Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 12:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe
-
Size
765KB
-
MD5
afd7fb338191534d916d82353bd5655a
-
SHA1
d91ed2afc679e7fe8685b68dc25d8db4b0d3d9ac
-
SHA256
5d87f81ef794bca39b101e9b422ec41e627879c84b26ed13cb78e838a9f5f452
-
SHA512
895f4d6a82207f1434447cf0383d17ea467bc41e9ee523386eb0e1a59e62daaef11271a4d97ad2cc9f9620b73d53d3159223e4565f53061900d1b4cb948cc6a3
-
SSDEEP
12288:ZU5rCOTeiDa/JbzZpEWY7JeZdCyQ7l3ZF5rn5rLOa54U5w5A:ZUQOJDaNIWY7oCya3vh5Oa+UOS
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2116 2ECB.tmp 4688 3275.tmp 4060 33EC.tmp 3904 3582.tmp 3164 3767.tmp 4780 38DE.tmp 724 3AC2.tmp 2152 3B7D.tmp 3360 3C58.tmp 1908 3D33.tmp 5048 3E5C.tmp 2208 3F65.tmp 3776 41E6.tmp 3016 434D.tmp 3712 4447.tmp 2352 44F3.tmp 2736 4707.tmp 264 4968.tmp 2724 4A23.tmp 2232 4B0E.tmp 2276 4C08.tmp 2672 4CB4.tmp 880 4D6F.tmp 4992 4EC7.tmp 1976 4FA2.tmp 456 507C.tmp 4944 5167.tmp 464 5290.tmp 4076 537A.tmp 1592 5436.tmp 676 5530.tmp 432 56C6.tmp 3876 5781.tmp 1984 580E.tmp 2284 58D9.tmp 208 59C3.tmp 4524 5A50.tmp 4892 5B2B.tmp 3808 5BD7.tmp 3784 5C54.tmp 2128 5CF0.tmp 1516 5D9C.tmp 1248 5E38.tmp 1968 5EB5.tmp 2180 5F61.tmp 540 5FFD.tmp 1948 6099.tmp 976 6155.tmp 5000 61D2.tmp 4584 625F.tmp 3340 62FB.tmp 1856 6378.tmp 1068 6404.tmp 2668 6491.tmp 372 651E.tmp 1544 65AA.tmp 4416 6627.tmp 3524 6695.tmp 4796 6721.tmp 1020 679E.tmp 32 683B.tmp 4344 68C7.tmp 3940 6954.tmp 4844 69F0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2116 4764 2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe 84 PID 4764 wrote to memory of 2116 4764 2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe 84 PID 4764 wrote to memory of 2116 4764 2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe 84 PID 2116 wrote to memory of 4688 2116 2ECB.tmp 85 PID 2116 wrote to memory of 4688 2116 2ECB.tmp 85 PID 2116 wrote to memory of 4688 2116 2ECB.tmp 85 PID 4688 wrote to memory of 4060 4688 3275.tmp 86 PID 4688 wrote to memory of 4060 4688 3275.tmp 86 PID 4688 wrote to memory of 4060 4688 3275.tmp 86 PID 4060 wrote to memory of 3904 4060 33EC.tmp 87 PID 4060 wrote to memory of 3904 4060 33EC.tmp 87 PID 4060 wrote to memory of 3904 4060 33EC.tmp 87 PID 3904 wrote to memory of 3164 3904 3582.tmp 88 PID 3904 wrote to memory of 3164 3904 3582.tmp 88 PID 3904 wrote to memory of 3164 3904 3582.tmp 88 PID 3164 wrote to memory of 4780 3164 3767.tmp 89 PID 3164 wrote to memory of 4780 3164 3767.tmp 89 PID 3164 wrote to memory of 4780 3164 3767.tmp 89 PID 4780 wrote to memory of 724 4780 38DE.tmp 90 PID 4780 wrote to memory of 724 4780 38DE.tmp 90 PID 4780 wrote to memory of 724 4780 38DE.tmp 90 PID 724 wrote to memory of 2152 724 3AC2.tmp 91 PID 724 wrote to memory of 2152 724 3AC2.tmp 91 PID 724 wrote to memory of 2152 724 3AC2.tmp 91 PID 2152 wrote to memory of 3360 2152 3B7D.tmp 92 PID 2152 wrote to memory of 3360 2152 3B7D.tmp 92 PID 2152 wrote to memory of 3360 2152 3B7D.tmp 92 PID 3360 wrote to memory of 1908 3360 3C58.tmp 93 PID 3360 wrote to memory of 1908 3360 3C58.tmp 93 PID 3360 wrote to memory of 1908 3360 3C58.tmp 93 PID 1908 wrote to memory of 5048 1908 3D33.tmp 94 PID 1908 wrote to memory of 5048 1908 3D33.tmp 94 PID 1908 wrote to memory of 5048 1908 3D33.tmp 94 PID 5048 wrote to memory of 2208 5048 3E5C.tmp 95 PID 5048 wrote to memory of 2208 5048 3E5C.tmp 95 PID 5048 wrote to memory of 2208 5048 3E5C.tmp 95 PID 2208 wrote to memory of 3776 2208 3F65.tmp 96 PID 2208 wrote to memory of 3776 2208 3F65.tmp 96 PID 2208 wrote to memory of 3776 2208 3F65.tmp 96 PID 3776 wrote to memory of 3016 3776 41E6.tmp 97 PID 3776 wrote to memory of 3016 3776 41E6.tmp 97 PID 3776 wrote to memory of 3016 3776 41E6.tmp 97 PID 3016 wrote to memory of 3712 3016 434D.tmp 98 PID 3016 wrote to memory of 3712 3016 434D.tmp 98 PID 3016 wrote to memory of 3712 3016 434D.tmp 98 PID 3712 wrote to memory of 2352 3712 4447.tmp 99 PID 3712 wrote to memory of 2352 3712 4447.tmp 99 PID 3712 wrote to memory of 2352 3712 4447.tmp 99 PID 2352 wrote to memory of 2736 2352 44F3.tmp 100 PID 2352 wrote to memory of 2736 2352 44F3.tmp 100 PID 2352 wrote to memory of 2736 2352 44F3.tmp 100 PID 2736 wrote to memory of 264 2736 4707.tmp 101 PID 2736 wrote to memory of 264 2736 4707.tmp 101 PID 2736 wrote to memory of 264 2736 4707.tmp 101 PID 264 wrote to memory of 2724 264 4968.tmp 102 PID 264 wrote to memory of 2724 264 4968.tmp 102 PID 264 wrote to memory of 2724 264 4968.tmp 102 PID 2724 wrote to memory of 2232 2724 4A23.tmp 103 PID 2724 wrote to memory of 2232 2724 4A23.tmp 103 PID 2724 wrote to memory of 2232 2724 4A23.tmp 103 PID 2232 wrote to memory of 2276 2232 4B0E.tmp 104 PID 2232 wrote to memory of 2276 2232 4B0E.tmp 104 PID 2232 wrote to memory of 2276 2232 4B0E.tmp 104 PID 2276 wrote to memory of 2672 2276 4C08.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_afd7fb338191534d916d82353bd5655a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\41E6.tmp"C:\Users\Admin\AppData\Local\Temp\41E6.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\4707.tmp"C:\Users\Admin\AppData\Local\Temp\4707.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\4968.tmp"C:\Users\Admin\AppData\Local\Temp\4968.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\4C08.tmp"C:\Users\Admin\AppData\Local\Temp\4C08.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"23⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"24⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"25⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\4FA2.tmp"C:\Users\Admin\AppData\Local\Temp\4FA2.tmp"26⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"27⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\5167.tmp"C:\Users\Admin\AppData\Local\Temp\5167.tmp"28⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"29⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\537A.tmp"C:\Users\Admin\AppData\Local\Temp\537A.tmp"30⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\5436.tmp"C:\Users\Admin\AppData\Local\Temp\5436.tmp"31⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\5530.tmp"C:\Users\Admin\AppData\Local\Temp\5530.tmp"32⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\Temp\56C6.tmp"C:\Users\Admin\AppData\Local\Temp\56C6.tmp"33⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"34⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\580E.tmp"C:\Users\Admin\AppData\Local\Temp\580E.tmp"35⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"36⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\59C3.tmp"C:\Users\Admin\AppData\Local\Temp\59C3.tmp"37⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\5A50.tmp"C:\Users\Admin\AppData\Local\Temp\5A50.tmp"38⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"39⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"40⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\5C54.tmp"C:\Users\Admin\AppData\Local\Temp\5C54.tmp"41⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"42⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"43⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\5E38.tmp"C:\Users\Admin\AppData\Local\Temp\5E38.tmp"44⤵
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"45⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\5F61.tmp"C:\Users\Admin\AppData\Local\Temp\5F61.tmp"46⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\5FFD.tmp"C:\Users\Admin\AppData\Local\Temp\5FFD.tmp"47⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\6099.tmp"C:\Users\Admin\AppData\Local\Temp\6099.tmp"48⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\6155.tmp"C:\Users\Admin\AppData\Local\Temp\6155.tmp"49⤵
- Executes dropped EXE
PID:976 -
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"50⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\625F.tmp"C:\Users\Admin\AppData\Local\Temp\625F.tmp"51⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"52⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\6378.tmp"C:\Users\Admin\AppData\Local\Temp\6378.tmp"53⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\6404.tmp"C:\Users\Admin\AppData\Local\Temp\6404.tmp"54⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\6491.tmp"C:\Users\Admin\AppData\Local\Temp\6491.tmp"55⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\651E.tmp"C:\Users\Admin\AppData\Local\Temp\651E.tmp"56⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\65AA.tmp"C:\Users\Admin\AppData\Local\Temp\65AA.tmp"57⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\6627.tmp"C:\Users\Admin\AppData\Local\Temp\6627.tmp"58⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\6695.tmp"C:\Users\Admin\AppData\Local\Temp\6695.tmp"59⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"60⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\679E.tmp"C:\Users\Admin\AppData\Local\Temp\679E.tmp"61⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"62⤵
- Executes dropped EXE
PID:32 -
C:\Users\Admin\AppData\Local\Temp\68C7.tmp"C:\Users\Admin\AppData\Local\Temp\68C7.tmp"63⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\6954.tmp"C:\Users\Admin\AppData\Local\Temp\6954.tmp"64⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"65⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"66⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"67⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"68⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\6C90.tmp"C:\Users\Admin\AppData\Local\Temp\6C90.tmp"69⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6D4B.tmp"C:\Users\Admin\AppData\Local\Temp\6D4B.tmp"70⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\6DD8.tmp"C:\Users\Admin\AppData\Local\Temp\6DD8.tmp"71⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\6E65.tmp"C:\Users\Admin\AppData\Local\Temp\6E65.tmp"72⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"73⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\6F6E.tmp"C:\Users\Admin\AppData\Local\Temp\6F6E.tmp"74⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"75⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\70C6.tmp"C:\Users\Admin\AppData\Local\Temp\70C6.tmp"76⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"77⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\71DF.tmp"C:\Users\Admin\AppData\Local\Temp\71DF.tmp"78⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\725C.tmp"C:\Users\Admin\AppData\Local\Temp\725C.tmp"79⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\72D9.tmp"C:\Users\Admin\AppData\Local\Temp\72D9.tmp"80⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\73A4.tmp"C:\Users\Admin\AppData\Local\Temp\73A4.tmp"81⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"82⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\749E.tmp"C:\Users\Admin\AppData\Local\Temp\749E.tmp"83⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"84⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\75B8.tmp"C:\Users\Admin\AppData\Local\Temp\75B8.tmp"85⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\7664.tmp"C:\Users\Admin\AppData\Local\Temp\7664.tmp"86⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\76E1.tmp"C:\Users\Admin\AppData\Local\Temp\76E1.tmp"87⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\776D.tmp"C:\Users\Admin\AppData\Local\Temp\776D.tmp"88⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\77EA.tmp"C:\Users\Admin\AppData\Local\Temp\77EA.tmp"89⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\78F4.tmp"C:\Users\Admin\AppData\Local\Temp\78F4.tmp"90⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\7990.tmp"C:\Users\Admin\AppData\Local\Temp\7990.tmp"91⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"92⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"93⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\7B26.tmp"C:\Users\Admin\AppData\Local\Temp\7B26.tmp"94⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"95⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\7C30.tmp"C:\Users\Admin\AppData\Local\Temp\7C30.tmp"96⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\7CCC.tmp"C:\Users\Admin\AppData\Local\Temp\7CCC.tmp"97⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\7D49.tmp"C:\Users\Admin\AppData\Local\Temp\7D49.tmp"98⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\7DE5.tmp"C:\Users\Admin\AppData\Local\Temp\7DE5.tmp"99⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\7E82.tmp"C:\Users\Admin\AppData\Local\Temp\7E82.tmp"100⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\7F2E.tmp"C:\Users\Admin\AppData\Local\Temp\7F2E.tmp"101⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"102⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\8028.tmp"C:\Users\Admin\AppData\Local\Temp\8028.tmp"103⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\80B4.tmp"C:\Users\Admin\AppData\Local\Temp\80B4.tmp"104⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\8131.tmp"C:\Users\Admin\AppData\Local\Temp\8131.tmp"105⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\81AE.tmp"C:\Users\Admin\AppData\Local\Temp\81AE.tmp"106⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\822B.tmp"C:\Users\Admin\AppData\Local\Temp\822B.tmp"107⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\82B8.tmp"C:\Users\Admin\AppData\Local\Temp\82B8.tmp"108⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\8354.tmp"C:\Users\Admin\AppData\Local\Temp\8354.tmp"109⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\83F0.tmp"C:\Users\Admin\AppData\Local\Temp\83F0.tmp"110⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\848D.tmp"C:\Users\Admin\AppData\Local\Temp\848D.tmp"111⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\8519.tmp"C:\Users\Admin\AppData\Local\Temp\8519.tmp"112⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\85B5.tmp"C:\Users\Admin\AppData\Local\Temp\85B5.tmp"113⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\8642.tmp"C:\Users\Admin\AppData\Local\Temp\8642.tmp"114⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\86CF.tmp"C:\Users\Admin\AppData\Local\Temp\86CF.tmp"115⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\875B.tmp"C:\Users\Admin\AppData\Local\Temp\875B.tmp"116⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\87F8.tmp"C:\Users\Admin\AppData\Local\Temp\87F8.tmp"117⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\8884.tmp"C:\Users\Admin\AppData\Local\Temp\8884.tmp"118⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\8940.tmp"C:\Users\Admin\AppData\Local\Temp\8940.tmp"119⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\89BD.tmp"C:\Users\Admin\AppData\Local\Temp\89BD.tmp"120⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\8A69.tmp"C:\Users\Admin\AppData\Local\Temp\8A69.tmp"121⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\8AE6.tmp"C:\Users\Admin\AppData\Local\Temp\8AE6.tmp"122⤵PID:32
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-