Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 14:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe
-
Size
529KB
-
MD5
706b7685ab50302d6b346663053938e4
-
SHA1
70da8526961c98574412832aa89726b5ee90ba5c
-
SHA256
864e6b4b7fc7a5dc8545e054e0db182ade344553eb91928e95397e49efb9caf0
-
SHA512
9b7cb75710f60d1f3af1763373171ec801d5267399663ba741bdb1f28dade4be67a728e7ef2eb0b40e7c15335ebe280e8191c513b13d5fbf307b464585b2f04b
-
SSDEEP
12288:NU5rCOTeijlMiy7GHjSdSdG08vhZsmF0P638KTZwlH4Hp:NUQOJj2iTHxypF3bTSlH4Hp
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4464 77C0.tmp 1692 78CA.tmp 1980 79B4.tmp 4376 7A9E.tmp 1788 7B98.tmp 3460 7C64.tmp 4300 7D1F.tmp 2288 7DDB.tmp 780 7E96.tmp 5032 7FFD.tmp 3304 80F7.tmp 4336 81E2.tmp 1276 82CC.tmp 4676 8378.tmp 1496 8434.tmp 4488 84EF.tmp 3488 857C.tmp 5108 8647.tmp 792 86D3.tmp 1212 879F.tmp 1732 885A.tmp 1996 88D7.tmp 3940 8973.tmp 3200 8A00.tmp 776 8A8D.tmp 3308 8B48.tmp 2508 8BE4.tmp 3668 8C71.tmp 2444 8D1D.tmp 3196 8DD8.tmp 2172 8E94.tmp 2044 8F5F.tmp 4872 9059.tmp 4372 90C6.tmp 1364 9143.tmp 1892 91C0.tmp 4920 921E.tmp 2808 927C.tmp 2040 92F9.tmp 3476 9357.tmp 5100 93B4.tmp 4376 9431.tmp 5016 949F.tmp 4068 94FC.tmp 2288 9579.tmp 1592 95D7.tmp 2900 9635.tmp 1384 96A2.tmp 4716 9710.tmp 2640 976D.tmp 4520 97DB.tmp 2104 9839.tmp 1268 98A6.tmp 4876 9913.tmp 1988 9971.tmp 3016 99EE.tmp 2320 9A4C.tmp 4584 9AAA.tmp 1412 9B07.tmp 5036 9B65.tmp 4316 9BC3.tmp 4056 9C7E.tmp 812 9CFB.tmp 868 9D88.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4464 3092 2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe 85 PID 3092 wrote to memory of 4464 3092 2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe 85 PID 3092 wrote to memory of 4464 3092 2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe 85 PID 4464 wrote to memory of 1692 4464 77C0.tmp 86 PID 4464 wrote to memory of 1692 4464 77C0.tmp 86 PID 4464 wrote to memory of 1692 4464 77C0.tmp 86 PID 1692 wrote to memory of 1980 1692 78CA.tmp 87 PID 1692 wrote to memory of 1980 1692 78CA.tmp 87 PID 1692 wrote to memory of 1980 1692 78CA.tmp 87 PID 1980 wrote to memory of 4376 1980 79B4.tmp 88 PID 1980 wrote to memory of 4376 1980 79B4.tmp 88 PID 1980 wrote to memory of 4376 1980 79B4.tmp 88 PID 4376 wrote to memory of 1788 4376 7A9E.tmp 90 PID 4376 wrote to memory of 1788 4376 7A9E.tmp 90 PID 4376 wrote to memory of 1788 4376 7A9E.tmp 90 PID 1788 wrote to memory of 3460 1788 7B98.tmp 91 PID 1788 wrote to memory of 3460 1788 7B98.tmp 91 PID 1788 wrote to memory of 3460 1788 7B98.tmp 91 PID 3460 wrote to memory of 4300 3460 7C64.tmp 92 PID 3460 wrote to memory of 4300 3460 7C64.tmp 92 PID 3460 wrote to memory of 4300 3460 7C64.tmp 92 PID 4300 wrote to memory of 2288 4300 7D1F.tmp 93 PID 4300 wrote to memory of 2288 4300 7D1F.tmp 93 PID 4300 wrote to memory of 2288 4300 7D1F.tmp 93 PID 2288 wrote to memory of 780 2288 7DDB.tmp 94 PID 2288 wrote to memory of 780 2288 7DDB.tmp 94 PID 2288 wrote to memory of 780 2288 7DDB.tmp 94 PID 780 wrote to memory of 5032 780 7E96.tmp 95 PID 780 wrote to memory of 5032 780 7E96.tmp 95 PID 780 wrote to memory of 5032 780 7E96.tmp 95 PID 5032 wrote to memory of 3304 5032 7FFD.tmp 96 PID 5032 wrote to memory of 3304 5032 7FFD.tmp 96 PID 5032 wrote to memory of 3304 5032 7FFD.tmp 96 PID 3304 wrote to memory of 4336 3304 80F7.tmp 97 PID 3304 wrote to memory of 4336 3304 80F7.tmp 97 PID 3304 wrote to memory of 4336 3304 80F7.tmp 97 PID 4336 wrote to memory of 1276 4336 81E2.tmp 98 PID 4336 wrote to memory of 1276 4336 81E2.tmp 98 PID 4336 wrote to memory of 1276 4336 81E2.tmp 98 PID 1276 wrote to memory of 4676 1276 82CC.tmp 99 PID 1276 wrote to memory of 4676 1276 82CC.tmp 99 PID 1276 wrote to memory of 4676 1276 82CC.tmp 99 PID 4676 wrote to memory of 1496 4676 8378.tmp 100 PID 4676 wrote to memory of 1496 4676 8378.tmp 100 PID 4676 wrote to memory of 1496 4676 8378.tmp 100 PID 1496 wrote to memory of 4488 1496 8434.tmp 102 PID 1496 wrote to memory of 4488 1496 8434.tmp 102 PID 1496 wrote to memory of 4488 1496 8434.tmp 102 PID 4488 wrote to memory of 3488 4488 84EF.tmp 103 PID 4488 wrote to memory of 3488 4488 84EF.tmp 103 PID 4488 wrote to memory of 3488 4488 84EF.tmp 103 PID 3488 wrote to memory of 5108 3488 857C.tmp 104 PID 3488 wrote to memory of 5108 3488 857C.tmp 104 PID 3488 wrote to memory of 5108 3488 857C.tmp 104 PID 5108 wrote to memory of 792 5108 8647.tmp 105 PID 5108 wrote to memory of 792 5108 8647.tmp 105 PID 5108 wrote to memory of 792 5108 8647.tmp 105 PID 792 wrote to memory of 1212 792 86D3.tmp 106 PID 792 wrote to memory of 1212 792 86D3.tmp 106 PID 792 wrote to memory of 1212 792 86D3.tmp 106 PID 1212 wrote to memory of 1732 1212 879F.tmp 107 PID 1212 wrote to memory of 1732 1212 879F.tmp 107 PID 1212 wrote to memory of 1732 1212 879F.tmp 107 PID 1732 wrote to memory of 1996 1732 885A.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_706b7685ab50302d6b346663053938e4_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\79B4.tmp"C:\Users\Admin\AppData\Local\Temp\79B4.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\7B98.tmp"C:\Users\Admin\AppData\Local\Temp\7B98.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\7E96.tmp"C:\Users\Admin\AppData\Local\Temp\7E96.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\82CC.tmp"C:\Users\Admin\AppData\Local\Temp\82CC.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\8378.tmp"C:\Users\Admin\AppData\Local\Temp\8378.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\8434.tmp"C:\Users\Admin\AppData\Local\Temp\8434.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\84EF.tmp"C:\Users\Admin\AppData\Local\Temp\84EF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\8647.tmp"C:\Users\Admin\AppData\Local\Temp\8647.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\86D3.tmp"C:\Users\Admin\AppData\Local\Temp\86D3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\879F.tmp"C:\Users\Admin\AppData\Local\Temp\879F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\885A.tmp"C:\Users\Admin\AppData\Local\Temp\885A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\88D7.tmp"C:\Users\Admin\AppData\Local\Temp\88D7.tmp"23⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\8973.tmp"C:\Users\Admin\AppData\Local\Temp\8973.tmp"24⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\8A00.tmp"C:\Users\Admin\AppData\Local\Temp\8A00.tmp"25⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"26⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\8B48.tmp"C:\Users\Admin\AppData\Local\Temp\8B48.tmp"27⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"28⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\8C71.tmp"C:\Users\Admin\AppData\Local\Temp\8C71.tmp"29⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"30⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\8DD8.tmp"C:\Users\Admin\AppData\Local\Temp\8DD8.tmp"31⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"32⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"33⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\9059.tmp"C:\Users\Admin\AppData\Local\Temp\9059.tmp"34⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\90C6.tmp"C:\Users\Admin\AppData\Local\Temp\90C6.tmp"35⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\9143.tmp"C:\Users\Admin\AppData\Local\Temp\9143.tmp"36⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\91C0.tmp"C:\Users\Admin\AppData\Local\Temp\91C0.tmp"37⤵
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\921E.tmp"C:\Users\Admin\AppData\Local\Temp\921E.tmp"38⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\927C.tmp"C:\Users\Admin\AppData\Local\Temp\927C.tmp"39⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"40⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\9357.tmp"C:\Users\Admin\AppData\Local\Temp\9357.tmp"41⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\93B4.tmp"C:\Users\Admin\AppData\Local\Temp\93B4.tmp"42⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\9431.tmp"C:\Users\Admin\AppData\Local\Temp\9431.tmp"43⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\949F.tmp"C:\Users\Admin\AppData\Local\Temp\949F.tmp"44⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\94FC.tmp"C:\Users\Admin\AppData\Local\Temp\94FC.tmp"45⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\9579.tmp"C:\Users\Admin\AppData\Local\Temp\9579.tmp"46⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\95D7.tmp"C:\Users\Admin\AppData\Local\Temp\95D7.tmp"47⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\9635.tmp"C:\Users\Admin\AppData\Local\Temp\9635.tmp"48⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\96A2.tmp"C:\Users\Admin\AppData\Local\Temp\96A2.tmp"49⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\9710.tmp"C:\Users\Admin\AppData\Local\Temp\9710.tmp"50⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\976D.tmp"C:\Users\Admin\AppData\Local\Temp\976D.tmp"51⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\97DB.tmp"C:\Users\Admin\AppData\Local\Temp\97DB.tmp"52⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\9839.tmp"C:\Users\Admin\AppData\Local\Temp\9839.tmp"53⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\98A6.tmp"C:\Users\Admin\AppData\Local\Temp\98A6.tmp"54⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\9913.tmp"C:\Users\Admin\AppData\Local\Temp\9913.tmp"55⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\9971.tmp"C:\Users\Admin\AppData\Local\Temp\9971.tmp"56⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\99EE.tmp"C:\Users\Admin\AppData\Local\Temp\99EE.tmp"57⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"58⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\9AAA.tmp"C:\Users\Admin\AppData\Local\Temp\9AAA.tmp"59⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"60⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\9B65.tmp"C:\Users\Admin\AppData\Local\Temp\9B65.tmp"61⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"62⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"63⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\9CFB.tmp"C:\Users\Admin\AppData\Local\Temp\9CFB.tmp"64⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\9D88.tmp"C:\Users\Admin\AppData\Local\Temp\9D88.tmp"65⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"66⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"67⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"68⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"69⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\A057.tmp"C:\Users\Admin\AppData\Local\Temp\A057.tmp"70⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"71⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\A18F.tmp"C:\Users\Admin\AppData\Local\Temp\A18F.tmp"72⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"73⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"74⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"75⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"76⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"77⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"78⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\A587.tmp"C:\Users\Admin\AppData\Local\Temp\A587.tmp"79⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\A604.tmp"C:\Users\Admin\AppData\Local\Temp\A604.tmp"80⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\A681.tmp"C:\Users\Admin\AppData\Local\Temp\A681.tmp"81⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"82⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\A77B.tmp"C:\Users\Admin\AppData\Local\Temp\A77B.tmp"83⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\A817.tmp"C:\Users\Admin\AppData\Local\Temp\A817.tmp"84⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"85⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"86⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"87⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\AA98.tmp"C:\Users\Admin\AppData\Local\Temp\AA98.tmp"88⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\AB15.tmp"C:\Users\Admin\AppData\Local\Temp\AB15.tmp"89⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"90⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"91⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"92⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\AD66.tmp"C:\Users\Admin\AppData\Local\Temp\AD66.tmp"93⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\AE12.tmp"C:\Users\Admin\AppData\Local\Temp\AE12.tmp"94⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"95⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"96⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"97⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\B054.tmp"C:\Users\Admin\AppData\Local\Temp\B054.tmp"98⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"99⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"100⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"101⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\B2C5.tmp"C:\Users\Admin\AppData\Local\Temp\B2C5.tmp"102⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"103⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"104⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"105⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"106⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"107⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\B621.tmp"C:\Users\Admin\AppData\Local\Temp\B621.tmp"108⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"109⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"110⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"111⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\B873.tmp"C:\Users\Admin\AppData\Local\Temp\B873.tmp"112⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"113⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"114⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\BA38.tmp"C:\Users\Admin\AppData\Local\Temp\BA38.tmp"115⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\BAF3.tmp"C:\Users\Admin\AppData\Local\Temp\BAF3.tmp"116⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\BB9F.tmp"C:\Users\Admin\AppData\Local\Temp\BB9F.tmp"117⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"118⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"119⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\BD45.tmp"C:\Users\Admin\AppData\Local\Temp\BD45.tmp"120⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"121⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"122⤵PID:3472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-