tmp"75⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\84B1.tmp"C:\Users\Admin\AppData\Local\Temp\84B1.tmp"76⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"77⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\854D.tmp"C:\Users\Admin\AppData\Local\Temp\854D.tmp"78⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\859B.tmp"C:\Users\Admin\AppData\Local\Temp\859B.tmp"79⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\85E9.tmp"C:\Users\Admin\AppData\Local\Temp\85E9.tmp"80⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\8647.tmp"C:\Users\Admin\AppData\Local\Temp\8647.tmp"81⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"82⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"83⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\8750.tmp"C:\Users\Admin\AppData\Local\Temp\8750.tmp"84⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\87AE.tmp"C:\Users\Admin\AppData\Local\Temp\87AE.tmp"85⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\880C.tmp"C:\Users\Admin\AppData\Local\Temp\880C.tmp"86⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\886A.tmp"C:\Users\Admin\AppData\Local\Temp\886A.tmp"87⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\88C7.tmp"C:\Users\Admin\AppData\Local\Temp\88C7.tmp"88⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"89⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\8973.tmp"C:\Users\Admin\AppData\Local\Temp\8973.tmp"90⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\89C1.tmp"C:\Users\Admin\AppData\Local\Temp\89C1.tmp"91⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\8A10.tmp"C:\Users\Admin\AppData\Local\Temp\8A10.tmp"92⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"93⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\8ACB.tmp"C:\Users\Admin\AppData\Local\Temp\8ACB.tmp"94⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\8B19.tmp"C:\Users\Admin\AppData\Local\Temp\8B19.tmp"95⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\8B77.tmp"C:\Users\Admin\AppData\Local\Temp\8B77.tmp"96⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"97⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\8C23.tmp"C:\Users\Admin\AppData\Local\Temp\8C23.tmp"98⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\8C71.tmp"C:\Users\Admin\AppData\Local\Temp\8C71.tmp"99⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"100⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"101⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\8D7B.tmp"C:\Users\Admin\AppData\Local\Temp\8D7B.tmp"102⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\8DD8.tmp"C:\Users\Admin\AppData\Local\Temp\8DD8.tmp"103⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"104⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"105⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"106⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"107⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"108⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"109⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\9049.tmp"C:\Users\Admin\AppData\Local\Temp\9049.tmp"110⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\90A7.tmp"C:\Users\Admin\AppData\Local\Temp\90A7.tmp"111⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\9105.tmp"C:\Users\Admin\AppData\Local\Temp\9105.tmp"112⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\9153.tmp"C:\Users\Admin\AppData\Local\Temp\9153.tmp"113⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\91A1.tmp"C:\Users\Admin\AppData\Local\Temp\91A1.tmp"114⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\91EF.tmp"C:\Users\Admin\AppData\Local\Temp\91EF.tmp"115⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\924D.tmp"C:\Users\Admin\AppData\Local\Temp\924D.tmp"116⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\929B.tmp"C:\Users\Admin\AppData\Local\Temp\929B.tmp"117⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\92E9.tmp"C:\Users\Admin\AppData\Local\Temp\92E9.tmp"118⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\9337.tmp"C:\Users\Admin\AppData\Local\Temp\9337.tmp"119⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\9395.tmp"C:\Users\Admin\AppData\Local\Temp\9395.tmp"120⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\93F3.tmp"C:\Users\Admin\AppData\Local\Temp\93F3.tmp"121⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\9451.tmp"C:\Users\Admin\AppData\Local\Temp\9451.tmp"122⤵PID:5068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-