Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 07:46 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe
-
Size
486KB
-
MD5
59171cfa44d2e6bcb816e7fa0bca8108
-
SHA1
92ed2b8d1ec4bb33d764247b53b27a35135773f0
-
SHA256
24dbccfc57239b5c12f32e0a1edebb514c4566d833eaa09abc638622272d4aa6
-
SHA512
5e65f3b0a0721a45d3d105035070d2da8c2b3f40d6408b088eff369f8b28d53144744600a8022f2f27da163515ca5c6f5ac3fb099661fd689001143f69804750
-
SSDEEP
12288:/U5rCOTeiDwvODDm8MdjC/Mgbx4FvFNm2NZ:/UQOJDlDm8M4/r+FG2N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4144 E91.tmp 2304 F8B.tmp 2960 FF9.tmp 1748 1085.tmp 4644 1122.tmp 1940 11DD.tmp 2788 1289.tmp 4056 1354.tmp 452 1400.tmp 2092 148D.tmp 4900 1BE0.tmp 4524 1D37.tmp 4352 1DF3.tmp 4152 1EAE.tmp 936 1F89.tmp 1496 2074.tmp 3780 211F.tmp 5076 21AC.tmp 3952 2268.tmp 400 2323.tmp 2516 242D.tmp 3684 24D9.tmp 1480 25A4.tmp 4796 268E.tmp 2588 2769.tmp 1376 28E0.tmp 836 297C.tmp 3724 2A38.tmp 3324 2B12.tmp 4716 2B8F.tmp 4284 2C1C.tmp 4900 2CB8.tmp 2544 2D26.tmp 4788 2DB2.tmp 3916 2E20.tmp 2496 2E8D.tmp 4488 2F0A.tmp 4468 2F87.tmp 2976 2FF4.tmp 2024 3071.tmp 4408 30FE.tmp 3780 319A.tmp 4164 3217.tmp 4564 3294.tmp 4572 3350.tmp 1164 33BD.tmp 2960 343A.tmp 3972 34E6.tmp 1288 35F0.tmp 4532 366D.tmp 1740 3718.tmp 3060 3786.tmp 644 3822.tmp 836 38AF.tmp 612 392C.tmp 2984 3999.tmp 3320 3A16.tmp 3420 3A83.tmp 368 3B20.tmp 4352 3C0A.tmp 4152 3D04.tmp 1236 3D91.tmp 4892 3E0E.tmp 4012 3E7B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4144 4896 2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe 96 PID 4896 wrote to memory of 4144 4896 2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe 96 PID 4896 wrote to memory of 4144 4896 2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe 96 PID 4144 wrote to memory of 2304 4144 E91.tmp 97 PID 4144 wrote to memory of 2304 4144 E91.tmp 97 PID 4144 wrote to memory of 2304 4144 E91.tmp 97 PID 2304 wrote to memory of 2960 2304 F8B.tmp 98 PID 2304 wrote to memory of 2960 2304 F8B.tmp 98 PID 2304 wrote to memory of 2960 2304 F8B.tmp 98 PID 2960 wrote to memory of 1748 2960 FF9.tmp 99 PID 2960 wrote to memory of 1748 2960 FF9.tmp 99 PID 2960 wrote to memory of 1748 2960 FF9.tmp 99 PID 1748 wrote to memory of 4644 1748 1085.tmp 100 PID 1748 wrote to memory of 4644 1748 1085.tmp 100 PID 1748 wrote to memory of 4644 1748 1085.tmp 100 PID 4644 wrote to memory of 1940 4644 1122.tmp 101 PID 4644 wrote to memory of 1940 4644 1122.tmp 101 PID 4644 wrote to memory of 1940 4644 1122.tmp 101 PID 1940 wrote to memory of 2788 1940 11DD.tmp 102 PID 1940 wrote to memory of 2788 1940 11DD.tmp 102 PID 1940 wrote to memory of 2788 1940 11DD.tmp 102 PID 2788 wrote to memory of 4056 2788 1289.tmp 103 PID 2788 wrote to memory of 4056 2788 1289.tmp 103 PID 2788 wrote to memory of 4056 2788 1289.tmp 103 PID 4056 wrote to memory of 452 4056 1354.tmp 104 PID 4056 wrote to memory of 452 4056 1354.tmp 104 PID 4056 wrote to memory of 452 4056 1354.tmp 104 PID 452 wrote to memory of 2092 452 1400.tmp 106 PID 452 wrote to memory of 2092 452 1400.tmp 106 PID 452 wrote to memory of 2092 452 1400.tmp 106 PID 2092 wrote to memory of 4900 2092 148D.tmp 107 PID 2092 wrote to memory of 4900 2092 148D.tmp 107 PID 2092 wrote to memory of 4900 2092 148D.tmp 107 PID 4900 wrote to memory of 4524 4900 1BE0.tmp 108 PID 4900 wrote to memory of 4524 4900 1BE0.tmp 108 PID 4900 wrote to memory of 4524 4900 1BE0.tmp 108 PID 4524 wrote to memory of 4352 4524 1D37.tmp 109 PID 4524 wrote to memory of 4352 4524 1D37.tmp 109 PID 4524 wrote to memory of 4352 4524 1D37.tmp 109 PID 4352 wrote to memory of 4152 4352 1DF3.tmp 110 PID 4352 wrote to memory of 4152 4352 1DF3.tmp 110 PID 4352 wrote to memory of 4152 4352 1DF3.tmp 110 PID 4152 wrote to memory of 936 4152 1EAE.tmp 111 PID 4152 wrote to memory of 936 4152 1EAE.tmp 111 PID 4152 wrote to memory of 936 4152 1EAE.tmp 111 PID 936 wrote to memory of 1496 936 1F89.tmp 112 PID 936 wrote to memory of 1496 936 1F89.tmp 112 PID 936 wrote to memory of 1496 936 1F89.tmp 112 PID 1496 wrote to memory of 3780 1496 2074.tmp 114 PID 1496 wrote to memory of 3780 1496 2074.tmp 114 PID 1496 wrote to memory of 3780 1496 2074.tmp 114 PID 3780 wrote to memory of 5076 3780 211F.tmp 115 PID 3780 wrote to memory of 5076 3780 211F.tmp 115 PID 3780 wrote to memory of 5076 3780 211F.tmp 115 PID 5076 wrote to memory of 3952 5076 21AC.tmp 116 PID 5076 wrote to memory of 3952 5076 21AC.tmp 116 PID 5076 wrote to memory of 3952 5076 21AC.tmp 116 PID 3952 wrote to memory of 400 3952 2268.tmp 117 PID 3952 wrote to memory of 400 3952 2268.tmp 117 PID 3952 wrote to memory of 400 3952 2268.tmp 117 PID 400 wrote to memory of 2516 400 2323.tmp 119 PID 400 wrote to memory of 2516 400 2323.tmp 119 PID 400 wrote to memory of 2516 400 2323.tmp 119 PID 2516 wrote to memory of 3684 2516 242D.tmp 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_59171cfa44d2e6bcb816e7fa0bca8108_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\1085.tmp"C:\Users\Admin\AppData\Local\Temp\1085.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\1F89.tmp"C:\Users\Admin\AppData\Local\Temp\1F89.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\2074.tmp"C:\Users\Admin\AppData\Local\Temp\2074.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\211F.tmp"C:\Users\Admin\AppData\Local\Temp\211F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\21AC.tmp"C:\Users\Admin\AppData\Local\Temp\21AC.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\2268.tmp"C:\Users\Admin\AppData\Local\Temp\2268.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\2323.tmp"C:\Users\Admin\AppData\Local\Temp\2323.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"23⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\25A4.tmp"C:\Users\Admin\AppData\Local\Temp\25A4.tmp"24⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\268E.tmp"C:\Users\Admin\AppData\Local\Temp\268E.tmp"25⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\2769.tmp"C:\Users\Admin\AppData\Local\Temp\2769.tmp"26⤵
- Executes dropped EXE
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"27⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"28⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\2A38.tmp"C:\Users\Admin\AppData\Local\Temp\2A38.tmp"29⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"30⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"31⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\2C1C.tmp"C:\Users\Admin\AppData\Local\Temp\2C1C.tmp"32⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\2CB8.tmp"C:\Users\Admin\AppData\Local\Temp\2CB8.tmp"33⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"34⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"35⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"36⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"37⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"38⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"39⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"40⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\3071.tmp"C:\Users\Admin\AppData\Local\Temp\3071.tmp"41⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\30FE.tmp"C:\Users\Admin\AppData\Local\Temp\30FE.tmp"42⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"43⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"44⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\3294.tmp"C:\Users\Admin\AppData\Local\Temp\3294.tmp"45⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"46⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"47⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"48⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"49⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"50⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\366D.tmp"C:\Users\Admin\AppData\Local\Temp\366D.tmp"51⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"52⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"53⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"54⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"55⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"56⤵
- Executes dropped EXE
PID:612 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"57⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3A16.tmp"C:\Users\Admin\AppData\Local\Temp\3A16.tmp"58⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"59⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"60⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"61⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\3D04.tmp"C:\Users\Admin\AppData\Local\Temp\3D04.tmp"62⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"63⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"64⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"65⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"66⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"67⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\4040.tmp"C:\Users\Admin\AppData\Local\Temp\4040.tmp"68⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\410B.tmp"C:\Users\Admin\AppData\Local\Temp\410B.tmp"69⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\4198.tmp"C:\Users\Admin\AppData\Local\Temp\4198.tmp"70⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\4234.tmp"C:\Users\Admin\AppData\Local\Temp\4234.tmp"71⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"72⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"73⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"74⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"75⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\44A5.tmp"C:\Users\Admin\AppData\Local\Temp\44A5.tmp"76⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\4522.tmp"C:\Users\Admin\AppData\Local\Temp\4522.tmp"77⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\459F.tmp"C:\Users\Admin\AppData\Local\Temp\459F.tmp"78⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\464B.tmp"C:\Users\Admin\AppData\Local\Temp\464B.tmp"79⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\46E7.tmp"C:\Users\Admin\AppData\Local\Temp\46E7.tmp"80⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"81⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\4820.tmp"C:\Users\Admin\AppData\Local\Temp\4820.tmp"82⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\48AC.tmp"C:\Users\Admin\AppData\Local\Temp\48AC.tmp"83⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\4968.tmp"C:\Users\Admin\AppData\Local\Temp\4968.tmp"84⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\49D5.tmp"C:\Users\Admin\AppData\Local\Temp\49D5.tmp"85⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"86⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"87⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"88⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"89⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"90⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\4D7F.tmp"C:\Users\Admin\AppData\Local\Temp\4D7F.tmp"91⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"92⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\4E79.tmp"C:\Users\Admin\AppData\Local\Temp\4E79.tmp"93⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"94⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"95⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"96⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\50AB.tmp"C:\Users\Admin\AppData\Local\Temp\50AB.tmp"97⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\5119.tmp"C:\Users\Admin\AppData\Local\Temp\5119.tmp"98⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\51C5.tmp"C:\Users\Admin\AppData\Local\Temp\51C5.tmp"99⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\5261.tmp"C:\Users\Admin\AppData\Local\Temp\5261.tmp"100⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"101⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"102⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"103⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\54A3.tmp"C:\Users\Admin\AppData\Local\Temp\54A3.tmp"104⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"105⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\55AD.tmp"C:\Users\Admin\AppData\Local\Temp\55AD.tmp"106⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"107⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"108⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\57A1.tmp"C:\Users\Admin\AppData\Local\Temp\57A1.tmp"109⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\582D.tmp"C:\Users\Admin\AppData\Local\Temp\582D.tmp"110⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\58C9.tmp"C:\Users\Admin\AppData\Local\Temp\58C9.tmp"111⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\5946.tmp"C:\Users\Admin\AppData\Local\Temp\5946.tmp"112⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"113⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"114⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"115⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"116⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\5C54.tmp"C:\Users\Admin\AppData\Local\Temp\5C54.tmp"117⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"118⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"119⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"120⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\5E77.tmp"C:\Users\Admin\AppData\Local\Temp\5E77.tmp"121⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"122⤵PID:4428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-