Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 22:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe
-
Size
487KB
-
MD5
f7f40597e365cdf1398563979e28ba4e
-
SHA1
e12fe637824f3262cdb10c62e7e6f17ac14ce209
-
SHA256
af07a39f1391bd3f53678e79dc4d3753c0f237ea12978904fbc08f99bd8080dd
-
SHA512
1e30a7003e7ce221dc44bb84d654b5e8c640a0f5fe6b57e92c1fdf2da0786f0440a056516d99add1ff5dad075078eb3d561fb6b7b7502e8f82d27ff4b624dc4d
-
SSDEEP
6144:zorf3lPvovsgZnqG2C7mOTeiLxDxHhfpO9Bt7kjQ/bbNIKu0SMnq+tXVMRZy4zvp:yU5rCOTeiNZZpOfgm1wC4DTy9+bZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 464 4A76.tmp 556 4AE4.tmp 212 4B32.tmp 1112 4B80.tmp 2284 4BDE.tmp 4752 4C2C.tmp 2680 4C7A.tmp 4620 4CD8.tmp 4652 4D35.tmp 1556 4D84.tmp 768 4DD2.tmp 2368 4E20.tmp 2156 4E6E.tmp 4632 4EBC.tmp 1612 4F0A.tmp 1624 4F58.tmp 1980 4FA6.tmp 8 4FF5.tmp 3696 5043.tmp 4072 5091.tmp 896 50DF.tmp 2180 511D.tmp 680 516C.tmp 4520 51C9.tmp 436 5217.tmp 1212 5275.tmp 428 52C3.tmp 3216 5311.tmp 3052 5360.tmp 1308 53BD.tmp 3504 540B.tmp 3248 545A.tmp 4888 54B7.tmp 5052 5505.tmp 1692 5544.tmp 3676 5592.tmp 1300 55E0.tmp 4212 562E.tmp 2788 567C.tmp 4376 56CB.tmp 4272 5719.tmp 2556 5767.tmp 4216 57B5.tmp 3068 5803.tmp 3016 5851.tmp 1388 589F.tmp 4776 58ED.tmp 2520 593C.tmp 4320 598A.tmp 2052 59D8.tmp 2440 5A26.tmp 216 5B01.tmp 4556 5BCC.tmp 464 5C58.tmp 848 5CE5.tmp 3712 5D72.tmp 3048 5DDF.tmp 1888 5E3D.tmp 2364 5E8B.tmp 3876 5ED9.tmp 4108 5F27.tmp 4752 5F85.tmp 4260 5FE3.tmp 1140 6040.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 464 4988 2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe 84 PID 4988 wrote to memory of 464 4988 2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe 84 PID 4988 wrote to memory of 464 4988 2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe 84 PID 464 wrote to memory of 556 464 4A76.tmp 85 PID 464 wrote to memory of 556 464 4A76.tmp 85 PID 464 wrote to memory of 556 464 4A76.tmp 85 PID 556 wrote to memory of 212 556 4AE4.tmp 86 PID 556 wrote to memory of 212 556 4AE4.tmp 86 PID 556 wrote to memory of 212 556 4AE4.tmp 86 PID 212 wrote to memory of 1112 212 4B32.tmp 87 PID 212 wrote to memory of 1112 212 4B32.tmp 87 PID 212 wrote to memory of 1112 212 4B32.tmp 87 PID 1112 wrote to memory of 2284 1112 4B80.tmp 88 PID 1112 wrote to memory of 2284 1112 4B80.tmp 88 PID 1112 wrote to memory of 2284 1112 4B80.tmp 88 PID 2284 wrote to memory of 4752 2284 4BDE.tmp 89 PID 2284 wrote to memory of 4752 2284 4BDE.tmp 89 PID 2284 wrote to memory of 4752 2284 4BDE.tmp 89 PID 4752 wrote to memory of 2680 4752 4C2C.tmp 90 PID 4752 wrote to memory of 2680 4752 4C2C.tmp 90 PID 4752 wrote to memory of 2680 4752 4C2C.tmp 90 PID 2680 wrote to memory of 4620 2680 4C7A.tmp 91 PID 2680 wrote to memory of 4620 2680 4C7A.tmp 91 PID 2680 wrote to memory of 4620 2680 4C7A.tmp 91 PID 4620 wrote to memory of 4652 4620 4CD8.tmp 137 PID 4620 wrote to memory of 4652 4620 4CD8.tmp 137 PID 4620 wrote to memory of 4652 4620 4CD8.tmp 137 PID 4652 wrote to memory of 1556 4652 4D35.tmp 136 PID 4652 wrote to memory of 1556 4652 4D35.tmp 136 PID 4652 wrote to memory of 1556 4652 4D35.tmp 136 PID 1556 wrote to memory of 768 1556 4D84.tmp 135 PID 1556 wrote to memory of 768 1556 4D84.tmp 135 PID 1556 wrote to memory of 768 1556 4D84.tmp 135 PID 768 wrote to memory of 2368 768 4DD2.tmp 134 PID 768 wrote to memory of 2368 768 4DD2.tmp 134 PID 768 wrote to memory of 2368 768 4DD2.tmp 134 PID 2368 wrote to memory of 2156 2368 4E20.tmp 133 PID 2368 wrote to memory of 2156 2368 4E20.tmp 133 PID 2368 wrote to memory of 2156 2368 4E20.tmp 133 PID 2156 wrote to memory of 4632 2156 4E6E.tmp 92 PID 2156 wrote to memory of 4632 2156 4E6E.tmp 92 PID 2156 wrote to memory of 4632 2156 4E6E.tmp 92 PID 4632 wrote to memory of 1612 4632 4EBC.tmp 132 PID 4632 wrote to memory of 1612 4632 4EBC.tmp 132 PID 4632 wrote to memory of 1612 4632 4EBC.tmp 132 PID 1612 wrote to memory of 1624 1612 4F0A.tmp 131 PID 1612 wrote to memory of 1624 1612 4F0A.tmp 131 PID 1612 wrote to memory of 1624 1612 4F0A.tmp 131 PID 1624 wrote to memory of 1980 1624 4F58.tmp 130 PID 1624 wrote to memory of 1980 1624 4F58.tmp 130 PID 1624 wrote to memory of 1980 1624 4F58.tmp 130 PID 1980 wrote to memory of 8 1980 4FA6.tmp 129 PID 1980 wrote to memory of 8 1980 4FA6.tmp 129 PID 1980 wrote to memory of 8 1980 4FA6.tmp 129 PID 8 wrote to memory of 3696 8 4FF5.tmp 93 PID 8 wrote to memory of 3696 8 4FF5.tmp 93 PID 8 wrote to memory of 3696 8 4FF5.tmp 93 PID 3696 wrote to memory of 4072 3696 5043.tmp 128 PID 3696 wrote to memory of 4072 3696 5043.tmp 128 PID 3696 wrote to memory of 4072 3696 5043.tmp 128 PID 4072 wrote to memory of 896 4072 5091.tmp 127 PID 4072 wrote to memory of 896 4072 5091.tmp 127 PID 4072 wrote to memory of 896 4072 5091.tmp 127 PID 896 wrote to memory of 2180 896 50DF.tmp 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_f7f40597e365cdf1398563979e28ba4e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\4A76.tmp"C:\Users\Admin\AppData\Local\Temp\4A76.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\4B32.tmp"C:\Users\Admin\AppData\Local\Temp\4B32.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\4B80.tmp"C:\Users\Admin\AppData\Local\Temp\4B80.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\4BDE.tmp"C:\Users\Admin\AppData\Local\Temp\4BDE.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\4C2C.tmp"C:\Users\Admin\AppData\Local\Temp\4C2C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\4C7A.tmp"C:\Users\Admin\AppData\Local\Temp\4C7A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\4D35.tmp"C:\Users\Admin\AppData\Local\Temp\4D35.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\5043.tmp"C:\Users\Admin\AppData\Local\Temp\5043.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\5091.tmp"C:\Users\Admin\AppData\Local\Temp\5091.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\516C.tmp"C:\Users\Admin\AppData\Local\Temp\516C.tmp"1⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\51C9.tmp"C:\Users\Admin\AppData\Local\Temp\51C9.tmp"2⤵
- Executes dropped EXE
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\53BD.tmp"C:\Users\Admin\AppData\Local\Temp\53BD.tmp"1⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\540B.tmp"C:\Users\Admin\AppData\Local\Temp\540B.tmp"2⤵
- Executes dropped EXE
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\54B7.tmp"C:\Users\Admin\AppData\Local\Temp\54B7.tmp"1⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\5505.tmp"C:\Users\Admin\AppData\Local\Temp\5505.tmp"2⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\5544.tmp"C:\Users\Admin\AppData\Local\Temp\5544.tmp"3⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\5592.tmp"C:\Users\Admin\AppData\Local\Temp\5592.tmp"4⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\55E0.tmp"C:\Users\Admin\AppData\Local\Temp\55E0.tmp"5⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\562E.tmp"C:\Users\Admin\AppData\Local\Temp\562E.tmp"6⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\567C.tmp"C:\Users\Admin\AppData\Local\Temp\567C.tmp"7⤵
- Executes dropped EXE
PID:2788
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"1⤵
- Executes dropped EXE
PID:3248
-
C:\Users\Admin\AppData\Local\Temp\5719.tmp"C:\Users\Admin\AppData\Local\Temp\5719.tmp"1⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"2⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"3⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\5803.tmp"C:\Users\Admin\AppData\Local\Temp\5803.tmp"4⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"5⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\589F.tmp"C:\Users\Admin\AppData\Local\Temp\589F.tmp"6⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\58ED.tmp"C:\Users\Admin\AppData\Local\Temp\58ED.tmp"7⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"8⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\598A.tmp"C:\Users\Admin\AppData\Local\Temp\598A.tmp"9⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\59D8.tmp"C:\Users\Admin\AppData\Local\Temp\59D8.tmp"10⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\5A26.tmp"C:\Users\Admin\AppData\Local\Temp\5A26.tmp"11⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\5A74.tmp"C:\Users\Admin\AppData\Local\Temp\5A74.tmp"12⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\5B01.tmp"C:\Users\Admin\AppData\Local\Temp\5B01.tmp"13⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"14⤵
- Executes dropped EXE
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\5C58.tmp"C:\Users\Admin\AppData\Local\Temp\5C58.tmp"15⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"16⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"17⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"18⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"19⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\5E8B.tmp"C:\Users\Admin\AppData\Local\Temp\5E8B.tmp"20⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"21⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\5F27.tmp"C:\Users\Admin\AppData\Local\Temp\5F27.tmp"22⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"23⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\5FE3.tmp"C:\Users\Admin\AppData\Local\Temp\5FE3.tmp"24⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\6040.tmp"C:\Users\Admin\AppData\Local\Temp\6040.tmp"25⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\608F.tmp"C:\Users\Admin\AppData\Local\Temp\608F.tmp"26⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\60DD.tmp"C:\Users\Admin\AppData\Local\Temp\60DD.tmp"27⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\612B.tmp"C:\Users\Admin\AppData\Local\Temp\612B.tmp"28⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\6189.tmp"C:\Users\Admin\AppData\Local\Temp\6189.tmp"29⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\61E6.tmp"C:\Users\Admin\AppData\Local\Temp\61E6.tmp"30⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6234.tmp"C:\Users\Admin\AppData\Local\Temp\6234.tmp"31⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"32⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\62E0.tmp"C:\Users\Admin\AppData\Local\Temp\62E0.tmp"33⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"34⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\639C.tmp"C:\Users\Admin\AppData\Local\Temp\639C.tmp"35⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\63EA.tmp"C:\Users\Admin\AppData\Local\Temp\63EA.tmp"36⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\6448.tmp"C:\Users\Admin\AppData\Local\Temp\6448.tmp"37⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"38⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\64F4.tmp"C:\Users\Admin\AppData\Local\Temp\64F4.tmp"39⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\6542.tmp"C:\Users\Admin\AppData\Local\Temp\6542.tmp"40⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"41⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"42⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"43⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\6699.tmp"C:\Users\Admin\AppData\Local\Temp\6699.tmp"44⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\66F7.tmp"C:\Users\Admin\AppData\Local\Temp\66F7.tmp"45⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\6745.tmp"C:\Users\Admin\AppData\Local\Temp\6745.tmp"46⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\67A3.tmp"C:\Users\Admin\AppData\Local\Temp\67A3.tmp"47⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\67F1.tmp"C:\Users\Admin\AppData\Local\Temp\67F1.tmp"48⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\684F.tmp"C:\Users\Admin\AppData\Local\Temp\684F.tmp"49⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"50⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\690A.tmp"C:\Users\Admin\AppData\Local\Temp\690A.tmp"51⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\6959.tmp"C:\Users\Admin\AppData\Local\Temp\6959.tmp"52⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\69B6.tmp"C:\Users\Admin\AppData\Local\Temp\69B6.tmp"53⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\6A04.tmp"C:\Users\Admin\AppData\Local\Temp\6A04.tmp"54⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\6A53.tmp"C:\Users\Admin\AppData\Local\Temp\6A53.tmp"55⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"56⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"57⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"58⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"59⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"60⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\6C56.tmp"C:\Users\Admin\AppData\Local\Temp\6C56.tmp"61⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"62⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\6D02.tmp"C:\Users\Admin\AppData\Local\Temp\6D02.tmp"63⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"64⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"65⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"66⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\6E69.tmp"C:\Users\Admin\AppData\Local\Temp\6E69.tmp"67⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"68⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\6F06.tmp"C:\Users\Admin\AppData\Local\Temp\6F06.tmp"69⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\6F54.tmp"C:\Users\Admin\AppData\Local\Temp\6F54.tmp"70⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\6FA2.tmp"C:\Users\Admin\AppData\Local\Temp\6FA2.tmp"71⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\7000.tmp"C:\Users\Admin\AppData\Local\Temp\7000.tmp"72⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"73⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"74⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"75⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\7167.tmp"C:\Users\Admin\AppData\Local\Temp\7167.tmp"76⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"77⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\7213.tmp"C:\Users\Admin\AppData\Local\Temp\7213.tmp"78⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"79⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\72AF.tmp"C:\Users\Admin\AppData\Local\Temp\72AF.tmp"80⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"81⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\734B.tmp"C:\Users\Admin\AppData\Local\Temp\734B.tmp"82⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\739A.tmp"C:\Users\Admin\AppData\Local\Temp\739A.tmp"83⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"84⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\7445.tmp"C:\Users\Admin\AppData\Local\Temp\7445.tmp"85⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\74A3.tmp"C:\Users\Admin\AppData\Local\Temp\74A3.tmp"86⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"87⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"88⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"89⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"90⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\7639.tmp"C:\Users\Admin\AppData\Local\Temp\7639.tmp"91⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\7697.tmp"C:\Users\Admin\AppData\Local\Temp\7697.tmp"92⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\76F5.tmp"C:\Users\Admin\AppData\Local\Temp\76F5.tmp"93⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\7743.tmp"C:\Users\Admin\AppData\Local\Temp\7743.tmp"94⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"95⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"96⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\783D.tmp"C:\Users\Admin\AppData\Local\Temp\783D.tmp"97⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\788B.tmp"C:\Users\Admin\AppData\Local\Temp\788B.tmp"98⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\78D9.tmp"C:\Users\Admin\AppData\Local\Temp\78D9.tmp"99⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\7927.tmp"C:\Users\Admin\AppData\Local\Temp\7927.tmp"100⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\7976.tmp"C:\Users\Admin\AppData\Local\Temp\7976.tmp"101⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"102⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\7A21.tmp"C:\Users\Admin\AppData\Local\Temp\7A21.tmp"103⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\7A70.tmp"C:\Users\Admin\AppData\Local\Temp\7A70.tmp"104⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"105⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\7B0C.tmp"C:\Users\Admin\AppData\Local\Temp\7B0C.tmp"106⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\7B5A.tmp"C:\Users\Admin\AppData\Local\Temp\7B5A.tmp"107⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"108⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"109⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\7C54.tmp"C:\Users\Admin\AppData\Local\Temp\7C54.tmp"110⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"111⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"112⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"113⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"114⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"115⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\7E29.tmp"C:\Users\Admin\AppData\Local\Temp\7E29.tmp"116⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"117⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"118⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\7F13.tmp"C:\Users\Admin\AppData\Local\Temp\7F13.tmp"119⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\7F61.tmp"C:\Users\Admin\AppData\Local\Temp\7F61.tmp"120⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"121⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"122⤵PID:2176
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-