Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 02:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe
-
Size
488KB
-
MD5
1b14a4d88dff487dbefab3889ba4158f
-
SHA1
6e5296df743373cf8cb60d6b241b00dba9f1ccc6
-
SHA256
9abd85fed623744654d926598ca200041d01503566ea83eefcb8a973fc1f2cea
-
SHA512
793cf8266e63a8b793b551636c7fc37c1dc500a08b3f1a5760ff2d8956be7ef6ec761849701c6cd50244c2f00c98733ed824eac8e23de86a5abe9235f6865453
-
SSDEEP
12288:/U5rCOTeiD363pj+u0bfzbAMTciuKNNZ:/UQOJDq3r0jzyKNN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 488 6B2.tmp 1156 DB7.tmp 2212 EA1.tmp 4428 FBA.tmp 4384 10F3.tmp 2632 11AE.tmp 1068 13A2.tmp 3024 14AC.tmp 3232 15C5.tmp 3652 16B0.tmp 2804 174C.tmp 3252 1846.tmp 684 1930.tmp 1764 19DC.tmp 2368 1A69.tmp 4588 1B15.tmp 4036 1BB1.tmp 2444 1C6C.tmp 392 1D76.tmp 1744 1E31.tmp 1392 1F0C.tmp 2756 1FD7.tmp 2284 213F.tmp 1684 2287.tmp 3872 2381.tmp 3204 246B.tmp 3684 2507.tmp 5084 2584.tmp 680 268E.tmp 2840 2759.tmp 3068 2863.tmp 2824 291E.tmp 4504 2A95.tmp 3508 2B12.tmp 656 2CD7.tmp 2564 2E7D.tmp 4044 2F29.tmp 4324 2FA6.tmp 4520 3023.tmp 396 30B0.tmp 4460 317B.tmp 2656 31E8.tmp 3888 3265.tmp 116 32F2.tmp 1696 338E.tmp 3752 33FC.tmp 4408 34A7.tmp 3160 3534.tmp 1572 35C1.tmp 3828 365D.tmp 1156 3718.tmp 4076 3795.tmp 772 3841.tmp 2440 38AF.tmp 4092 392C.tmp 932 39B8.tmp 2188 3A45.tmp 3232 3AD2.tmp 408 3B5E.tmp 2804 3BEB.tmp 3756 3C87.tmp 780 3CF4.tmp 2508 3D71.tmp 3308 3E3D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 488 4876 2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe 88 PID 4876 wrote to memory of 488 4876 2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe 88 PID 4876 wrote to memory of 488 4876 2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe 88 PID 488 wrote to memory of 1156 488 6B2.tmp 89 PID 488 wrote to memory of 1156 488 6B2.tmp 89 PID 488 wrote to memory of 1156 488 6B2.tmp 89 PID 1156 wrote to memory of 2212 1156 DB7.tmp 90 PID 1156 wrote to memory of 2212 1156 DB7.tmp 90 PID 1156 wrote to memory of 2212 1156 DB7.tmp 90 PID 2212 wrote to memory of 4428 2212 EA1.tmp 91 PID 2212 wrote to memory of 4428 2212 EA1.tmp 91 PID 2212 wrote to memory of 4428 2212 EA1.tmp 91 PID 4428 wrote to memory of 4384 4428 FBA.tmp 92 PID 4428 wrote to memory of 4384 4428 FBA.tmp 92 PID 4428 wrote to memory of 4384 4428 FBA.tmp 92 PID 4384 wrote to memory of 2632 4384 10F3.tmp 93 PID 4384 wrote to memory of 2632 4384 10F3.tmp 93 PID 4384 wrote to memory of 2632 4384 10F3.tmp 93 PID 2632 wrote to memory of 1068 2632 11AE.tmp 94 PID 2632 wrote to memory of 1068 2632 11AE.tmp 94 PID 2632 wrote to memory of 1068 2632 11AE.tmp 94 PID 1068 wrote to memory of 3024 1068 13A2.tmp 95 PID 1068 wrote to memory of 3024 1068 13A2.tmp 95 PID 1068 wrote to memory of 3024 1068 13A2.tmp 95 PID 3024 wrote to memory of 3232 3024 14AC.tmp 96 PID 3024 wrote to memory of 3232 3024 14AC.tmp 96 PID 3024 wrote to memory of 3232 3024 14AC.tmp 96 PID 3232 wrote to memory of 3652 3232 15C5.tmp 97 PID 3232 wrote to memory of 3652 3232 15C5.tmp 97 PID 3232 wrote to memory of 3652 3232 15C5.tmp 97 PID 3652 wrote to memory of 2804 3652 16B0.tmp 98 PID 3652 wrote to memory of 2804 3652 16B0.tmp 98 PID 3652 wrote to memory of 2804 3652 16B0.tmp 98 PID 2804 wrote to memory of 3252 2804 174C.tmp 99 PID 2804 wrote to memory of 3252 2804 174C.tmp 99 PID 2804 wrote to memory of 3252 2804 174C.tmp 99 PID 3252 wrote to memory of 684 3252 1846.tmp 100 PID 3252 wrote to memory of 684 3252 1846.tmp 100 PID 3252 wrote to memory of 684 3252 1846.tmp 100 PID 684 wrote to memory of 1764 684 1930.tmp 101 PID 684 wrote to memory of 1764 684 1930.tmp 101 PID 684 wrote to memory of 1764 684 1930.tmp 101 PID 1764 wrote to memory of 2368 1764 19DC.tmp 102 PID 1764 wrote to memory of 2368 1764 19DC.tmp 102 PID 1764 wrote to memory of 2368 1764 19DC.tmp 102 PID 2368 wrote to memory of 4588 2368 1A69.tmp 103 PID 2368 wrote to memory of 4588 2368 1A69.tmp 103 PID 2368 wrote to memory of 4588 2368 1A69.tmp 103 PID 4588 wrote to memory of 4036 4588 1B15.tmp 104 PID 4588 wrote to memory of 4036 4588 1B15.tmp 104 PID 4588 wrote to memory of 4036 4588 1B15.tmp 104 PID 4036 wrote to memory of 2444 4036 1BB1.tmp 105 PID 4036 wrote to memory of 2444 4036 1BB1.tmp 105 PID 4036 wrote to memory of 2444 4036 1BB1.tmp 105 PID 2444 wrote to memory of 392 2444 1C6C.tmp 106 PID 2444 wrote to memory of 392 2444 1C6C.tmp 106 PID 2444 wrote to memory of 392 2444 1C6C.tmp 106 PID 392 wrote to memory of 1744 392 1D76.tmp 107 PID 392 wrote to memory of 1744 392 1D76.tmp 107 PID 392 wrote to memory of 1744 392 1D76.tmp 107 PID 1744 wrote to memory of 1392 1744 1E31.tmp 108 PID 1744 wrote to memory of 1392 1744 1E31.tmp 108 PID 1744 wrote to memory of 1392 1744 1E31.tmp 108 PID 1392 wrote to memory of 2756 1392 1F0C.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_1b14a4d88dff487dbefab3889ba4158f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\DB7.tmp"C:\Users\Admin\AppData\Local\Temp\DB7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\14AC.tmp"C:\Users\Admin\AppData\Local\Temp\14AC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\16B0.tmp"C:\Users\Admin\AppData\Local\Temp\16B0.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\174C.tmp"C:\Users\Admin\AppData\Local\Temp\174C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1846.tmp"C:\Users\Admin\AppData\Local\Temp\1846.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\19DC.tmp"C:\Users\Admin\AppData\Local\Temp\19DC.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\1D76.tmp"C:\Users\Admin\AppData\Local\Temp\1D76.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"23⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"24⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\2287.tmp"C:\Users\Admin\AppData\Local\Temp\2287.tmp"25⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"26⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"27⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"28⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"29⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\268E.tmp"C:\Users\Admin\AppData\Local\Temp\268E.tmp"30⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"31⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\2863.tmp"C:\Users\Admin\AppData\Local\Temp\2863.tmp"32⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\291E.tmp"C:\Users\Admin\AppData\Local\Temp\291E.tmp"33⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"34⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"35⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"36⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"37⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"38⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"39⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3023.tmp"C:\Users\Admin\AppData\Local\Temp\3023.tmp"40⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"41⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"42⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\31E8.tmp"C:\Users\Admin\AppData\Local\Temp\31E8.tmp"43⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\3265.tmp"C:\Users\Admin\AppData\Local\Temp\3265.tmp"44⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"45⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"46⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"47⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"48⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"49⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"50⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"51⤵
- Executes dropped EXE
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"52⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"53⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\3841.tmp"C:\Users\Admin\AppData\Local\Temp\3841.tmp"54⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"55⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"56⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"57⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"58⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"59⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"60⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"61⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"62⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"63⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"64⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"65⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"66⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"67⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"68⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"69⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"70⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"71⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\42D0.tmp"C:\Users\Admin\AppData\Local\Temp\42D0.tmp"72⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"73⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"74⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"75⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\4561.tmp"C:\Users\Admin\AppData\Local\Temp\4561.tmp"76⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\45ED.tmp"C:\Users\Admin\AppData\Local\Temp\45ED.tmp"77⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"78⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\4707.tmp"C:\Users\Admin\AppData\Local\Temp\4707.tmp"79⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"80⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"81⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"82⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\4968.tmp"C:\Users\Admin\AppData\Local\Temp\4968.tmp"83⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\49D5.tmp"C:\Users\Admin\AppData\Local\Temp\49D5.tmp"84⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\4A43.tmp"C:\Users\Admin\AppData\Local\Temp\4A43.tmp"85⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"86⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"87⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"88⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"89⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"90⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"91⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"92⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\4E79.tmp"C:\Users\Admin\AppData\Local\Temp\4E79.tmp"93⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"94⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"95⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"96⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\5109.tmp"C:\Users\Admin\AppData\Local\Temp\5109.tmp"97⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\51A5.tmp"C:\Users\Admin\AppData\Local\Temp\51A5.tmp"98⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"99⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"100⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"101⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"102⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"103⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\54F1.tmp"C:\Users\Admin\AppData\Local\Temp\54F1.tmp"104⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\557E.tmp"C:\Users\Admin\AppData\Local\Temp\557E.tmp"105⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\55EB.tmp"C:\Users\Admin\AppData\Local\Temp\55EB.tmp"106⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"107⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"108⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"109⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\580E.tmp"C:\Users\Admin\AppData\Local\Temp\580E.tmp"110⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\588B.tmp"C:\Users\Admin\AppData\Local\Temp\588B.tmp"111⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\5908.tmp"C:\Users\Admin\AppData\Local\Temp\5908.tmp"112⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp"113⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\5A31.tmp"C:\Users\Admin\AppData\Local\Temp\5A31.tmp"114⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"115⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"116⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"117⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\5C63.tmp"C:\Users\Admin\AppData\Local\Temp\5C63.tmp"118⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"119⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"120⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"121⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"122⤵PID:4752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-