Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe
-
Size
487KB
-
MD5
40cb3404e0e20853a7ecc371a80be524
-
SHA1
bf748c93c4ebf2b00f35d590f9962f62bb21d105
-
SHA256
38bd9cfe6cf880c938b915bf102dd6bb52e2d789193bbb2f1e2b568533cb5e1b
-
SHA512
6d4abe2f27cef65ffd51fad374b328eea225d8c9effe0a67ee5a5223cd4829904779ef421132ed6ef268430da7442cdb3d48ec7cf3809ce812ca5a8a535f7a5a
-
SSDEEP
12288:HU5rCOTeiJsRPrGWGafk+eTf1pMOZgss02ZAMjDvNZ:HUQOJJsxCWMTT1pMOW08jDvN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4588 22A6.tmp 4452 23CF.tmp 3748 24B9.tmp 1992 2601.tmp 2892 273A.tmp 2692 28A1.tmp 1968 29CA.tmp 3032 2EBC.tmp 4092 3071.tmp 3148 31E8.tmp 3504 3311.tmp 2116 342A.tmp 532 3582.tmp 2032 367C.tmp 3548 37F3.tmp 3336 38FD.tmp 2608 3AB2.tmp 620 3BEB.tmp 4324 3CF4.tmp 2084 3E9A.tmp 1376 3FA4.tmp 3632 40FC.tmp 732 41F6.tmp 1440 435D.tmp 2512 4476.tmp 4296 4561.tmp 4304 46E7.tmp 3684 485E.tmp 3840 4949.tmp 4984 4A72.tmp 1756 4B8B.tmp 4676 4C85.tmp 4520 4D6F.tmp 2584 4E3A.tmp 3500 4F05.tmp 712 4FD1.tmp 1940 50AB.tmp 4492 5167.tmp 4992 5203.tmp 1656 52CE.tmp 4724 533C.tmp 1696 53C8.tmp 3132 5474.tmp 3300 5520.tmp 4916 55EB.tmp 3720 56A7.tmp 1752 5733.tmp 2116 57CF.tmp 2756 588B.tmp 764 5946.tmp 4852 5A40.tmp 3548 5AFC.tmp 936 5BA8.tmp 2448 5C44.tmp 3764 5CE0.tmp 2672 5DBB.tmp 3360 5E77.tmp 3624 5F42.tmp 2416 5FEE.tmp 3880 60E8.tmp 1928 61B3.tmp 2196 627E.tmp 3200 630A.tmp 540 63A7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4588 3376 2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe 92 PID 3376 wrote to memory of 4588 3376 2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe 92 PID 3376 wrote to memory of 4588 3376 2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe 92 PID 4588 wrote to memory of 4452 4588 22A6.tmp 93 PID 4588 wrote to memory of 4452 4588 22A6.tmp 93 PID 4588 wrote to memory of 4452 4588 22A6.tmp 93 PID 4452 wrote to memory of 3748 4452 23CF.tmp 94 PID 4452 wrote to memory of 3748 4452 23CF.tmp 94 PID 4452 wrote to memory of 3748 4452 23CF.tmp 94 PID 3748 wrote to memory of 1992 3748 24B9.tmp 95 PID 3748 wrote to memory of 1992 3748 24B9.tmp 95 PID 3748 wrote to memory of 1992 3748 24B9.tmp 95 PID 1992 wrote to memory of 2892 1992 2601.tmp 96 PID 1992 wrote to memory of 2892 1992 2601.tmp 96 PID 1992 wrote to memory of 2892 1992 2601.tmp 96 PID 2892 wrote to memory of 2692 2892 273A.tmp 97 PID 2892 wrote to memory of 2692 2892 273A.tmp 97 PID 2892 wrote to memory of 2692 2892 273A.tmp 97 PID 2692 wrote to memory of 1968 2692 28A1.tmp 98 PID 2692 wrote to memory of 1968 2692 28A1.tmp 98 PID 2692 wrote to memory of 1968 2692 28A1.tmp 98 PID 1968 wrote to memory of 3032 1968 29CA.tmp 100 PID 1968 wrote to memory of 3032 1968 29CA.tmp 100 PID 1968 wrote to memory of 3032 1968 29CA.tmp 100 PID 3032 wrote to memory of 4092 3032 2EBC.tmp 101 PID 3032 wrote to memory of 4092 3032 2EBC.tmp 101 PID 3032 wrote to memory of 4092 3032 2EBC.tmp 101 PID 4092 wrote to memory of 3148 4092 3071.tmp 102 PID 4092 wrote to memory of 3148 4092 3071.tmp 102 PID 4092 wrote to memory of 3148 4092 3071.tmp 102 PID 3148 wrote to memory of 3504 3148 31E8.tmp 103 PID 3148 wrote to memory of 3504 3148 31E8.tmp 103 PID 3148 wrote to memory of 3504 3148 31E8.tmp 103 PID 3504 wrote to memory of 2116 3504 3311.tmp 104 PID 3504 wrote to memory of 2116 3504 3311.tmp 104 PID 3504 wrote to memory of 2116 3504 3311.tmp 104 PID 2116 wrote to memory of 532 2116 342A.tmp 105 PID 2116 wrote to memory of 532 2116 342A.tmp 105 PID 2116 wrote to memory of 532 2116 342A.tmp 105 PID 532 wrote to memory of 2032 532 3582.tmp 106 PID 532 wrote to memory of 2032 532 3582.tmp 106 PID 532 wrote to memory of 2032 532 3582.tmp 106 PID 2032 wrote to memory of 3548 2032 367C.tmp 107 PID 2032 wrote to memory of 3548 2032 367C.tmp 107 PID 2032 wrote to memory of 3548 2032 367C.tmp 107 PID 3548 wrote to memory of 3336 3548 37F3.tmp 108 PID 3548 wrote to memory of 3336 3548 37F3.tmp 108 PID 3548 wrote to memory of 3336 3548 37F3.tmp 108 PID 3336 wrote to memory of 2608 3336 38FD.tmp 109 PID 3336 wrote to memory of 2608 3336 38FD.tmp 109 PID 3336 wrote to memory of 2608 3336 38FD.tmp 109 PID 2608 wrote to memory of 620 2608 3AB2.tmp 110 PID 2608 wrote to memory of 620 2608 3AB2.tmp 110 PID 2608 wrote to memory of 620 2608 3AB2.tmp 110 PID 620 wrote to memory of 4324 620 3BEB.tmp 111 PID 620 wrote to memory of 4324 620 3BEB.tmp 111 PID 620 wrote to memory of 4324 620 3BEB.tmp 111 PID 4324 wrote to memory of 2084 4324 3CF4.tmp 112 PID 4324 wrote to memory of 2084 4324 3CF4.tmp 112 PID 4324 wrote to memory of 2084 4324 3CF4.tmp 112 PID 2084 wrote to memory of 1376 2084 3E9A.tmp 113 PID 2084 wrote to memory of 1376 2084 3E9A.tmp 113 PID 2084 wrote to memory of 1376 2084 3E9A.tmp 113 PID 1376 wrote to memory of 3632 1376 3FA4.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-08_40cb3404e0e20853a7ecc371a80be524_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\24B9.tmp"C:\Users\Admin\AppData\Local\Temp\24B9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\2601.tmp"C:\Users\Admin\AppData\Local\Temp\2601.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\28A1.tmp"C:\Users\Admin\AppData\Local\Temp\28A1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3071.tmp"C:\Users\Admin\AppData\Local\Temp\3071.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\31E8.tmp"C:\Users\Admin\AppData\Local\Temp\31E8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"23⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\41F6.tmp"C:\Users\Admin\AppData\Local\Temp\41F6.tmp"24⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\435D.tmp"C:\Users\Admin\AppData\Local\Temp\435D.tmp"25⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\4476.tmp"C:\Users\Admin\AppData\Local\Temp\4476.tmp"26⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\4561.tmp"C:\Users\Admin\AppData\Local\Temp\4561.tmp"27⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\46E7.tmp"C:\Users\Admin\AppData\Local\Temp\46E7.tmp"28⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"29⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"30⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\4A72.tmp"C:\Users\Admin\AppData\Local\Temp\4A72.tmp"31⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\4B8B.tmp"C:\Users\Admin\AppData\Local\Temp\4B8B.tmp"32⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\4C85.tmp"C:\Users\Admin\AppData\Local\Temp\4C85.tmp"33⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"34⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\4E3A.tmp"C:\Users\Admin\AppData\Local\Temp\4E3A.tmp"35⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\4F05.tmp"C:\Users\Admin\AppData\Local\Temp\4F05.tmp"36⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"37⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\50AB.tmp"C:\Users\Admin\AppData\Local\Temp\50AB.tmp"38⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\5167.tmp"C:\Users\Admin\AppData\Local\Temp\5167.tmp"39⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"40⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"41⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"42⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"43⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\5474.tmp"C:\Users\Admin\AppData\Local\Temp\5474.tmp"44⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"45⤵
- Executes dropped EXE
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\55EB.tmp"C:\Users\Admin\AppData\Local\Temp\55EB.tmp"46⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"47⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\5733.tmp"C:\Users\Admin\AppData\Local\Temp\5733.tmp"48⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\57CF.tmp"C:\Users\Admin\AppData\Local\Temp\57CF.tmp"49⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\588B.tmp"C:\Users\Admin\AppData\Local\Temp\588B.tmp"50⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\5946.tmp"C:\Users\Admin\AppData\Local\Temp\5946.tmp"51⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"52⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"53⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"54⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\5C44.tmp"C:\Users\Admin\AppData\Local\Temp\5C44.tmp"55⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"56⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"57⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\5E77.tmp"C:\Users\Admin\AppData\Local\Temp\5E77.tmp"58⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\5F42.tmp"C:\Users\Admin\AppData\Local\Temp\5F42.tmp"59⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"60⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\60E8.tmp"C:\Users\Admin\AppData\Local\Temp\60E8.tmp"61⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"62⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\627E.tmp"C:\Users\Admin\AppData\Local\Temp\627E.tmp"63⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"64⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\63A7.tmp"C:\Users\Admin\AppData\Local\Temp\63A7.tmp"65⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\6453.tmp"C:\Users\Admin\AppData\Local\Temp\6453.tmp"66⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\651E.tmp"C:\Users\Admin\AppData\Local\Temp\651E.tmp"67⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\65CA.tmp"C:\Users\Admin\AppData\Local\Temp\65CA.tmp"68⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\6685.tmp"C:\Users\Admin\AppData\Local\Temp\6685.tmp"69⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\677F.tmp"C:\Users\Admin\AppData\Local\Temp\677F.tmp"70⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\684A.tmp"C:\Users\Admin\AppData\Local\Temp\684A.tmp"71⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\68B8.tmp"C:\Users\Admin\AppData\Local\Temp\68B8.tmp"72⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"73⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\69C1.tmp"C:\Users\Admin\AppData\Local\Temp\69C1.tmp"74⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"75⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"76⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\6B86.tmp"C:\Users\Admin\AppData\Local\Temp\6B86.tmp"77⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\6C71.tmp"C:\Users\Admin\AppData\Local\Temp\6C71.tmp"78⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\6D2C.tmp"C:\Users\Admin\AppData\Local\Temp\6D2C.tmp"79⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"80⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"81⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"82⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"83⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\70A7.tmp"C:\Users\Admin\AppData\Local\Temp\70A7.tmp"84⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"85⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\722D.tmp"C:\Users\Admin\AppData\Local\Temp\722D.tmp"86⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"87⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\73D3.tmp"C:\Users\Admin\AppData\Local\Temp\73D3.tmp"88⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\749E.tmp"C:\Users\Admin\AppData\Local\Temp\749E.tmp"89⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\752B.tmp"C:\Users\Admin\AppData\Local\Temp\752B.tmp"90⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\75A8.tmp"C:\Users\Admin\AppData\Local\Temp\75A8.tmp"91⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\7635.tmp"C:\Users\Admin\AppData\Local\Temp\7635.tmp"92⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\76D1.tmp"C:\Users\Admin\AppData\Local\Temp\76D1.tmp"93⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\77CB.tmp"C:\Users\Admin\AppData\Local\Temp\77CB.tmp"94⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\7867.tmp"C:\Users\Admin\AppData\Local\Temp\7867.tmp"95⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\7903.tmp"C:\Users\Admin\AppData\Local\Temp\7903.tmp"96⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\7980.tmp"C:\Users\Admin\AppData\Local\Temp\7980.tmp"97⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\7A2C.tmp"C:\Users\Admin\AppData\Local\Temp\7A2C.tmp"98⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\7AE8.tmp"C:\Users\Admin\AppData\Local\Temp\7AE8.tmp"99⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\7B84.tmp"C:\Users\Admin\AppData\Local\Temp\7B84.tmp"100⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\7C7E.tmp"C:\Users\Admin\AppData\Local\Temp\7C7E.tmp"101⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\7CFB.tmp"C:\Users\Admin\AppData\Local\Temp\7CFB.tmp"102⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\7E14.tmp"C:\Users\Admin\AppData\Local\Temp\7E14.tmp"103⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\7F7C.tmp"C:\Users\Admin\AppData\Local\Temp\7F7C.tmp"104⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\8056.tmp"C:\Users\Admin\AppData\Local\Temp\8056.tmp"105⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\8122.tmp"C:\Users\Admin\AppData\Local\Temp\8122.tmp"106⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\81ED.tmp"C:\Users\Admin\AppData\Local\Temp\81ED.tmp"107⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\82A8.tmp"C:\Users\Admin\AppData\Local\Temp\82A8.tmp"108⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\8383.tmp"C:\Users\Admin\AppData\Local\Temp\8383.tmp"109⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\843E.tmp"C:\Users\Admin\AppData\Local\Temp\843E.tmp"110⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\84EA.tmp"C:\Users\Admin\AppData\Local\Temp\84EA.tmp"111⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\85B5.tmp"C:\Users\Admin\AppData\Local\Temp\85B5.tmp"112⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\8690.tmp"C:\Users\Admin\AppData\Local\Temp\8690.tmp"113⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\875B.tmp"C:\Users\Admin\AppData\Local\Temp\875B.tmp"114⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\8826.tmp"C:\Users\Admin\AppData\Local\Temp\8826.tmp"115⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\88E2.tmp"C:\Users\Admin\AppData\Local\Temp\88E2.tmp"116⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\89DC.tmp"C:\Users\Admin\AppData\Local\Temp\89DC.tmp"117⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\8AB7.tmp"C:\Users\Admin\AppData\Local\Temp\8AB7.tmp"118⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"119⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\8C4D.tmp"C:\Users\Admin\AppData\Local\Temp\8C4D.tmp"120⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\8D37.tmp"C:\Users\Admin\AppData\Local\Temp\8D37.tmp"121⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\8DC4.tmp"C:\Users\Admin\AppData\Local\Temp\8DC4.tmp"122⤵PID:4864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-