Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 00:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe
-
Size
486KB
-
MD5
485fc1d18f9b4927d9077bced661e1be
-
SHA1
b6454be7061cd53ae9224a5484a53bb7720073f0
-
SHA256
ea148e84c3736086772e991fe5caa568577bef37a946fa45aab45e11d03e62fd
-
SHA512
f035588260e6e61e243b59c49619e03c76d06d7ece29b826ee53aa68b32af947163b3b1140d0110ebe4afae57469375debe18b7733ed0e13310dca155439ffbb
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD72pYvdGJ15viiqHWwATmAfi42wcWJvfhBSG7x:UU5rCOTeiD811yvATmscWvfsVwPNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4484 5091.tmp 1760 50FE.tmp 5088 514C.tmp 5064 51BA.tmp 3632 5217.tmp 2180 5266.tmp 2108 52C3.tmp 1964 5321.tmp 4780 538E.tmp 2516 53DD.tmp 1020 542B.tmp 512 5479.tmp 3804 54D7.tmp 2900 5534.tmp 2884 5592.tmp 1224 55E0.tmp 5112 563E.tmp 5060 568C.tmp 3348 56EA.tmp 2816 5738.tmp 2100 5786.tmp 3592 57E4.tmp 404 5832.tmp 1212 5890.tmp 3596 58ED.tmp 3920 593C.tmp 1988 5999.tmp 2384 59E7.tmp 432 5A36.tmp 3388 5A84.tmp 1448 5AD2.tmp 5020 5B30.tmp 1800 5B7E.tmp 1776 5BCC.tmp 3272 5C2A.tmp 228 5C78.tmp 4312 5CC6.tmp 1208 5D14.tmp 620 5D91.tmp 1912 5DDF.tmp 2256 5E3D.tmp 4324 5ED9.tmp 3032 5F27.tmp 4960 5FE3.tmp 4484 6060.tmp 4240 60AE.tmp 4952 6198.tmp 1592 61F6.tmp 2728 6244.tmp 4652 6292.tmp 1392 62E0.tmp 936 634E.tmp 2700 63BB.tmp 3140 6409.tmp 4536 6457.tmp 2108 64A5.tmp 2568 64F4.tmp 4900 6542.tmp 2400 659F.tmp 4648 65EE.tmp 3204 664B.tmp 4984 6699.tmp 736 66F7.tmp 1632 6745.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4484 4720 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 87 PID 4720 wrote to memory of 4484 4720 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 87 PID 4720 wrote to memory of 4484 4720 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 87 PID 4484 wrote to memory of 1760 4484 5091.tmp 90 PID 4484 wrote to memory of 1760 4484 5091.tmp 90 PID 4484 wrote to memory of 1760 4484 5091.tmp 90 PID 1760 wrote to memory of 5088 1760 50FE.tmp 92 PID 1760 wrote to memory of 5088 1760 50FE.tmp 92 PID 1760 wrote to memory of 5088 1760 50FE.tmp 92 PID 5088 wrote to memory of 5064 5088 514C.tmp 93 PID 5088 wrote to memory of 5064 5088 514C.tmp 93 PID 5088 wrote to memory of 5064 5088 514C.tmp 93 PID 5064 wrote to memory of 3632 5064 51BA.tmp 94 PID 5064 wrote to memory of 3632 5064 51BA.tmp 94 PID 5064 wrote to memory of 3632 5064 51BA.tmp 94 PID 3632 wrote to memory of 2180 3632 5217.tmp 95 PID 3632 wrote to memory of 2180 3632 5217.tmp 95 PID 3632 wrote to memory of 2180 3632 5217.tmp 95 PID 2180 wrote to memory of 2108 2180 5266.tmp 96 PID 2180 wrote to memory of 2108 2180 5266.tmp 96 PID 2180 wrote to memory of 2108 2180 5266.tmp 96 PID 2108 wrote to memory of 1964 2108 52C3.tmp 97 PID 2108 wrote to memory of 1964 2108 52C3.tmp 97 PID 2108 wrote to memory of 1964 2108 52C3.tmp 97 PID 1964 wrote to memory of 4780 1964 5321.tmp 98 PID 1964 wrote to memory of 4780 1964 5321.tmp 98 PID 1964 wrote to memory of 4780 1964 5321.tmp 98 PID 4780 wrote to memory of 2516 4780 538E.tmp 99 PID 4780 wrote to memory of 2516 4780 538E.tmp 99 PID 4780 wrote to memory of 2516 4780 538E.tmp 99 PID 2516 wrote to memory of 1020 2516 53DD.tmp 100 PID 2516 wrote to memory of 1020 2516 53DD.tmp 100 PID 2516 wrote to memory of 1020 2516 53DD.tmp 100 PID 1020 wrote to memory of 512 1020 542B.tmp 101 PID 1020 wrote to memory of 512 1020 542B.tmp 101 PID 1020 wrote to memory of 512 1020 542B.tmp 101 PID 512 wrote to memory of 3804 512 5479.tmp 102 PID 512 wrote to memory of 3804 512 5479.tmp 102 PID 512 wrote to memory of 3804 512 5479.tmp 102 PID 3804 wrote to memory of 2900 3804 54D7.tmp 103 PID 3804 wrote to memory of 2900 3804 54D7.tmp 103 PID 3804 wrote to memory of 2900 3804 54D7.tmp 103 PID 2900 wrote to memory of 2884 2900 5534.tmp 104 PID 2900 wrote to memory of 2884 2900 5534.tmp 104 PID 2900 wrote to memory of 2884 2900 5534.tmp 104 PID 2884 wrote to memory of 1224 2884 5592.tmp 105 PID 2884 wrote to memory of 1224 2884 5592.tmp 105 PID 2884 wrote to memory of 1224 2884 5592.tmp 105 PID 1224 wrote to memory of 5112 1224 55E0.tmp 106 PID 1224 wrote to memory of 5112 1224 55E0.tmp 106 PID 1224 wrote to memory of 5112 1224 55E0.tmp 106 PID 5112 wrote to memory of 5060 5112 563E.tmp 107 PID 5112 wrote to memory of 5060 5112 563E.tmp 107 PID 5112 wrote to memory of 5060 5112 563E.tmp 107 PID 5060 wrote to memory of 3348 5060 568C.tmp 108 PID 5060 wrote to memory of 3348 5060 568C.tmp 108 PID 5060 wrote to memory of 3348 5060 568C.tmp 108 PID 3348 wrote to memory of 2816 3348 56EA.tmp 109 PID 3348 wrote to memory of 2816 3348 56EA.tmp 109 PID 3348 wrote to memory of 2816 3348 56EA.tmp 109 PID 2816 wrote to memory of 2100 2816 5738.tmp 110 PID 2816 wrote to memory of 2100 2816 5738.tmp 110 PID 2816 wrote to memory of 2100 2816 5738.tmp 110 PID 2100 wrote to memory of 3592 2100 5786.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\5091.tmp"C:\Users\Admin\AppData\Local\Temp\5091.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\51BA.tmp"C:\Users\Admin\AppData\Local\Temp\51BA.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\5217.tmp"C:\Users\Admin\AppData\Local\Temp\5217.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\52C3.tmp"C:\Users\Admin\AppData\Local\Temp\52C3.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\5321.tmp"C:\Users\Admin\AppData\Local\Temp\5321.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\538E.tmp"C:\Users\Admin\AppData\Local\Temp\538E.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\53DD.tmp"C:\Users\Admin\AppData\Local\Temp\53DD.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\542B.tmp"C:\Users\Admin\AppData\Local\Temp\542B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\5479.tmp"C:\Users\Admin\AppData\Local\Temp\5479.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\54D7.tmp"C:\Users\Admin\AppData\Local\Temp\54D7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\5534.tmp"C:\Users\Admin\AppData\Local\Temp\5534.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\5592.tmp"C:\Users\Admin\AppData\Local\Temp\5592.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\55E0.tmp"C:\Users\Admin\AppData\Local\Temp\55E0.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\563E.tmp"C:\Users\Admin\AppData\Local\Temp\563E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\56EA.tmp"C:\Users\Admin\AppData\Local\Temp\56EA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\5738.tmp"C:\Users\Admin\AppData\Local\Temp\5738.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\5786.tmp"C:\Users\Admin\AppData\Local\Temp\5786.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\57E4.tmp"C:\Users\Admin\AppData\Local\Temp\57E4.tmp"23⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\5832.tmp"C:\Users\Admin\AppData\Local\Temp\5832.tmp"24⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\5890.tmp"C:\Users\Admin\AppData\Local\Temp\5890.tmp"25⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\58ED.tmp"C:\Users\Admin\AppData\Local\Temp\58ED.tmp"26⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"27⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"28⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"29⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"30⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"31⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"32⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\5B30.tmp"C:\Users\Admin\AppData\Local\Temp\5B30.tmp"33⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"34⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"35⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\5C2A.tmp"C:\Users\Admin\AppData\Local\Temp\5C2A.tmp"36⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp"37⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\5CC6.tmp"C:\Users\Admin\AppData\Local\Temp\5CC6.tmp"38⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\5D14.tmp"C:\Users\Admin\AppData\Local\Temp\5D14.tmp"39⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\5D91.tmp"C:\Users\Admin\AppData\Local\Temp\5D91.tmp"40⤵
- Executes dropped EXE
PID:620 -
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"41⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"42⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"43⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\5F27.tmp"C:\Users\Admin\AppData\Local\Temp\5F27.tmp"44⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\5FE3.tmp"C:\Users\Admin\AppData\Local\Temp\5FE3.tmp"45⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\6060.tmp"C:\Users\Admin\AppData\Local\Temp\6060.tmp"46⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\60AE.tmp"C:\Users\Admin\AppData\Local\Temp\60AE.tmp"47⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\6198.tmp"C:\Users\Admin\AppData\Local\Temp\6198.tmp"48⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\61F6.tmp"C:\Users\Admin\AppData\Local\Temp\61F6.tmp"49⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\6244.tmp"C:\Users\Admin\AppData\Local\Temp\6244.tmp"50⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\6292.tmp"C:\Users\Admin\AppData\Local\Temp\6292.tmp"51⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\62E0.tmp"C:\Users\Admin\AppData\Local\Temp\62E0.tmp"52⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\634E.tmp"C:\Users\Admin\AppData\Local\Temp\634E.tmp"53⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\63BB.tmp"C:\Users\Admin\AppData\Local\Temp\63BB.tmp"54⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"55⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\6457.tmp"C:\Users\Admin\AppData\Local\Temp\6457.tmp"56⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"57⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\64F4.tmp"C:\Users\Admin\AppData\Local\Temp\64F4.tmp"58⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\6542.tmp"C:\Users\Admin\AppData\Local\Temp\6542.tmp"59⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"60⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"61⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"62⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\6699.tmp"C:\Users\Admin\AppData\Local\Temp\6699.tmp"63⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\66F7.tmp"C:\Users\Admin\AppData\Local\Temp\66F7.tmp"64⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\6745.tmp"C:\Users\Admin\AppData\Local\Temp\6745.tmp"65⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\67A3.tmp"C:\Users\Admin\AppData\Local\Temp\67A3.tmp"66⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\67F1.tmp"C:\Users\Admin\AppData\Local\Temp\67F1.tmp"67⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\683F.tmp"C:\Users\Admin\AppData\Local\Temp\683F.tmp"68⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\689D.tmp"C:\Users\Admin\AppData\Local\Temp\689D.tmp"69⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\68EB.tmp"C:\Users\Admin\AppData\Local\Temp\68EB.tmp"70⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"71⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"72⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\69F5.tmp"C:\Users\Admin\AppData\Local\Temp\69F5.tmp"73⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\6A43.tmp"C:\Users\Admin\AppData\Local\Temp\6A43.tmp"74⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\6A91.tmp"C:\Users\Admin\AppData\Local\Temp\6A91.tmp"75⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"76⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"77⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\6B7B.tmp"C:\Users\Admin\AppData\Local\Temp\6B7B.tmp"78⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"79⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\6C18.tmp"C:\Users\Admin\AppData\Local\Temp\6C18.tmp"80⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\6C75.tmp"C:\Users\Admin\AppData\Local\Temp\6C75.tmp"81⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"82⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\6D21.tmp"C:\Users\Admin\AppData\Local\Temp\6D21.tmp"83⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"84⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"85⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"86⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"87⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"88⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\6F25.tmp"C:\Users\Admin\AppData\Local\Temp\6F25.tmp"89⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"90⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\6FC1.tmp"C:\Users\Admin\AppData\Local\Temp\6FC1.tmp"91⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\700F.tmp"C:\Users\Admin\AppData\Local\Temp\700F.tmp"92⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"93⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"94⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"95⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\7167.tmp"C:\Users\Admin\AppData\Local\Temp\7167.tmp"96⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"97⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\7223.tmp"C:\Users\Admin\AppData\Local\Temp\7223.tmp"98⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\7271.tmp"C:\Users\Admin\AppData\Local\Temp\7271.tmp"99⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\72CE.tmp"C:\Users\Admin\AppData\Local\Temp\72CE.tmp"100⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\732C.tmp"C:\Users\Admin\AppData\Local\Temp\732C.tmp"101⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\737A.tmp"C:\Users\Admin\AppData\Local\Temp\737A.tmp"102⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\73C8.tmp"C:\Users\Admin\AppData\Local\Temp\73C8.tmp"103⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\7426.tmp"C:\Users\Admin\AppData\Local\Temp\7426.tmp"104⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"105⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"106⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\7530.tmp"C:\Users\Admin\AppData\Local\Temp\7530.tmp"107⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\757E.tmp"C:\Users\Admin\AppData\Local\Temp\757E.tmp"108⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\75CC.tmp"C:\Users\Admin\AppData\Local\Temp\75CC.tmp"109⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"110⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"111⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"112⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"113⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\7782.tmp"C:\Users\Admin\AppData\Local\Temp\7782.tmp"114⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"115⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\782D.tmp"C:\Users\Admin\AppData\Local\Temp\782D.tmp"116⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"117⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"118⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\7927.tmp"C:\Users\Admin\AppData\Local\Temp\7927.tmp"119⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"120⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"121⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\7A21.tmp"C:\Users\Admin\AppData\Local\Temp\7A21.tmp"122⤵PID:1908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-