Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 17:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe
-
Size
488KB
-
MD5
5259a3522eee86348125e08458ada302
-
SHA1
e6715336e491ee5547b59777aa648ec50d1308b9
-
SHA256
cd759967138c87fe032d9a58a7562e71a7bfe1c2173e9ec0673708b0c3f93e02
-
SHA512
8ff40ce5c2e540d2a3198b6fff00c4c0cc2202efbafdd1f244a7ff209359355c5751b1518817a23b7150af244e6b0f5461a5585138fcd5cc2e21ce6cd084f572
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD780k9VKjc5dHRbOpTgfa1UlV60Udj0Gk20MOv:/U5rCOTeiD8+jcQYaewxEJI3pazJNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1836 6419.tmp 464 64A5.tmp 3200 6522.tmp 964 65AF.tmp 5032 662C.tmp 1664 66D8.tmp 4680 6A72.tmp 3020 6C18.tmp 4604 6D7F.tmp 2628 7EE4.tmp 952 802C.tmp 556 8136.tmp 4664 81D2.tmp 2060 824F.tmp 3440 82DC.tmp 4360 8359.tmp 4052 83D6.tmp 920 8472.tmp 4692 854D.tmp 4624 85CA.tmp 756 89C1.tmp 2232 8A5E.tmp 4808 8ADB.tmp 4520 8D4C.tmp 1764 8DF8.tmp 4588 8EC3.tmp 1840 8F4F.tmp 4612 8FFB.tmp 1440 9078.tmp 4688 920E.tmp 2116 92AB.tmp 3500 9385.tmp 1832 9422.tmp 1436 94DD.tmp 4384 953B.tmp 4936 95D7.tmp 4608 9B17.tmp 640 9C6F.tmp 3632 9CEC.tmp 2836 9D59.tmp 448 9DC6.tmp 3464 9EE0.tmp 4368 9F7C.tmp 2432 9FE9.tmp 2376 A086.tmp 1300 A364.tmp 4680 A3D1.tmp 212 A44E.tmp 1148 A4CB.tmp 2212 A568.tmp 1276 A8C3.tmp 844 A9AD.tmp 556 AA0B.tmp 4664 AA78.tmp 2676 AAD6.tmp 1720 AF1C.tmp 3036 AFA9.tmp 3448 B035.tmp 2252 B0E1.tmp 1808 B16E.tmp 3388 B1FA.tmp 4660 B297.tmp 3420 B314.tmp 1408 B391.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 1836 4376 2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe 87 PID 4376 wrote to memory of 1836 4376 2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe 87 PID 4376 wrote to memory of 1836 4376 2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe 87 PID 1836 wrote to memory of 464 1836 6419.tmp 89 PID 1836 wrote to memory of 464 1836 6419.tmp 89 PID 1836 wrote to memory of 464 1836 6419.tmp 89 PID 464 wrote to memory of 3200 464 64A5.tmp 90 PID 464 wrote to memory of 3200 464 64A5.tmp 90 PID 464 wrote to memory of 3200 464 64A5.tmp 90 PID 3200 wrote to memory of 964 3200 6522.tmp 91 PID 3200 wrote to memory of 964 3200 6522.tmp 91 PID 3200 wrote to memory of 964 3200 6522.tmp 91 PID 964 wrote to memory of 5032 964 65AF.tmp 92 PID 964 wrote to memory of 5032 964 65AF.tmp 92 PID 964 wrote to memory of 5032 964 65AF.tmp 92 PID 5032 wrote to memory of 1664 5032 662C.tmp 93 PID 5032 wrote to memory of 1664 5032 662C.tmp 93 PID 5032 wrote to memory of 1664 5032 662C.tmp 93 PID 1664 wrote to memory of 4680 1664 66D8.tmp 94 PID 1664 wrote to memory of 4680 1664 66D8.tmp 94 PID 1664 wrote to memory of 4680 1664 66D8.tmp 94 PID 4680 wrote to memory of 3020 4680 6A72.tmp 95 PID 4680 wrote to memory of 3020 4680 6A72.tmp 95 PID 4680 wrote to memory of 3020 4680 6A72.tmp 95 PID 3020 wrote to memory of 4604 3020 6C18.tmp 96 PID 3020 wrote to memory of 4604 3020 6C18.tmp 96 PID 3020 wrote to memory of 4604 3020 6C18.tmp 96 PID 4604 wrote to memory of 2628 4604 6D7F.tmp 97 PID 4604 wrote to memory of 2628 4604 6D7F.tmp 97 PID 4604 wrote to memory of 2628 4604 6D7F.tmp 97 PID 2628 wrote to memory of 952 2628 7EE4.tmp 98 PID 2628 wrote to memory of 952 2628 7EE4.tmp 98 PID 2628 wrote to memory of 952 2628 7EE4.tmp 98 PID 952 wrote to memory of 556 952 802C.tmp 99 PID 952 wrote to memory of 556 952 802C.tmp 99 PID 952 wrote to memory of 556 952 802C.tmp 99 PID 556 wrote to memory of 4664 556 8136.tmp 100 PID 556 wrote to memory of 4664 556 8136.tmp 100 PID 556 wrote to memory of 4664 556 8136.tmp 100 PID 4664 wrote to memory of 2060 4664 81D2.tmp 101 PID 4664 wrote to memory of 2060 4664 81D2.tmp 101 PID 4664 wrote to memory of 2060 4664 81D2.tmp 101 PID 2060 wrote to memory of 3440 2060 824F.tmp 102 PID 2060 wrote to memory of 3440 2060 824F.tmp 102 PID 2060 wrote to memory of 3440 2060 824F.tmp 102 PID 3440 wrote to memory of 4360 3440 82DC.tmp 103 PID 3440 wrote to memory of 4360 3440 82DC.tmp 103 PID 3440 wrote to memory of 4360 3440 82DC.tmp 103 PID 4360 wrote to memory of 4052 4360 8359.tmp 104 PID 4360 wrote to memory of 4052 4360 8359.tmp 104 PID 4360 wrote to memory of 4052 4360 8359.tmp 104 PID 4052 wrote to memory of 920 4052 83D6.tmp 105 PID 4052 wrote to memory of 920 4052 83D6.tmp 105 PID 4052 wrote to memory of 920 4052 83D6.tmp 105 PID 920 wrote to memory of 4692 920 8472.tmp 106 PID 920 wrote to memory of 4692 920 8472.tmp 106 PID 920 wrote to memory of 4692 920 8472.tmp 106 PID 4692 wrote to memory of 4624 4692 854D.tmp 107 PID 4692 wrote to memory of 4624 4692 854D.tmp 107 PID 4692 wrote to memory of 4624 4692 854D.tmp 107 PID 4624 wrote to memory of 756 4624 85CA.tmp 108 PID 4624 wrote to memory of 756 4624 85CA.tmp 108 PID 4624 wrote to memory of 756 4624 85CA.tmp 108 PID 756 wrote to memory of 2232 756 89C1.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_5259a3522eee86348125e08458ada302_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\6522.tmp"C:\Users\Admin\AppData\Local\Temp\6522.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\65AF.tmp"C:\Users\Admin\AppData\Local\Temp\65AF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\66D8.tmp"C:\Users\Admin\AppData\Local\Temp\66D8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\6C18.tmp"C:\Users\Admin\AppData\Local\Temp\6C18.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\802C.tmp"C:\Users\Admin\AppData\Local\Temp\802C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\8136.tmp"C:\Users\Admin\AppData\Local\Temp\8136.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\81D2.tmp"C:\Users\Admin\AppData\Local\Temp\81D2.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\824F.tmp"C:\Users\Admin\AppData\Local\Temp\824F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\82DC.tmp"C:\Users\Admin\AppData\Local\Temp\82DC.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\8359.tmp"C:\Users\Admin\AppData\Local\Temp\8359.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\8472.tmp"C:\Users\Admin\AppData\Local\Temp\8472.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\854D.tmp"C:\Users\Admin\AppData\Local\Temp\854D.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\85CA.tmp"C:\Users\Admin\AppData\Local\Temp\85CA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\89C1.tmp"C:\Users\Admin\AppData\Local\Temp\89C1.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"23⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"24⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\8D4C.tmp"C:\Users\Admin\AppData\Local\Temp\8D4C.tmp"25⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\8DF8.tmp"C:\Users\Admin\AppData\Local\Temp\8DF8.tmp"26⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\8EC3.tmp"C:\Users\Admin\AppData\Local\Temp\8EC3.tmp"27⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"28⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"29⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"30⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\920E.tmp"C:\Users\Admin\AppData\Local\Temp\920E.tmp"31⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\92AB.tmp"C:\Users\Admin\AppData\Local\Temp\92AB.tmp"32⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\9385.tmp"C:\Users\Admin\AppData\Local\Temp\9385.tmp"33⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"34⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"35⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\953B.tmp"C:\Users\Admin\AppData\Local\Temp\953B.tmp"36⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\95D7.tmp"C:\Users\Admin\AppData\Local\Temp\95D7.tmp"37⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"38⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"39⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"40⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\9D59.tmp"C:\Users\Admin\AppData\Local\Temp\9D59.tmp"41⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"42⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"43⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"44⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"45⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\A086.tmp"C:\Users\Admin\AppData\Local\Temp\A086.tmp"46⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"47⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"48⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\A44E.tmp"C:\Users\Admin\AppData\Local\Temp\A44E.tmp"49⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"50⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\A568.tmp"C:\Users\Admin\AppData\Local\Temp\A568.tmp"51⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"52⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"53⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\AA0B.tmp"C:\Users\Admin\AppData\Local\Temp\AA0B.tmp"54⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"55⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"56⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"57⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"58⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"59⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"60⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\B16E.tmp"C:\Users\Admin\AppData\Local\Temp\B16E.tmp"61⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"62⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"63⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"64⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\B391.tmp"C:\Users\Admin\AppData\Local\Temp\B391.tmp"65⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"66⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\B48B.tmp"C:\Users\Admin\AppData\Local\Temp\B48B.tmp"67⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"68⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"69⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"70⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"71⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\B73A.tmp"C:\Users\Admin\AppData\Local\Temp\B73A.tmp"72⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"73⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"74⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"75⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"76⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"77⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"78⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\BA95.tmp"C:\Users\Admin\AppData\Local\Temp\BA95.tmp"79⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"80⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"81⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"82⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"83⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"84⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"85⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"86⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\BF68.tmp"C:\Users\Admin\AppData\Local\Temp\BF68.tmp"87⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"88⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\C062.tmp"C:\Users\Admin\AppData\Local\Temp\C062.tmp"89⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"90⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\C217.tmp"C:\Users\Admin\AppData\Local\Temp\C217.tmp"91⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"92⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\C39E.tmp"C:\Users\Admin\AppData\Local\Temp\C39E.tmp"93⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"94⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\C582.tmp"C:\Users\Admin\AppData\Local\Temp\C582.tmp"95⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\C747.tmp"C:\Users\Admin\AppData\Local\Temp\C747.tmp"96⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"97⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"98⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\CA74.tmp"C:\Users\Admin\AppData\Local\Temp\CA74.tmp"99⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\CB8D.tmp"C:\Users\Admin\AppData\Local\Temp\CB8D.tmp"100⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"101⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"102⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"103⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"104⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"105⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"106⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\D15A.tmp"C:\Users\Admin\AppData\Local\Temp\D15A.tmp"107⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"108⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\D263.tmp"C:\Users\Admin\AppData\Local\Temp\D263.tmp"109⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"110⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"111⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"112⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"113⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\D59F.tmp"C:\Users\Admin\AppData\Local\Temp\D59F.tmp"114⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"115⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"116⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\D86E.tmp"C:\Users\Admin\AppData\Local\Temp\D86E.tmp"117⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"118⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"119⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"120⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"121⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"122⤵PID:1764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-