Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 16:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe
-
Size
488KB
-
MD5
6045f04efe0696fca27a601cd2b962af
-
SHA1
f51da1e0d8fd0ce5709b60fe9455c081ebac513f
-
SHA256
b5d9ab95b2890bed0b8c6b205fe9005115fc1cafdedd9b537fb19e434a98a098
-
SHA512
c6f70b849573ca61369f097273b7dc202d19cfeb3be4e88a6ad3f27acb8e8801c139557a36493f3b68600003eb7538c7e16467e59b94867cefe811d069b3f862
-
SSDEEP
12288:/U5rCOTeiDY1+ojaufwooivmbzWlsuv1NZ:/UQOJDY1+0oivmbilttN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2768 2527.tmp 4940 2759.tmp 1164 2844.tmp 3680 29AB.tmp 3000 2A57.tmp 4668 2B80.tmp 4568 2C3B.tmp 2428 2D26.tmp 2124 2E10.tmp 4660 2EEB.tmp 1492 2FA6.tmp 3620 3091.tmp 2316 313C.tmp 5004 31E8.tmp 2976 3275.tmp 4536 3321.tmp 2224 341B.tmp 4480 34C7.tmp 3008 3582.tmp 4360 362E.tmp 4912 3709.tmp 3932 37B5.tmp 2128 3870.tmp 2532 392C.tmp 4396 39E7.tmp 1828 3AA3.tmp 464 3B4F.tmp 744 3BBC.tmp 1264 3CB6.tmp 3220 3D23.tmp 2920 3D91.tmp 4084 3E0E.tmp 3820 3EE8.tmp 2940 3F75.tmp 3112 4011.tmp 3672 409E.tmp 2344 412B.tmp 4056 41E6.tmp 5056 4263.tmp 1844 42F0.tmp 3608 437C.tmp 792 44E4.tmp 2728 4561.tmp 2040 466A.tmp 3344 4801.tmp 2864 486E.tmp 1496 490A.tmp 4804 49A6.tmp 1132 4A33.tmp 1540 4AC0.tmp 4028 4BAA.tmp 3688 4C56.tmp 4112 4D21.tmp 2644 4F34.tmp 4352 507C.tmp 4320 51A5.tmp 2240 52AF.tmp 2448 536A.tmp 760 5455.tmp 1160 5520.tmp 3556 55BC.tmp 2768 56F5.tmp 5064 5762.tmp 4308 584C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 2768 408 2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe 96 PID 408 wrote to memory of 2768 408 2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe 96 PID 408 wrote to memory of 2768 408 2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe 96 PID 2768 wrote to memory of 4940 2768 2527.tmp 97 PID 2768 wrote to memory of 4940 2768 2527.tmp 97 PID 2768 wrote to memory of 4940 2768 2527.tmp 97 PID 4940 wrote to memory of 1164 4940 2759.tmp 98 PID 4940 wrote to memory of 1164 4940 2759.tmp 98 PID 4940 wrote to memory of 1164 4940 2759.tmp 98 PID 1164 wrote to memory of 3680 1164 2844.tmp 99 PID 1164 wrote to memory of 3680 1164 2844.tmp 99 PID 1164 wrote to memory of 3680 1164 2844.tmp 99 PID 3680 wrote to memory of 3000 3680 29AB.tmp 100 PID 3680 wrote to memory of 3000 3680 29AB.tmp 100 PID 3680 wrote to memory of 3000 3680 29AB.tmp 100 PID 3000 wrote to memory of 4668 3000 2A57.tmp 101 PID 3000 wrote to memory of 4668 3000 2A57.tmp 101 PID 3000 wrote to memory of 4668 3000 2A57.tmp 101 PID 4668 wrote to memory of 4568 4668 2B80.tmp 102 PID 4668 wrote to memory of 4568 4668 2B80.tmp 102 PID 4668 wrote to memory of 4568 4668 2B80.tmp 102 PID 4568 wrote to memory of 2428 4568 2C3B.tmp 103 PID 4568 wrote to memory of 2428 4568 2C3B.tmp 103 PID 4568 wrote to memory of 2428 4568 2C3B.tmp 103 PID 2428 wrote to memory of 2124 2428 2D26.tmp 104 PID 2428 wrote to memory of 2124 2428 2D26.tmp 104 PID 2428 wrote to memory of 2124 2428 2D26.tmp 104 PID 2124 wrote to memory of 4660 2124 2E10.tmp 105 PID 2124 wrote to memory of 4660 2124 2E10.tmp 105 PID 2124 wrote to memory of 4660 2124 2E10.tmp 105 PID 4660 wrote to memory of 1492 4660 2EEB.tmp 106 PID 4660 wrote to memory of 1492 4660 2EEB.tmp 106 PID 4660 wrote to memory of 1492 4660 2EEB.tmp 106 PID 1492 wrote to memory of 3620 1492 2FA6.tmp 107 PID 1492 wrote to memory of 3620 1492 2FA6.tmp 107 PID 1492 wrote to memory of 3620 1492 2FA6.tmp 107 PID 3620 wrote to memory of 2316 3620 3091.tmp 108 PID 3620 wrote to memory of 2316 3620 3091.tmp 108 PID 3620 wrote to memory of 2316 3620 3091.tmp 108 PID 2316 wrote to memory of 5004 2316 313C.tmp 109 PID 2316 wrote to memory of 5004 2316 313C.tmp 109 PID 2316 wrote to memory of 5004 2316 313C.tmp 109 PID 5004 wrote to memory of 2976 5004 31E8.tmp 110 PID 5004 wrote to memory of 2976 5004 31E8.tmp 110 PID 5004 wrote to memory of 2976 5004 31E8.tmp 110 PID 2976 wrote to memory of 4536 2976 3275.tmp 111 PID 2976 wrote to memory of 4536 2976 3275.tmp 111 PID 2976 wrote to memory of 4536 2976 3275.tmp 111 PID 4536 wrote to memory of 2224 4536 3321.tmp 112 PID 4536 wrote to memory of 2224 4536 3321.tmp 112 PID 4536 wrote to memory of 2224 4536 3321.tmp 112 PID 2224 wrote to memory of 4480 2224 341B.tmp 113 PID 2224 wrote to memory of 4480 2224 341B.tmp 113 PID 2224 wrote to memory of 4480 2224 341B.tmp 113 PID 4480 wrote to memory of 3008 4480 34C7.tmp 114 PID 4480 wrote to memory of 3008 4480 34C7.tmp 114 PID 4480 wrote to memory of 3008 4480 34C7.tmp 114 PID 3008 wrote to memory of 4360 3008 3582.tmp 115 PID 3008 wrote to memory of 4360 3008 3582.tmp 115 PID 3008 wrote to memory of 4360 3008 3582.tmp 115 PID 4360 wrote to memory of 4912 4360 362E.tmp 116 PID 4360 wrote to memory of 4912 4360 362E.tmp 116 PID 4360 wrote to memory of 4912 4360 362E.tmp 116 PID 4912 wrote to memory of 3932 4912 3709.tmp 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_6045f04efe0696fca27a601cd2b962af_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\2527.tmp"C:\Users\Admin\AppData\Local\Temp\2527.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\29AB.tmp"C:\Users\Admin\AppData\Local\Temp\29AB.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\2B80.tmp"C:\Users\Admin\AppData\Local\Temp\2B80.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3091.tmp"C:\Users\Admin\AppData\Local\Temp\3091.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\31E8.tmp"C:\Users\Admin\AppData\Local\Temp\31E8.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\362E.tmp"C:\Users\Admin\AppData\Local\Temp\362E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\37B5.tmp"C:\Users\Admin\AppData\Local\Temp\37B5.tmp"23⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"24⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"25⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"26⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"27⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"28⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"29⤵
- Executes dropped EXE
PID:744 -
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"30⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"31⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"32⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"33⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\3EE8.tmp"C:\Users\Admin\AppData\Local\Temp\3EE8.tmp"34⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"35⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"36⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"37⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"38⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\41E6.tmp"C:\Users\Admin\AppData\Local\Temp\41E6.tmp"39⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp"40⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\42F0.tmp"C:\Users\Admin\AppData\Local\Temp\42F0.tmp"41⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\437C.tmp"C:\Users\Admin\AppData\Local\Temp\437C.tmp"42⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\44E4.tmp"C:\Users\Admin\AppData\Local\Temp\44E4.tmp"43⤵
- Executes dropped EXE
PID:792 -
C:\Users\Admin\AppData\Local\Temp\4561.tmp"C:\Users\Admin\AppData\Local\Temp\4561.tmp"44⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"45⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\4801.tmp"C:\Users\Admin\AppData\Local\Temp\4801.tmp"46⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"47⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"48⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"49⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\4A33.tmp"C:\Users\Admin\AppData\Local\Temp\4A33.tmp"50⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"51⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"52⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"53⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\4D21.tmp"C:\Users\Admin\AppData\Local\Temp\4D21.tmp"54⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"55⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"56⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\51A5.tmp"C:\Users\Admin\AppData\Local\Temp\51A5.tmp"57⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\52AF.tmp"C:\Users\Admin\AppData\Local\Temp\52AF.tmp"58⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"59⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"60⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"61⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\55BC.tmp"C:\Users\Admin\AppData\Local\Temp\55BC.tmp"62⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\56F5.tmp"C:\Users\Admin\AppData\Local\Temp\56F5.tmp"63⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\5762.tmp"C:\Users\Admin\AppData\Local\Temp\5762.tmp"64⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\584C.tmp"C:\Users\Admin\AppData\Local\Temp\584C.tmp"65⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\58F8.tmp"C:\Users\Admin\AppData\Local\Temp\58F8.tmp"66⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"67⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"68⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\5C44.tmp"C:\Users\Admin\AppData\Local\Temp\5C44.tmp"69⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"70⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"71⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\5E09.tmp"C:\Users\Admin\AppData\Local\Temp\5E09.tmp"72⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"73⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"74⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\603C.tmp"C:\Users\Admin\AppData\Local\Temp\603C.tmp"75⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"76⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\61E2.tmp"C:\Users\Admin\AppData\Local\Temp\61E2.tmp"77⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"78⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"79⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"80⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\64A1.tmp"C:\Users\Admin\AppData\Local\Temp\64A1.tmp"81⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\653D.tmp"C:\Users\Admin\AppData\Local\Temp\653D.tmp"82⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\6608.tmp"C:\Users\Admin\AppData\Local\Temp\6608.tmp"83⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\66D3.tmp"C:\Users\Admin\AppData\Local\Temp\66D3.tmp"84⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\678F.tmp"C:\Users\Admin\AppData\Local\Temp\678F.tmp"85⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\67FC.tmp"C:\Users\Admin\AppData\Local\Temp\67FC.tmp"86⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\68B8.tmp"C:\Users\Admin\AppData\Local\Temp\68B8.tmp"87⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\6954.tmp"C:\Users\Admin\AppData\Local\Temp\6954.tmp"88⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\6A00.tmp"C:\Users\Admin\AppData\Local\Temp\6A00.tmp"89⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"90⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"91⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"92⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\6C32.tmp"C:\Users\Admin\AppData\Local\Temp\6C32.tmp"93⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"94⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"95⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\6E26.tmp"C:\Users\Admin\AppData\Local\Temp\6E26.tmp"96⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\6EA3.tmp"C:\Users\Admin\AppData\Local\Temp\6EA3.tmp"97⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\6F30.tmp"C:\Users\Admin\AppData\Local\Temp\6F30.tmp"98⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6FAD.tmp"C:\Users\Admin\AppData\Local\Temp\6FAD.tmp"99⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\7068.tmp"C:\Users\Admin\AppData\Local\Temp\7068.tmp"100⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\70F5.tmp"C:\Users\Admin\AppData\Local\Temp\70F5.tmp"101⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"102⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\71EF.tmp"C:\Users\Admin\AppData\Local\Temp\71EF.tmp"103⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\72AA.tmp"C:\Users\Admin\AppData\Local\Temp\72AA.tmp"104⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\7385.tmp"C:\Users\Admin\AppData\Local\Temp\7385.tmp"105⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\7412.tmp"C:\Users\Admin\AppData\Local\Temp\7412.tmp"106⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\749E.tmp"C:\Users\Admin\AppData\Local\Temp\749E.tmp"107⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\750C.tmp"C:\Users\Admin\AppData\Local\Temp\750C.tmp"108⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\7598.tmp"C:\Users\Admin\AppData\Local\Temp\7598.tmp"109⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\7625.tmp"C:\Users\Admin\AppData\Local\Temp\7625.tmp"110⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\7692.tmp"C:\Users\Admin\AppData\Local\Temp\7692.tmp"111⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\775E.tmp"C:\Users\Admin\AppData\Local\Temp\775E.tmp"112⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\77BB.tmp"C:\Users\Admin\AppData\Local\Temp\77BB.tmp"113⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\7838.tmp"C:\Users\Admin\AppData\Local\Temp\7838.tmp"114⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"115⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\7923.tmp"C:\Users\Admin\AppData\Local\Temp\7923.tmp"116⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\79CF.tmp"C:\Users\Admin\AppData\Local\Temp\79CF.tmp"117⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\7A4C.tmp"C:\Users\Admin\AppData\Local\Temp\7A4C.tmp"118⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"119⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\7B55.tmp"C:\Users\Admin\AppData\Local\Temp\7B55.tmp"120⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\7BF1.tmp"C:\Users\Admin\AppData\Local\Temp\7BF1.tmp"121⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"122⤵PID:4084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-