Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe
-
Size
529KB
-
MD5
35610a8c8a5794fedaee2d7e17188661
-
SHA1
a9c286e50f96123b205b3ee55becf004eb166591
-
SHA256
c702f30d51e9e6f15b10ead3d87482f528202e23a7dcd51f2c8296d3d19a87ad
-
SHA512
71cfab0aea12e7fa5c8e40e3cd18b284235f65753c41d4299a8f62d22b21766420fdbd24011f0db87057720983e500d1fbae88cee6b28443d1a778bb9a2f494c
-
SSDEEP
12288:NU5rCOTeijfGECWt92x16WQSiWDNBL2HIGaY/TZwlH4Hp:NUQOJjDFj2/BQSl/2HIHY/TSlH4Hp
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2216 6F0.tmp 4036 838.tmp 884 961.tmp 408 A5B.tmp 3616 BC3.tmp 2340 D49.tmp 788 11BE.tmp 4068 13A2.tmp 3892 170D.tmp 3888 18F2.tmp 3556 19CC.tmp 5068 1AC6.tmp 4556 1BA1.tmp 3944 1CF9.tmp 3984 1E41.tmp 968 1F5A.tmp 2236 2045.tmp 2404 212F.tmp 4628 2277.tmp 4208 2371.tmp 4056 23FE.tmp 1844 25B3.tmp 3084 27B7.tmp 764 2B03.tmp 2728 2B9F.tmp 4460 2CA9.tmp 4744 2DF1.tmp 2348 2EDB.tmp 4620 30BF.tmp 1616 315C.tmp 4480 3246.tmp 2864 3302.tmp 4464 33CD.tmp 1784 3498.tmp 1092 3592.tmp 3544 35FF.tmp 4320 369B.tmp 4344 38CE.tmp 4944 394B.tmp 1320 39D8.tmp 2216 3A83.tmp 3436 3B2F.tmp 3880 3C49.tmp 4908 3D04.tmp 408 414A.tmp 2240 41C7.tmp 3340 4263.tmp 220 42E0.tmp 216 43BB.tmp 464 4447.tmp 4184 44F3.tmp 1676 4580.tmp 1176 45FD.tmp 2904 466A.tmp 4608 47D2.tmp 5060 484F.tmp 1680 48CC.tmp 2884 4987.tmp 3680 4A04.tmp 3944 4AEF.tmp 3000 4C17.tmp 3820 4CB4.tmp 4668 4D50.tmp 4664 4DBD.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 2216 468 2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe 92 PID 468 wrote to memory of 2216 468 2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe 92 PID 468 wrote to memory of 2216 468 2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe 92 PID 2216 wrote to memory of 4036 2216 6F0.tmp 93 PID 2216 wrote to memory of 4036 2216 6F0.tmp 93 PID 2216 wrote to memory of 4036 2216 6F0.tmp 93 PID 4036 wrote to memory of 884 4036 838.tmp 94 PID 4036 wrote to memory of 884 4036 838.tmp 94 PID 4036 wrote to memory of 884 4036 838.tmp 94 PID 884 wrote to memory of 408 884 961.tmp 95 PID 884 wrote to memory of 408 884 961.tmp 95 PID 884 wrote to memory of 408 884 961.tmp 95 PID 408 wrote to memory of 3616 408 A5B.tmp 96 PID 408 wrote to memory of 3616 408 A5B.tmp 96 PID 408 wrote to memory of 3616 408 A5B.tmp 96 PID 3616 wrote to memory of 2340 3616 BC3.tmp 97 PID 3616 wrote to memory of 2340 3616 BC3.tmp 97 PID 3616 wrote to memory of 2340 3616 BC3.tmp 97 PID 2340 wrote to memory of 788 2340 D49.tmp 98 PID 2340 wrote to memory of 788 2340 D49.tmp 98 PID 2340 wrote to memory of 788 2340 D49.tmp 98 PID 788 wrote to memory of 4068 788 11BE.tmp 99 PID 788 wrote to memory of 4068 788 11BE.tmp 99 PID 788 wrote to memory of 4068 788 11BE.tmp 99 PID 4068 wrote to memory of 3892 4068 13A2.tmp 100 PID 4068 wrote to memory of 3892 4068 13A2.tmp 100 PID 4068 wrote to memory of 3892 4068 13A2.tmp 100 PID 3892 wrote to memory of 3888 3892 170D.tmp 101 PID 3892 wrote to memory of 3888 3892 170D.tmp 101 PID 3892 wrote to memory of 3888 3892 170D.tmp 101 PID 3888 wrote to memory of 3556 3888 18F2.tmp 102 PID 3888 wrote to memory of 3556 3888 18F2.tmp 102 PID 3888 wrote to memory of 3556 3888 18F2.tmp 102 PID 3556 wrote to memory of 5068 3556 19CC.tmp 103 PID 3556 wrote to memory of 5068 3556 19CC.tmp 103 PID 3556 wrote to memory of 5068 3556 19CC.tmp 103 PID 5068 wrote to memory of 4556 5068 1AC6.tmp 104 PID 5068 wrote to memory of 4556 5068 1AC6.tmp 104 PID 5068 wrote to memory of 4556 5068 1AC6.tmp 104 PID 4556 wrote to memory of 3944 4556 1BA1.tmp 105 PID 4556 wrote to memory of 3944 4556 1BA1.tmp 105 PID 4556 wrote to memory of 3944 4556 1BA1.tmp 105 PID 3944 wrote to memory of 3984 3944 1CF9.tmp 106 PID 3944 wrote to memory of 3984 3944 1CF9.tmp 106 PID 3944 wrote to memory of 3984 3944 1CF9.tmp 106 PID 3984 wrote to memory of 968 3984 1E41.tmp 107 PID 3984 wrote to memory of 968 3984 1E41.tmp 107 PID 3984 wrote to memory of 968 3984 1E41.tmp 107 PID 968 wrote to memory of 2236 968 1F5A.tmp 108 PID 968 wrote to memory of 2236 968 1F5A.tmp 108 PID 968 wrote to memory of 2236 968 1F5A.tmp 108 PID 2236 wrote to memory of 2404 2236 2045.tmp 109 PID 2236 wrote to memory of 2404 2236 2045.tmp 109 PID 2236 wrote to memory of 2404 2236 2045.tmp 109 PID 2404 wrote to memory of 4628 2404 212F.tmp 110 PID 2404 wrote to memory of 4628 2404 212F.tmp 110 PID 2404 wrote to memory of 4628 2404 212F.tmp 110 PID 4628 wrote to memory of 4208 4628 2277.tmp 111 PID 4628 wrote to memory of 4208 4628 2277.tmp 111 PID 4628 wrote to memory of 4208 4628 2277.tmp 111 PID 4208 wrote to memory of 4056 4208 2371.tmp 112 PID 4208 wrote to memory of 4056 4208 2371.tmp 112 PID 4208 wrote to memory of 4056 4208 2371.tmp 112 PID 4056 wrote to memory of 1844 4056 23FE.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_35610a8c8a5794fedaee2d7e17188661_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\838.tmp"C:\Users\Admin\AppData\Local\Temp\838.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\1BA1.tmp"C:\Users\Admin\AppData\Local\Temp\1BA1.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\1E41.tmp"C:\Users\Admin\AppData\Local\Temp\1E41.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\2045.tmp"C:\Users\Admin\AppData\Local\Temp\2045.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\212F.tmp"C:\Users\Admin\AppData\Local\Temp\212F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\2277.tmp"C:\Users\Admin\AppData\Local\Temp\2277.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\2371.tmp"C:\Users\Admin\AppData\Local\Temp\2371.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"23⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"24⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\2B03.tmp"C:\Users\Admin\AppData\Local\Temp\2B03.tmp"25⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"26⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"27⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\2DF1.tmp"C:\Users\Admin\AppData\Local\Temp\2DF1.tmp"28⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"29⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\30BF.tmp"C:\Users\Admin\AppData\Local\Temp\30BF.tmp"30⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\315C.tmp"C:\Users\Admin\AppData\Local\Temp\315C.tmp"31⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"32⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"33⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"34⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"35⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\3592.tmp"C:\Users\Admin\AppData\Local\Temp\3592.tmp"36⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"37⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"38⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\38CE.tmp"C:\Users\Admin\AppData\Local\Temp\38CE.tmp"39⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\394B.tmp"C:\Users\Admin\AppData\Local\Temp\394B.tmp"40⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\39D8.tmp"C:\Users\Admin\AppData\Local\Temp\39D8.tmp"41⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"42⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"43⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\3C49.tmp"C:\Users\Admin\AppData\Local\Temp\3C49.tmp"44⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\3D04.tmp"C:\Users\Admin\AppData\Local\Temp\3D04.tmp"45⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"46⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"47⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp"48⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"49⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\43BB.tmp"C:\Users\Admin\AppData\Local\Temp\43BB.tmp"50⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"51⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"52⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\4580.tmp"C:\Users\Admin\AppData\Local\Temp\4580.tmp"53⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\45FD.tmp"C:\Users\Admin\AppData\Local\Temp\45FD.tmp"54⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"55⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\47D2.tmp"C:\Users\Admin\AppData\Local\Temp\47D2.tmp"56⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"57⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\48CC.tmp"C:\Users\Admin\AppData\Local\Temp\48CC.tmp"58⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"59⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"60⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"61⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\4C17.tmp"C:\Users\Admin\AppData\Local\Temp\4C17.tmp"62⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"63⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\4D50.tmp"C:\Users\Admin\AppData\Local\Temp\4D50.tmp"64⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\4DBD.tmp"C:\Users\Admin\AppData\Local\Temp\4DBD.tmp"65⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"66⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\500F.tmp"C:\Users\Admin\AppData\Local\Temp\500F.tmp"67⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\50AB.tmp"C:\Users\Admin\AppData\Local\Temp\50AB.tmp"68⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\5148.tmp"C:\Users\Admin\AppData\Local\Temp\5148.tmp"69⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\51E4.tmp"C:\Users\Admin\AppData\Local\Temp\51E4.tmp"70⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\53E7.tmp"C:\Users\Admin\AppData\Local\Temp\53E7.tmp"71⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\5474.tmp"C:\Users\Admin\AppData\Local\Temp\5474.tmp"72⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"73⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"74⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"75⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"76⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\5762.tmp"C:\Users\Admin\AppData\Local\Temp\5762.tmp"77⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\583D.tmp"C:\Users\Admin\AppData\Local\Temp\583D.tmp"78⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"79⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp"80⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"81⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"82⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"83⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\5C34.tmp"C:\Users\Admin\AppData\Local\Temp\5C34.tmp"84⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"85⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"86⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\5E09.tmp"C:\Users\Admin\AppData\Local\Temp\5E09.tmp"87⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\5E86.tmp"C:\Users\Admin\AppData\Local\Temp\5E86.tmp"88⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\5EF4.tmp"C:\Users\Admin\AppData\Local\Temp\5EF4.tmp"89⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\5F61.tmp"C:\Users\Admin\AppData\Local\Temp\5F61.tmp"90⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"91⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"92⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\60C8.tmp"C:\Users\Admin\AppData\Local\Temp\60C8.tmp"93⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"94⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"95⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\623F.tmp"C:\Users\Admin\AppData\Local\Temp\623F.tmp"96⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\62AD.tmp"C:\Users\Admin\AppData\Local\Temp\62AD.tmp"97⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\631A.tmp"C:\Users\Admin\AppData\Local\Temp\631A.tmp"98⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"99⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\659B.tmp"C:\Users\Admin\AppData\Local\Temp\659B.tmp"100⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\6608.tmp"C:\Users\Admin\AppData\Local\Temp\6608.tmp"101⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\66C4.tmp"C:\Users\Admin\AppData\Local\Temp\66C4.tmp"102⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\676F.tmp"C:\Users\Admin\AppData\Local\Temp\676F.tmp"103⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\67EC.tmp"C:\Users\Admin\AppData\Local\Temp\67EC.tmp"104⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\685A.tmp"C:\Users\Admin\AppData\Local\Temp\685A.tmp"105⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\68F6.tmp"C:\Users\Admin\AppData\Local\Temp\68F6.tmp"106⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\6963.tmp"C:\Users\Admin\AppData\Local\Temp\6963.tmp"107⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\69D1.tmp"C:\Users\Admin\AppData\Local\Temp\69D1.tmp"108⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"109⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"110⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\6B67.tmp"C:\Users\Admin\AppData\Local\Temp\6B67.tmp"111⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"112⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\6C51.tmp"C:\Users\Admin\AppData\Local\Temp\6C51.tmp"113⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"114⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"115⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\6E07.tmp"C:\Users\Admin\AppData\Local\Temp\6E07.tmp"116⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"117⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"118⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"119⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\6FDC.tmp"C:\Users\Admin\AppData\Local\Temp\6FDC.tmp"120⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\71B0.tmp"C:\Users\Admin\AppData\Local\Temp\71B0.tmp"121⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"122⤵PID:4708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-