Analysis
-
max time kernel
152s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 10:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe
-
Size
486KB
-
MD5
7deb039f4ff4cbd6510963fc512701bf
-
SHA1
92423fa348e07025c9dcb68e033e8fbbca00de10
-
SHA256
750ef6def1bbbbb09cfc8244cd2121b2610d1bfae302646e069a17ec2ba8cf81
-
SHA512
2d5e5f5fda6148103296c5e4a1ceeb57bd4715a748f68c4678b55fdcd3ab11f32bbf5e506dcb8359a31231e6c264fee0fa5740b8e5c92edb01bdbfecf8e83dd6
-
SSDEEP
12288:/U5rCOTeiDVdmHBtiGzpuGvnI8fF8YJsO1NZ:/UQOJDVd4BPkInxdvJsCN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 232 1C0F.tmp 1832 1DA5.tmp 3248 1E70.tmp 4944 1F5A.tmp 2404 1FD7.tmp 4960 20A2.tmp 4232 214E.tmp 3888 2229.tmp 4808 22E5.tmp 2624 23BF.tmp 1000 24D9.tmp 456 25B3.tmp 3980 269E.tmp 2252 2778.tmp 4612 2834.tmp 3040 29CA.tmp 3856 2AB5.tmp 2808 2B80.tmp 4180 2C4B.tmp 4324 2D35.tmp 3396 2E10.tmp 1792 2F0A.tmp 1408 3014.tmp 4964 30FE.tmp 5096 3302.tmp 3680 340B.tmp 3848 3563.tmp 3656 367C.tmp 1500 3757.tmp 4832 3851.tmp 856 3989.tmp 1288 3A64.tmp 1816 3B00.tmp 3408 3B9D.tmp 1512 3C29.tmp 876 3CB6.tmp 4308 3D23.tmp 3340 3DA0.tmp 3292 3E1D.tmp 1280 3EAA.tmp 2888 3F46.tmp 100 3FD3.tmp 4628 409E.tmp 4364 412B.tmp 4384 41B7.tmp 4692 4263.tmp 4460 430F.tmp 3460 43BB.tmp 1488 4438.tmp 180 44C4.tmp 3756 4570.tmp 1712 45DE.tmp 436 4699.tmp 3044 4726.tmp 2356 47B2.tmp 316 483F.tmp 4552 48AC.tmp 208 4958.tmp 4748 49F5.tmp 4808 4A81.tmp 4716 4B0E.tmp 3464 4BAA.tmp 4416 4C37.tmp 3980 4CD3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 232 2948 2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe 88 PID 2948 wrote to memory of 232 2948 2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe 88 PID 2948 wrote to memory of 232 2948 2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe 88 PID 232 wrote to memory of 1832 232 1C0F.tmp 89 PID 232 wrote to memory of 1832 232 1C0F.tmp 89 PID 232 wrote to memory of 1832 232 1C0F.tmp 89 PID 1832 wrote to memory of 3248 1832 1DA5.tmp 90 PID 1832 wrote to memory of 3248 1832 1DA5.tmp 90 PID 1832 wrote to memory of 3248 1832 1DA5.tmp 90 PID 3248 wrote to memory of 4944 3248 1E70.tmp 91 PID 3248 wrote to memory of 4944 3248 1E70.tmp 91 PID 3248 wrote to memory of 4944 3248 1E70.tmp 91 PID 4944 wrote to memory of 2404 4944 1F5A.tmp 92 PID 4944 wrote to memory of 2404 4944 1F5A.tmp 92 PID 4944 wrote to memory of 2404 4944 1F5A.tmp 92 PID 2404 wrote to memory of 4960 2404 1FD7.tmp 93 PID 2404 wrote to memory of 4960 2404 1FD7.tmp 93 PID 2404 wrote to memory of 4960 2404 1FD7.tmp 93 PID 4960 wrote to memory of 4232 4960 20A2.tmp 94 PID 4960 wrote to memory of 4232 4960 20A2.tmp 94 PID 4960 wrote to memory of 4232 4960 20A2.tmp 94 PID 4232 wrote to memory of 3888 4232 214E.tmp 95 PID 4232 wrote to memory of 3888 4232 214E.tmp 95 PID 4232 wrote to memory of 3888 4232 214E.tmp 95 PID 3888 wrote to memory of 4808 3888 2229.tmp 96 PID 3888 wrote to memory of 4808 3888 2229.tmp 96 PID 3888 wrote to memory of 4808 3888 2229.tmp 96 PID 4808 wrote to memory of 2624 4808 22E5.tmp 97 PID 4808 wrote to memory of 2624 4808 22E5.tmp 97 PID 4808 wrote to memory of 2624 4808 22E5.tmp 97 PID 2624 wrote to memory of 1000 2624 23BF.tmp 98 PID 2624 wrote to memory of 1000 2624 23BF.tmp 98 PID 2624 wrote to memory of 1000 2624 23BF.tmp 98 PID 1000 wrote to memory of 456 1000 24D9.tmp 99 PID 1000 wrote to memory of 456 1000 24D9.tmp 99 PID 1000 wrote to memory of 456 1000 24D9.tmp 99 PID 456 wrote to memory of 3980 456 25B3.tmp 100 PID 456 wrote to memory of 3980 456 25B3.tmp 100 PID 456 wrote to memory of 3980 456 25B3.tmp 100 PID 3980 wrote to memory of 2252 3980 269E.tmp 101 PID 3980 wrote to memory of 2252 3980 269E.tmp 101 PID 3980 wrote to memory of 2252 3980 269E.tmp 101 PID 2252 wrote to memory of 4612 2252 2778.tmp 102 PID 2252 wrote to memory of 4612 2252 2778.tmp 102 PID 2252 wrote to memory of 4612 2252 2778.tmp 102 PID 4612 wrote to memory of 3040 4612 2834.tmp 103 PID 4612 wrote to memory of 3040 4612 2834.tmp 103 PID 4612 wrote to memory of 3040 4612 2834.tmp 103 PID 3040 wrote to memory of 3856 3040 29CA.tmp 104 PID 3040 wrote to memory of 3856 3040 29CA.tmp 104 PID 3040 wrote to memory of 3856 3040 29CA.tmp 104 PID 3856 wrote to memory of 2808 3856 2AB5.tmp 105 PID 3856 wrote to memory of 2808 3856 2AB5.tmp 105 PID 3856 wrote to memory of 2808 3856 2AB5.tmp 105 PID 2808 wrote to memory of 4180 2808 2B80.tmp 106 PID 2808 wrote to memory of 4180 2808 2B80.tmp 106 PID 2808 wrote to memory of 4180 2808 2B80.tmp 106 PID 4180 wrote to memory of 4324 4180 2C4B.tmp 107 PID 4180 wrote to memory of 4324 4180 2C4B.tmp 107 PID 4180 wrote to memory of 4324 4180 2C4B.tmp 107 PID 4324 wrote to memory of 3396 4324 2D35.tmp 108 PID 4324 wrote to memory of 3396 4324 2D35.tmp 108 PID 4324 wrote to memory of 3396 4324 2D35.tmp 108 PID 3396 wrote to memory of 1792 3396 2E10.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_7deb039f4ff4cbd6510963fc512701bf_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\20A2.tmp"C:\Users\Admin\AppData\Local\Temp\20A2.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\2229.tmp"C:\Users\Admin\AppData\Local\Temp\2229.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\269E.tmp"C:\Users\Admin\AppData\Local\Temp\269E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\2834.tmp"C:\Users\Admin\AppData\Local\Temp\2834.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\2B80.tmp"C:\Users\Admin\AppData\Local\Temp\2B80.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"23⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\3014.tmp"C:\Users\Admin\AppData\Local\Temp\3014.tmp"24⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\30FE.tmp"C:\Users\Admin\AppData\Local\Temp\30FE.tmp"25⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"26⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"27⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\3563.tmp"C:\Users\Admin\AppData\Local\Temp\3563.tmp"28⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"29⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\3757.tmp"C:\Users\Admin\AppData\Local\Temp\3757.tmp"30⤵
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"31⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"32⤵
- Executes dropped EXE
PID:856 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"33⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"34⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"35⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"36⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"37⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"38⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"39⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"40⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"41⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"42⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"43⤵
- Executes dropped EXE
PID:100 -
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"44⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"45⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"46⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp"47⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\430F.tmp"C:\Users\Admin\AppData\Local\Temp\430F.tmp"48⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\43BB.tmp"C:\Users\Admin\AppData\Local\Temp\43BB.tmp"49⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"50⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\44C4.tmp"C:\Users\Admin\AppData\Local\Temp\44C4.tmp"51⤵
- Executes dropped EXE
PID:180 -
C:\Users\Admin\AppData\Local\Temp\4570.tmp"C:\Users\Admin\AppData\Local\Temp\4570.tmp"52⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"53⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"54⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\4726.tmp"C:\Users\Admin\AppData\Local\Temp\4726.tmp"55⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"56⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"57⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\48AC.tmp"C:\Users\Admin\AppData\Local\Temp\48AC.tmp"58⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"59⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"60⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"61⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"62⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"63⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\4C37.tmp"C:\Users\Admin\AppData\Local\Temp\4C37.tmp"64⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"65⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"66⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"67⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"68⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp"69⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"70⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"71⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\50BB.tmp"C:\Users\Admin\AppData\Local\Temp\50BB.tmp"72⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\5138.tmp"C:\Users\Admin\AppData\Local\Temp\5138.tmp"73⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\51D4.tmp"C:\Users\Admin\AppData\Local\Temp\51D4.tmp"74⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"75⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"76⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"77⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"78⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\5436.tmp"C:\Users\Admin\AppData\Local\Temp\5436.tmp"79⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\54C2.tmp"C:\Users\Admin\AppData\Local\Temp\54C2.tmp"80⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\554F.tmp"C:\Users\Admin\AppData\Local\Temp\554F.tmp"81⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\55DB.tmp"C:\Users\Admin\AppData\Local\Temp\55DB.tmp"82⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"83⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"84⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\5743.tmp"C:\Users\Admin\AppData\Local\Temp\5743.tmp"85⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\57B0.tmp"C:\Users\Admin\AppData\Local\Temp\57B0.tmp"86⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\583D.tmp"C:\Users\Admin\AppData\Local\Temp\583D.tmp"87⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"88⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"89⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp"90⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"91⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"92⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\5B89.tmp"C:\Users\Admin\AppData\Local\Temp\5B89.tmp"93⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"94⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\5C63.tmp"C:\Users\Admin\AppData\Local\Temp\5C63.tmp"95⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"96⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\5DAB.tmp"C:\Users\Admin\AppData\Local\Temp\5DAB.tmp"97⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\5E38.tmp"C:\Users\Admin\AppData\Local\Temp\5E38.tmp"98⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"99⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\5F32.tmp"C:\Users\Admin\AppData\Local\Temp\5F32.tmp"100⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"101⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\606B.tmp"C:\Users\Admin\AppData\Local\Temp\606B.tmp"102⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\60F7.tmp"C:\Users\Admin\AppData\Local\Temp\60F7.tmp"103⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\6174.tmp"C:\Users\Admin\AppData\Local\Temp\6174.tmp"104⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"105⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\62CC.tmp"C:\Users\Admin\AppData\Local\Temp\62CC.tmp"106⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\6359.tmp"C:\Users\Admin\AppData\Local\Temp\6359.tmp"107⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\63C6.tmp"C:\Users\Admin\AppData\Local\Temp\63C6.tmp"108⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"109⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\64B0.tmp"C:\Users\Admin\AppData\Local\Temp\64B0.tmp"110⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\653D.tmp"C:\Users\Admin\AppData\Local\Temp\653D.tmp"111⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\65AA.tmp"C:\Users\Admin\AppData\Local\Temp\65AA.tmp"112⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"113⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\66E3.tmp"C:\Users\Admin\AppData\Local\Temp\66E3.tmp"114⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\6760.tmp"C:\Users\Admin\AppData\Local\Temp\6760.tmp"115⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\67DD.tmp"C:\Users\Admin\AppData\Local\Temp\67DD.tmp"116⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\684A.tmp"C:\Users\Admin\AppData\Local\Temp\684A.tmp"117⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\68D7.tmp"C:\Users\Admin\AppData\Local\Temp\68D7.tmp"118⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"119⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\6A1F.tmp"C:\Users\Admin\AppData\Local\Temp\6A1F.tmp"120⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\6AAC.tmp"C:\Users\Admin\AppData\Local\Temp\6AAC.tmp"121⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\6B38.tmp"C:\Users\Admin\AppData\Local\Temp\6B38.tmp"122⤵PID:3736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-