Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 14:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe
-
Size
486KB
-
MD5
e8d590c05c529a5fbe448178a76995df
-
SHA1
7866fb32741a37c1e69442cb366b6e707af3ac2d
-
SHA256
78f2482b33dfef9f15b916971eef1dd50a32ea1733ad1c9aba1fd37743735316
-
SHA512
ad80dc6a579e3446ceeb086a2b71ceea39734d64bc50b324f25ad36fb781b3eb2fc8161ef532c8587f1b7b7522c1c36b8ae569e22ed40d67456862a4df546f71
-
SSDEEP
12288:oU5rCOTeiDL8y9yJS3Z5lsAKO3TkqFLg/YDaD+QAeNZ:oUQOJDL8Ir3vBDjlBS+eN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2852 4239.tmp 684 42A6.tmp 1324 540B.tmp 952 4381.tmp 3292 43CF.tmp 4856 441D.tmp 748 447B.tmp 2544 44C9.tmp 724 4517.tmp 4320 4565.tmp 3908 45B4.tmp 3840 4611.tmp 3800 466F.tmp 4788 5861.tmp 3932 470B.tmp 3516 4759.tmp 2252 47A8.tmp 3884 47F6.tmp 4552 4844.tmp 2876 4892.tmp 4784 5B20.tmp 4808 492E.tmp 216 497C.tmp 2476 49DA.tmp 880 4A28.tmp 4264 4A76.tmp 3184 5CE5.tmp 1148 4B13.tmp 4620 4B61.tmp 4720 4BCE.tmp 2324 4C1C.tmp 4612 5F75.tmp 3992 4CB8.tmp 4536 4D07.tmp 4056 4D55.tmp 1456 4DA3.tmp 4296 4DF1.tmp 2268 4E3F.tmp 2984 4E8D.tmp 1404 4EDB.tmp 892 4F29.tmp 3332 4F78.tmp 4816 4FC6.tmp 772 5014.tmp 3920 5062.tmp 2444 50B0.tmp 3632 50FE.tmp 1492 514C.tmp 4432 519A.tmp 404 51E9.tmp 568 5237.tmp 4288 5285.tmp 4456 52D3.tmp 4888 5321.tmp 1816 536F.tmp 1228 53BD.tmp 1324 540B.tmp 3452 545A.tmp 1064 54A8.tmp 2364 54F6.tmp 1660 5544.tmp 3976 55B1.tmp 636 55FF.tmp 2328 564E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2852 3096 2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe 85 PID 3096 wrote to memory of 2852 3096 2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe 85 PID 3096 wrote to memory of 2852 3096 2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe 85 PID 2852 wrote to memory of 684 2852 4239.tmp 86 PID 2852 wrote to memory of 684 2852 4239.tmp 86 PID 2852 wrote to memory of 684 2852 4239.tmp 86 PID 684 wrote to memory of 1324 684 42A6.tmp 120 PID 684 wrote to memory of 1324 684 42A6.tmp 120 PID 684 wrote to memory of 1324 684 42A6.tmp 120 PID 1324 wrote to memory of 952 1324 540B.tmp 88 PID 1324 wrote to memory of 952 1324 540B.tmp 88 PID 1324 wrote to memory of 952 1324 540B.tmp 88 PID 952 wrote to memory of 3292 952 4381.tmp 89 PID 952 wrote to memory of 3292 952 4381.tmp 89 PID 952 wrote to memory of 3292 952 4381.tmp 89 PID 3292 wrote to memory of 4856 3292 43CF.tmp 157 PID 3292 wrote to memory of 4856 3292 43CF.tmp 157 PID 3292 wrote to memory of 4856 3292 43CF.tmp 157 PID 4856 wrote to memory of 748 4856 441D.tmp 156 PID 4856 wrote to memory of 748 4856 441D.tmp 156 PID 4856 wrote to memory of 748 4856 441D.tmp 156 PID 748 wrote to memory of 2544 748 447B.tmp 90 PID 748 wrote to memory of 2544 748 447B.tmp 90 PID 748 wrote to memory of 2544 748 447B.tmp 90 PID 2544 wrote to memory of 724 2544 44C9.tmp 155 PID 2544 wrote to memory of 724 2544 44C9.tmp 155 PID 2544 wrote to memory of 724 2544 44C9.tmp 155 PID 724 wrote to memory of 4320 724 4517.tmp 154 PID 724 wrote to memory of 4320 724 4517.tmp 154 PID 724 wrote to memory of 4320 724 4517.tmp 154 PID 4320 wrote to memory of 3908 4320 4565.tmp 153 PID 4320 wrote to memory of 3908 4320 4565.tmp 153 PID 4320 wrote to memory of 3908 4320 4565.tmp 153 PID 3908 wrote to memory of 3840 3908 45B4.tmp 91 PID 3908 wrote to memory of 3840 3908 45B4.tmp 91 PID 3908 wrote to memory of 3840 3908 45B4.tmp 91 PID 3840 wrote to memory of 3800 3840 4611.tmp 152 PID 3840 wrote to memory of 3800 3840 4611.tmp 152 PID 3840 wrote to memory of 3800 3840 4611.tmp 152 PID 3800 wrote to memory of 4788 3800 466F.tmp 159 PID 3800 wrote to memory of 4788 3800 466F.tmp 159 PID 3800 wrote to memory of 4788 3800 466F.tmp 159 PID 4788 wrote to memory of 3932 4788 5861.tmp 150 PID 4788 wrote to memory of 3932 4788 5861.tmp 150 PID 4788 wrote to memory of 3932 4788 5861.tmp 150 PID 3932 wrote to memory of 3516 3932 470B.tmp 149 PID 3932 wrote to memory of 3516 3932 470B.tmp 149 PID 3932 wrote to memory of 3516 3932 470B.tmp 149 PID 3516 wrote to memory of 2252 3516 4759.tmp 147 PID 3516 wrote to memory of 2252 3516 4759.tmp 147 PID 3516 wrote to memory of 2252 3516 4759.tmp 147 PID 2252 wrote to memory of 3884 2252 47A8.tmp 92 PID 2252 wrote to memory of 3884 2252 47A8.tmp 92 PID 2252 wrote to memory of 3884 2252 47A8.tmp 92 PID 3884 wrote to memory of 4552 3884 47F6.tmp 146 PID 3884 wrote to memory of 4552 3884 47F6.tmp 146 PID 3884 wrote to memory of 4552 3884 47F6.tmp 146 PID 4552 wrote to memory of 2876 4552 4844.tmp 145 PID 4552 wrote to memory of 2876 4552 4844.tmp 145 PID 4552 wrote to memory of 2876 4552 4844.tmp 145 PID 2876 wrote to memory of 4784 2876 4892.tmp 168 PID 2876 wrote to memory of 4784 2876 4892.tmp 168 PID 2876 wrote to memory of 4784 2876 4892.tmp 168 PID 4784 wrote to memory of 4808 4784 5B20.tmp 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\4239.tmp"C:\Users\Admin\AppData\Local\Temp\4239.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\42A6.tmp"C:\Users\Admin\AppData\Local\Temp\42A6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\42F4.tmp"C:\Users\Admin\AppData\Local\Temp\42F4.tmp"4⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\4381.tmp"C:\Users\Admin\AppData\Local\Temp\4381.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\43CF.tmp"C:\Users\Admin\AppData\Local\Temp\43CF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\441D.tmp"C:\Users\Admin\AppData\Local\Temp\441D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"5⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\54A8.tmp"C:\Users\Admin\AppData\Local\Temp\54A8.tmp"6⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\54F6.tmp"C:\Users\Admin\AppData\Local\Temp\54F6.tmp"7⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\5544.tmp"C:\Users\Admin\AppData\Local\Temp\5544.tmp"8⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"9⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"10⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\564E.tmp"C:\Users\Admin\AppData\Local\Temp\564E.tmp"11⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\569C.tmp"C:\Users\Admin\AppData\Local\Temp\569C.tmp"12⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\56EA.tmp"C:\Users\Admin\AppData\Local\Temp\56EA.tmp"13⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\5738.tmp"C:\Users\Admin\AppData\Local\Temp\5738.tmp"14⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\5786.tmp"C:\Users\Admin\AppData\Local\Temp\5786.tmp"15⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\57C5.tmp"C:\Users\Admin\AppData\Local\Temp\57C5.tmp"16⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\5813.tmp"C:\Users\Admin\AppData\Local\Temp\5813.tmp"17⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\5861.tmp"C:\Users\Admin\AppData\Local\Temp\5861.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"19⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"20⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\594B.tmp"C:\Users\Admin\AppData\Local\Temp\594B.tmp"21⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"22⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"23⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"24⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"25⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"26⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\5B20.tmp"C:\Users\Admin\AppData\Local\Temp\5B20.tmp"27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"28⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"29⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"30⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\5C49.tmp"C:\Users\Admin\AppData\Local\Temp\5C49.tmp"31⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"32⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"33⤵
- Executes dropped EXE
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\5D33.tmp"C:\Users\Admin\AppData\Local\Temp\5D33.tmp"34⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"35⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"36⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"37⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"38⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\5F08.tmp"C:\Users\Admin\AppData\Local\Temp\5F08.tmp"39⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\5F75.tmp"C:\Users\Admin\AppData\Local\Temp\5F75.tmp"40⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\6012.tmp"C:\Users\Admin\AppData\Local\Temp\6012.tmp"41⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\609E.tmp"C:\Users\Admin\AppData\Local\Temp\609E.tmp"42⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\60FC.tmp"C:\Users\Admin\AppData\Local\Temp\60FC.tmp"43⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"44⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\61F6.tmp"C:\Users\Admin\AppData\Local\Temp\61F6.tmp"45⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"46⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\62D1.tmp"C:\Users\Admin\AppData\Local\Temp\62D1.tmp"47⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\632E.tmp"C:\Users\Admin\AppData\Local\Temp\632E.tmp"48⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\638C.tmp"C:\Users\Admin\AppData\Local\Temp\638C.tmp"49⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"50⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\6477.tmp"C:\Users\Admin\AppData\Local\Temp\6477.tmp"51⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\6522.tmp"C:\Users\Admin\AppData\Local\Temp\6522.tmp"52⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\65BF.tmp"C:\Users\Admin\AppData\Local\Temp\65BF.tmp"53⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"54⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\66D8.tmp"C:\Users\Admin\AppData\Local\Temp\66D8.tmp"55⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\6726.tmp"C:\Users\Admin\AppData\Local\Temp\6726.tmp"56⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\6784.tmp"C:\Users\Admin\AppData\Local\Temp\6784.tmp"57⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\67E2.tmp"C:\Users\Admin\AppData\Local\Temp\67E2.tmp"58⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\683F.tmp"C:\Users\Admin\AppData\Local\Temp\683F.tmp"59⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\688D.tmp"C:\Users\Admin\AppData\Local\Temp\688D.tmp"60⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\68DC.tmp"C:\Users\Admin\AppData\Local\Temp\68DC.tmp"61⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\692A.tmp"C:\Users\Admin\AppData\Local\Temp\692A.tmp"62⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\6978.tmp"C:\Users\Admin\AppData\Local\Temp\6978.tmp"63⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\69D6.tmp"C:\Users\Admin\AppData\Local\Temp\69D6.tmp"64⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"65⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\6A81.tmp"C:\Users\Admin\AppData\Local\Temp\6A81.tmp"66⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"67⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"68⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"69⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"70⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"71⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"72⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"73⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\6D31.tmp"C:\Users\Admin\AppData\Local\Temp\6D31.tmp"74⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"75⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"76⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"77⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\6E98.tmp"C:\Users\Admin\AppData\Local\Temp\6E98.tmp"78⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"79⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\6F35.tmp"C:\Users\Admin\AppData\Local\Temp\6F35.tmp"80⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"81⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"82⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\703E.tmp"C:\Users\Admin\AppData\Local\Temp\703E.tmp"83⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\709C.tmp"C:\Users\Admin\AppData\Local\Temp\709C.tmp"84⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\70FA.tmp"C:\Users\Admin\AppData\Local\Temp\70FA.tmp"85⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\7148.tmp"C:\Users\Admin\AppData\Local\Temp\7148.tmp"86⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\71A6.tmp"C:\Users\Admin\AppData\Local\Temp\71A6.tmp"87⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\71F4.tmp"C:\Users\Admin\AppData\Local\Temp\71F4.tmp"88⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\7242.tmp"C:\Users\Admin\AppData\Local\Temp\7242.tmp"89⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\7290.tmp"C:\Users\Admin\AppData\Local\Temp\7290.tmp"90⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\72EE.tmp"C:\Users\Admin\AppData\Local\Temp\72EE.tmp"91⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\734B.tmp"C:\Users\Admin\AppData\Local\Temp\734B.tmp"92⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\73A9.tmp"C:\Users\Admin\AppData\Local\Temp\73A9.tmp"93⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\7407.tmp"C:\Users\Admin\AppData\Local\Temp\7407.tmp"94⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\7455.tmp"C:\Users\Admin\AppData\Local\Temp\7455.tmp"95⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\74A3.tmp"C:\Users\Admin\AppData\Local\Temp\74A3.tmp"96⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"97⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"98⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\758E.tmp"C:\Users\Admin\AppData\Local\Temp\758E.tmp"99⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\75DC.tmp"C:\Users\Admin\AppData\Local\Temp\75DC.tmp"100⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\762A.tmp"C:\Users\Admin\AppData\Local\Temp\762A.tmp"101⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"102⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"103⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"104⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"105⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"106⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\782D.tmp"C:\Users\Admin\AppData\Local\Temp\782D.tmp"107⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"108⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"109⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\7918.tmp"C:\Users\Admin\AppData\Local\Temp\7918.tmp"110⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"111⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\79E3.tmp"C:\Users\Admin\AppData\Local\Temp\79E3.tmp"112⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\7A41.tmp"C:\Users\Admin\AppData\Local\Temp\7A41.tmp"113⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"114⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"115⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"116⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\7B98.tmp"C:\Users\Admin\AppData\Local\Temp\7B98.tmp"117⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"118⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\7C35.tmp"C:\Users\Admin\AppData\Local\Temp\7C35.tmp"119⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\7C92.tmp"C:\Users\Admin\AppData\Local\Temp\7C92.tmp"120⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"121⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"122⤵PID:2544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-