Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 23:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe
-
Size
487KB
-
MD5
08d6d4779dc6be35feab31732ee621ad
-
SHA1
bcdffdbffc3122ec1f92fe7243afd5b000fe5bd8
-
SHA256
3ea97dbba564e14185c240676a9974dd3bb868c8584a969c942c4aba93e62f4d
-
SHA512
83d1e63c3e21c0c7f67cb6ae8f4fecf8d529b3379531bf3d2d1ab81e494c2aaf92446ae50a85bb102bbcd165ab37c2dc86b24bb26427e17d6a3283ac9b2a1918
-
SSDEEP
12288:HU5rCOTeiJttWb/9mDddYqP1fwKVEN7JNZ:HUQOJJttWz9mnYQfW/N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 964 3DC4.tmp 3716 3E32.tmp 4948 3E9F.tmp 2904 3F1C.tmp 1920 3F6A.tmp 4700 3FD8.tmp 1344 4035.tmp 1188 4093.tmp 1148 40E1.tmp 4792 412F.tmp 3396 417D.tmp 1108 41DB.tmp 2492 4239.tmp 788 4287.tmp 4672 42E5.tmp 1632 4333.tmp 3188 4381.tmp 3584 43CF.tmp 4944 441D.tmp 2064 446B.tmp 472 44BA.tmp 3944 4508.tmp 5000 4556.tmp 1728 45A4.tmp 2004 4602.tmp 3356 4650.tmp 4040 469E.tmp 3216 46EC.tmp 2748 474A.tmp 656 47A8.tmp 5088 4805.tmp 4376 4853.tmp 3268 48A2.tmp 964 48F0.tmp 4508 494D.tmp 492 499C.tmp 4552 49EA.tmp 2736 4A38.tmp 1612 4A86.tmp 4408 4AD4.tmp 3520 4B22.tmp 4400 4B70.tmp 568 4BBE.tmp 3856 4C0D.tmp 1968 4C5B.tmp 4860 4CA9.tmp 2552 4CF7.tmp 1924 4D45.tmp 2420 4D93.tmp 1168 4DD2.tmp 2940 4E20.tmp 1340 4E6E.tmp 2436 4EBC.tmp 3908 4F0A.tmp 1776 4F58.tmp 2908 4FA6.tmp 3952 4FF5.tmp 1364 5043.tmp 2732 5091.tmp 4104 50DF.tmp 4316 512D.tmp 4592 518B.tmp 3220 5246.tmp 2024 52B4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 964 3228 2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe 89 PID 3228 wrote to memory of 964 3228 2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe 89 PID 3228 wrote to memory of 964 3228 2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe 89 PID 964 wrote to memory of 3716 964 3DC4.tmp 91 PID 964 wrote to memory of 3716 964 3DC4.tmp 91 PID 964 wrote to memory of 3716 964 3DC4.tmp 91 PID 3716 wrote to memory of 4948 3716 3E32.tmp 93 PID 3716 wrote to memory of 4948 3716 3E32.tmp 93 PID 3716 wrote to memory of 4948 3716 3E32.tmp 93 PID 4948 wrote to memory of 2904 4948 3E9F.tmp 95 PID 4948 wrote to memory of 2904 4948 3E9F.tmp 95 PID 4948 wrote to memory of 2904 4948 3E9F.tmp 95 PID 2904 wrote to memory of 1920 2904 3F1C.tmp 96 PID 2904 wrote to memory of 1920 2904 3F1C.tmp 96 PID 2904 wrote to memory of 1920 2904 3F1C.tmp 96 PID 1920 wrote to memory of 4700 1920 3F6A.tmp 97 PID 1920 wrote to memory of 4700 1920 3F6A.tmp 97 PID 1920 wrote to memory of 4700 1920 3F6A.tmp 97 PID 4700 wrote to memory of 1344 4700 3FD8.tmp 98 PID 4700 wrote to memory of 1344 4700 3FD8.tmp 98 PID 4700 wrote to memory of 1344 4700 3FD8.tmp 98 PID 1344 wrote to memory of 1188 1344 4035.tmp 99 PID 1344 wrote to memory of 1188 1344 4035.tmp 99 PID 1344 wrote to memory of 1188 1344 4035.tmp 99 PID 1188 wrote to memory of 1148 1188 4093.tmp 100 PID 1188 wrote to memory of 1148 1188 4093.tmp 100 PID 1188 wrote to memory of 1148 1188 4093.tmp 100 PID 1148 wrote to memory of 4792 1148 40E1.tmp 101 PID 1148 wrote to memory of 4792 1148 40E1.tmp 101 PID 1148 wrote to memory of 4792 1148 40E1.tmp 101 PID 4792 wrote to memory of 3396 4792 412F.tmp 102 PID 4792 wrote to memory of 3396 4792 412F.tmp 102 PID 4792 wrote to memory of 3396 4792 412F.tmp 102 PID 3396 wrote to memory of 1108 3396 417D.tmp 103 PID 3396 wrote to memory of 1108 3396 417D.tmp 103 PID 3396 wrote to memory of 1108 3396 417D.tmp 103 PID 1108 wrote to memory of 2492 1108 41DB.tmp 104 PID 1108 wrote to memory of 2492 1108 41DB.tmp 104 PID 1108 wrote to memory of 2492 1108 41DB.tmp 104 PID 2492 wrote to memory of 788 2492 4239.tmp 105 PID 2492 wrote to memory of 788 2492 4239.tmp 105 PID 2492 wrote to memory of 788 2492 4239.tmp 105 PID 788 wrote to memory of 4672 788 4287.tmp 106 PID 788 wrote to memory of 4672 788 4287.tmp 106 PID 788 wrote to memory of 4672 788 4287.tmp 106 PID 4672 wrote to memory of 1632 4672 42E5.tmp 107 PID 4672 wrote to memory of 1632 4672 42E5.tmp 107 PID 4672 wrote to memory of 1632 4672 42E5.tmp 107 PID 1632 wrote to memory of 3188 1632 4333.tmp 108 PID 1632 wrote to memory of 3188 1632 4333.tmp 108 PID 1632 wrote to memory of 3188 1632 4333.tmp 108 PID 3188 wrote to memory of 3584 3188 4381.tmp 109 PID 3188 wrote to memory of 3584 3188 4381.tmp 109 PID 3188 wrote to memory of 3584 3188 4381.tmp 109 PID 3584 wrote to memory of 4944 3584 43CF.tmp 110 PID 3584 wrote to memory of 4944 3584 43CF.tmp 110 PID 3584 wrote to memory of 4944 3584 43CF.tmp 110 PID 4944 wrote to memory of 2064 4944 441D.tmp 111 PID 4944 wrote to memory of 2064 4944 441D.tmp 111 PID 4944 wrote to memory of 2064 4944 441D.tmp 111 PID 2064 wrote to memory of 472 2064 446B.tmp 112 PID 2064 wrote to memory of 472 2064 446B.tmp 112 PID 2064 wrote to memory of 472 2064 446B.tmp 112 PID 472 wrote to memory of 3944 472 44BA.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_08d6d4779dc6be35feab31732ee621ad_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3DC4.tmp"C:\Users\Admin\AppData\Local\Temp\3DC4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\3E32.tmp"C:\Users\Admin\AppData\Local\Temp\3E32.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\3E9F.tmp"C:\Users\Admin\AppData\Local\Temp\3E9F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\3F1C.tmp"C:\Users\Admin\AppData\Local\Temp\3F1C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3F6A.tmp"C:\Users\Admin\AppData\Local\Temp\3F6A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\4035.tmp"C:\Users\Admin\AppData\Local\Temp\4035.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\4093.tmp"C:\Users\Admin\AppData\Local\Temp\4093.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\40E1.tmp"C:\Users\Admin\AppData\Local\Temp\40E1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\412F.tmp"C:\Users\Admin\AppData\Local\Temp\412F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\417D.tmp"C:\Users\Admin\AppData\Local\Temp\417D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\41DB.tmp"C:\Users\Admin\AppData\Local\Temp\41DB.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\4239.tmp"C:\Users\Admin\AppData\Local\Temp\4239.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\4287.tmp"C:\Users\Admin\AppData\Local\Temp\4287.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\42E5.tmp"C:\Users\Admin\AppData\Local\Temp\42E5.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\4333.tmp"C:\Users\Admin\AppData\Local\Temp\4333.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\4381.tmp"C:\Users\Admin\AppData\Local\Temp\4381.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\43CF.tmp"C:\Users\Admin\AppData\Local\Temp\43CF.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\441D.tmp"C:\Users\Admin\AppData\Local\Temp\441D.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\446B.tmp"C:\Users\Admin\AppData\Local\Temp\446B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\44BA.tmp"C:\Users\Admin\AppData\Local\Temp\44BA.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\4508.tmp"C:\Users\Admin\AppData\Local\Temp\4508.tmp"23⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\4556.tmp"C:\Users\Admin\AppData\Local\Temp\4556.tmp"24⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\45A4.tmp"C:\Users\Admin\AppData\Local\Temp\45A4.tmp"25⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\4602.tmp"C:\Users\Admin\AppData\Local\Temp\4602.tmp"26⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\4650.tmp"C:\Users\Admin\AppData\Local\Temp\4650.tmp"27⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\469E.tmp"C:\Users\Admin\AppData\Local\Temp\469E.tmp"28⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\46EC.tmp"C:\Users\Admin\AppData\Local\Temp\46EC.tmp"29⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\474A.tmp"C:\Users\Admin\AppData\Local\Temp\474A.tmp"30⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\47A8.tmp"C:\Users\Admin\AppData\Local\Temp\47A8.tmp"31⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\4805.tmp"C:\Users\Admin\AppData\Local\Temp\4805.tmp"32⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\4853.tmp"C:\Users\Admin\AppData\Local\Temp\4853.tmp"33⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\48A2.tmp"C:\Users\Admin\AppData\Local\Temp\48A2.tmp"34⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\48F0.tmp"C:\Users\Admin\AppData\Local\Temp\48F0.tmp"35⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\494D.tmp"C:\Users\Admin\AppData\Local\Temp\494D.tmp"36⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\499C.tmp"C:\Users\Admin\AppData\Local\Temp\499C.tmp"37⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\49EA.tmp"C:\Users\Admin\AppData\Local\Temp\49EA.tmp"38⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\4A38.tmp"C:\Users\Admin\AppData\Local\Temp\4A38.tmp"39⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\4A86.tmp"C:\Users\Admin\AppData\Local\Temp\4A86.tmp"40⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"41⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\4B22.tmp"C:\Users\Admin\AppData\Local\Temp\4B22.tmp"42⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\4B70.tmp"C:\Users\Admin\AppData\Local\Temp\4B70.tmp"43⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"44⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"45⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"46⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"47⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"48⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\4D45.tmp"C:\Users\Admin\AppData\Local\Temp\4D45.tmp"49⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"50⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"51⤵
- Executes dropped EXE
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\4E20.tmp"C:\Users\Admin\AppData\Local\Temp\4E20.tmp"52⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"53⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"54⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"55⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"56⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"57⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"58⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\5043.tmp"C:\Users\Admin\AppData\Local\Temp\5043.tmp"59⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\5091.tmp"C:\Users\Admin\AppData\Local\Temp\5091.tmp"60⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\50DF.tmp"C:\Users\Admin\AppData\Local\Temp\50DF.tmp"61⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\512D.tmp"C:\Users\Admin\AppData\Local\Temp\512D.tmp"62⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\518B.tmp"C:\Users\Admin\AppData\Local\Temp\518B.tmp"63⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\5246.tmp"C:\Users\Admin\AppData\Local\Temp\5246.tmp"64⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"65⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\5302.tmp"C:\Users\Admin\AppData\Local\Temp\5302.tmp"66⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\536F.tmp"C:\Users\Admin\AppData\Local\Temp\536F.tmp"67⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\53DD.tmp"C:\Users\Admin\AppData\Local\Temp\53DD.tmp"68⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"69⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\54A8.tmp"C:\Users\Admin\AppData\Local\Temp\54A8.tmp"70⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\5515.tmp"C:\Users\Admin\AppData\Local\Temp\5515.tmp"71⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\5573.tmp"C:\Users\Admin\AppData\Local\Temp\5573.tmp"72⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"73⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\564E.tmp"C:\Users\Admin\AppData\Local\Temp\564E.tmp"74⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\56CB.tmp"C:\Users\Admin\AppData\Local\Temp\56CB.tmp"75⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\5719.tmp"C:\Users\Admin\AppData\Local\Temp\5719.tmp"76⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"77⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"78⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\5813.tmp"C:\Users\Admin\AppData\Local\Temp\5813.tmp"79⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\5870.tmp"C:\Users\Admin\AppData\Local\Temp\5870.tmp"80⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\58BF.tmp"C:\Users\Admin\AppData\Local\Temp\58BF.tmp"81⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\591C.tmp"C:\Users\Admin\AppData\Local\Temp\591C.tmp"82⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\597A.tmp"C:\Users\Admin\AppData\Local\Temp\597A.tmp"83⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\59D8.tmp"C:\Users\Admin\AppData\Local\Temp\59D8.tmp"84⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"85⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\5A93.tmp"C:\Users\Admin\AppData\Local\Temp\5A93.tmp"86⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"87⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"88⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"89⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"90⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\5C49.tmp"C:\Users\Admin\AppData\Local\Temp\5C49.tmp"91⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"92⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"93⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\5D81.tmp"C:\Users\Admin\AppData\Local\Temp\5D81.tmp"94⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"95⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"96⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"97⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\5F08.tmp"C:\Users\Admin\AppData\Local\Temp\5F08.tmp"98⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\5F66.tmp"C:\Users\Admin\AppData\Local\Temp\5F66.tmp"99⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"100⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"101⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"102⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\60EC.tmp"C:\Users\Admin\AppData\Local\Temp\60EC.tmp"103⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\614A.tmp"C:\Users\Admin\AppData\Local\Temp\614A.tmp"104⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"105⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\6215.tmp"C:\Users\Admin\AppData\Local\Temp\6215.tmp"106⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"107⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"108⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\631F.tmp"C:\Users\Admin\AppData\Local\Temp\631F.tmp"109⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\637D.tmp"C:\Users\Admin\AppData\Local\Temp\637D.tmp"110⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\63DA.tmp"C:\Users\Admin\AppData\Local\Temp\63DA.tmp"111⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\6438.tmp"C:\Users\Admin\AppData\Local\Temp\6438.tmp"112⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\6486.tmp"C:\Users\Admin\AppData\Local\Temp\6486.tmp"113⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\64D4.tmp"C:\Users\Admin\AppData\Local\Temp\64D4.tmp"114⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\6532.tmp"C:\Users\Admin\AppData\Local\Temp\6532.tmp"115⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\6580.tmp"C:\Users\Admin\AppData\Local\Temp\6580.tmp"116⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\65CE.tmp"C:\Users\Admin\AppData\Local\Temp\65CE.tmp"117⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\661C.tmp"C:\Users\Admin\AppData\Local\Temp\661C.tmp"118⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"119⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\66B9.tmp"C:\Users\Admin\AppData\Local\Temp\66B9.tmp"120⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\6716.tmp"C:\Users\Admin\AppData\Local\Temp\6716.tmp"121⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"122⤵PID:4504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-