Analysis
-
max time kernel
159s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 12:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe
-
Size
486KB
-
MD5
81390491e11fe4a6d29082eedf7e53dd
-
SHA1
1d4893c6b0c9a745f07a069b575fdef625a172e4
-
SHA256
e944b53a72ce82f964e085aa9b26eb1240fc8da90276844b5ab5bdf34d16bdca
-
SHA512
7d23bcf9aeb06375173e1707db137f8342167712b3f2ec1d4dbe0e502f3b06ee50a955eabc32e8c487071f526993fd71999632904e8127bb7f73eb8071b9a66f
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD7axmtVD2Jd/Gs92xcTe3hN4SLx/VVYjR91vsz:UU5rCOTeiDaxmer92xcuNZdwVLUNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 932 4AC0.tmp 2860 5157.tmp 884 53A9.tmp 4900 54B3.tmp 1612 555E.tmp 224 55FB.tmp 4204 58BA.tmp 3732 5B2B.tmp 2124 5D0F.tmp 4920 5F03.tmp 1424 60E8.tmp 4508 61C2.tmp 456 62FB.tmp 1472 63F5.tmp 3784 64C0.tmp 3852 66C4.tmp 2528 682B.tmp 1180 6A3E.tmp 4944 6C23.tmp 3688 6F30.tmp 1796 71FF.tmp 1392 7356.tmp 716 7431.tmp 1968 7579.tmp 2288 7673.tmp 376 774E.tmp 396 7896.tmp 408 7971.tmp 1860 7AB9.tmp 3656 7BF1.tmp 2544 7D0B.tmp 972 7DF5.tmp 2100 7E82.tmp 1988 7EFF.tmp 4320 7FCA.tmp 4100 8047.tmp 2372 8131.tmp 1996 81AE.tmp 1960 82A8.tmp 2004 8383.tmp 2892 85F4.tmp 4572 86EE.tmp 2976 8940.tmp 2140 8A59.tmp 5108 8B53.tmp 5092 8C0E.tmp 224 8E60.tmp 1032 8F1C.tmp 3904 8FA8.tmp 1660 9045.tmp 1124 90D1.tmp 3632 915E.tmp 2084 93A0.tmp 3932 9527.tmp 948 95D2.tmp 2120 990F.tmp 1160 9A18.tmp 2440 9B51.tmp 4576 9D25.tmp 2812 9DC2.tmp 3128 9E3F.tmp 4052 9ECB.tmp 4252 A0FE.tmp 3648 A18A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 932 3104 2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe 89 PID 3104 wrote to memory of 932 3104 2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe 89 PID 3104 wrote to memory of 932 3104 2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe 89 PID 932 wrote to memory of 2860 932 4AC0.tmp 90 PID 932 wrote to memory of 2860 932 4AC0.tmp 90 PID 932 wrote to memory of 2860 932 4AC0.tmp 90 PID 2860 wrote to memory of 884 2860 5157.tmp 91 PID 2860 wrote to memory of 884 2860 5157.tmp 91 PID 2860 wrote to memory of 884 2860 5157.tmp 91 PID 884 wrote to memory of 4900 884 53A9.tmp 92 PID 884 wrote to memory of 4900 884 53A9.tmp 92 PID 884 wrote to memory of 4900 884 53A9.tmp 92 PID 4900 wrote to memory of 1612 4900 54B3.tmp 93 PID 4900 wrote to memory of 1612 4900 54B3.tmp 93 PID 4900 wrote to memory of 1612 4900 54B3.tmp 93 PID 1612 wrote to memory of 224 1612 555E.tmp 94 PID 1612 wrote to memory of 224 1612 555E.tmp 94 PID 1612 wrote to memory of 224 1612 555E.tmp 94 PID 224 wrote to memory of 4204 224 55FB.tmp 95 PID 224 wrote to memory of 4204 224 55FB.tmp 95 PID 224 wrote to memory of 4204 224 55FB.tmp 95 PID 4204 wrote to memory of 3732 4204 58BA.tmp 96 PID 4204 wrote to memory of 3732 4204 58BA.tmp 96 PID 4204 wrote to memory of 3732 4204 58BA.tmp 96 PID 3732 wrote to memory of 2124 3732 5B2B.tmp 97 PID 3732 wrote to memory of 2124 3732 5B2B.tmp 97 PID 3732 wrote to memory of 2124 3732 5B2B.tmp 97 PID 2124 wrote to memory of 4920 2124 5D0F.tmp 98 PID 2124 wrote to memory of 4920 2124 5D0F.tmp 98 PID 2124 wrote to memory of 4920 2124 5D0F.tmp 98 PID 4920 wrote to memory of 1424 4920 5F03.tmp 99 PID 4920 wrote to memory of 1424 4920 5F03.tmp 99 PID 4920 wrote to memory of 1424 4920 5F03.tmp 99 PID 1424 wrote to memory of 4508 1424 60E8.tmp 100 PID 1424 wrote to memory of 4508 1424 60E8.tmp 100 PID 1424 wrote to memory of 4508 1424 60E8.tmp 100 PID 4508 wrote to memory of 456 4508 61C2.tmp 101 PID 4508 wrote to memory of 456 4508 61C2.tmp 101 PID 4508 wrote to memory of 456 4508 61C2.tmp 101 PID 456 wrote to memory of 1472 456 62FB.tmp 102 PID 456 wrote to memory of 1472 456 62FB.tmp 102 PID 456 wrote to memory of 1472 456 62FB.tmp 102 PID 1472 wrote to memory of 3784 1472 63F5.tmp 103 PID 1472 wrote to memory of 3784 1472 63F5.tmp 103 PID 1472 wrote to memory of 3784 1472 63F5.tmp 103 PID 3784 wrote to memory of 3852 3784 64C0.tmp 104 PID 3784 wrote to memory of 3852 3784 64C0.tmp 104 PID 3784 wrote to memory of 3852 3784 64C0.tmp 104 PID 3852 wrote to memory of 2528 3852 66C4.tmp 105 PID 3852 wrote to memory of 2528 3852 66C4.tmp 105 PID 3852 wrote to memory of 2528 3852 66C4.tmp 105 PID 2528 wrote to memory of 1180 2528 682B.tmp 106 PID 2528 wrote to memory of 1180 2528 682B.tmp 106 PID 2528 wrote to memory of 1180 2528 682B.tmp 106 PID 1180 wrote to memory of 4944 1180 6A3E.tmp 107 PID 1180 wrote to memory of 4944 1180 6A3E.tmp 107 PID 1180 wrote to memory of 4944 1180 6A3E.tmp 107 PID 4944 wrote to memory of 3688 4944 6C23.tmp 108 PID 4944 wrote to memory of 3688 4944 6C23.tmp 108 PID 4944 wrote to memory of 3688 4944 6C23.tmp 108 PID 3688 wrote to memory of 1796 3688 6F30.tmp 109 PID 3688 wrote to memory of 1796 3688 6F30.tmp 109 PID 3688 wrote to memory of 1796 3688 6F30.tmp 109 PID 1796 wrote to memory of 1392 1796 71FF.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_81390491e11fe4a6d29082eedf7e53dd_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\53A9.tmp"C:\Users\Admin\AppData\Local\Temp\53A9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\54B3.tmp"C:\Users\Admin\AppData\Local\Temp\54B3.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\555E.tmp"C:\Users\Admin\AppData\Local\Temp\555E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\55FB.tmp"C:\Users\Admin\AppData\Local\Temp\55FB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\60E8.tmp"C:\Users\Admin\AppData\Local\Temp\60E8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\61C2.tmp"C:\Users\Admin\AppData\Local\Temp\61C2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\66C4.tmp"C:\Users\Admin\AppData\Local\Temp\66C4.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\682B.tmp"C:\Users\Admin\AppData\Local\Temp\682B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\6C23.tmp"C:\Users\Admin\AppData\Local\Temp\6C23.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\6F30.tmp"C:\Users\Admin\AppData\Local\Temp\6F30.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\71FF.tmp"C:\Users\Admin\AppData\Local\Temp\71FF.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\7356.tmp"C:\Users\Admin\AppData\Local\Temp\7356.tmp"23⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"24⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\7579.tmp"C:\Users\Admin\AppData\Local\Temp\7579.tmp"25⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\7673.tmp"C:\Users\Admin\AppData\Local\Temp\7673.tmp"26⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"27⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\7896.tmp"C:\Users\Admin\AppData\Local\Temp\7896.tmp"28⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\7971.tmp"C:\Users\Admin\AppData\Local\Temp\7971.tmp"29⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"30⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\7BF1.tmp"C:\Users\Admin\AppData\Local\Temp\7BF1.tmp"31⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"32⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\7DF5.tmp"C:\Users\Admin\AppData\Local\Temp\7DF5.tmp"33⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\7E82.tmp"C:\Users\Admin\AppData\Local\Temp\7E82.tmp"34⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"35⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"36⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\8047.tmp"C:\Users\Admin\AppData\Local\Temp\8047.tmp"37⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\8131.tmp"C:\Users\Admin\AppData\Local\Temp\8131.tmp"38⤵
- Executes dropped EXE
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\81AE.tmp"C:\Users\Admin\AppData\Local\Temp\81AE.tmp"39⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\82A8.tmp"C:\Users\Admin\AppData\Local\Temp\82A8.tmp"40⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\8383.tmp"C:\Users\Admin\AppData\Local\Temp\8383.tmp"41⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\85F4.tmp"C:\Users\Admin\AppData\Local\Temp\85F4.tmp"42⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\86EE.tmp"C:\Users\Admin\AppData\Local\Temp\86EE.tmp"43⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\8940.tmp"C:\Users\Admin\AppData\Local\Temp\8940.tmp"44⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\8A59.tmp"C:\Users\Admin\AppData\Local\Temp\8A59.tmp"45⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\8B53.tmp"C:\Users\Admin\AppData\Local\Temp\8B53.tmp"46⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\8C0E.tmp"C:\Users\Admin\AppData\Local\Temp\8C0E.tmp"47⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\8E60.tmp"C:\Users\Admin\AppData\Local\Temp\8E60.tmp"48⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\8F1C.tmp"C:\Users\Admin\AppData\Local\Temp\8F1C.tmp"49⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\8FA8.tmp"C:\Users\Admin\AppData\Local\Temp\8FA8.tmp"50⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\9045.tmp"C:\Users\Admin\AppData\Local\Temp\9045.tmp"51⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\90D1.tmp"C:\Users\Admin\AppData\Local\Temp\90D1.tmp"52⤵
- Executes dropped EXE
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\915E.tmp"C:\Users\Admin\AppData\Local\Temp\915E.tmp"53⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\93A0.tmp"C:\Users\Admin\AppData\Local\Temp\93A0.tmp"54⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\9527.tmp"C:\Users\Admin\AppData\Local\Temp\9527.tmp"55⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\95D2.tmp"C:\Users\Admin\AppData\Local\Temp\95D2.tmp"56⤵
- Executes dropped EXE
PID:948 -
C:\Users\Admin\AppData\Local\Temp\990F.tmp"C:\Users\Admin\AppData\Local\Temp\990F.tmp"57⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\9A18.tmp"C:\Users\Admin\AppData\Local\Temp\9A18.tmp"58⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\9B51.tmp"C:\Users\Admin\AppData\Local\Temp\9B51.tmp"59⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\9D25.tmp"C:\Users\Admin\AppData\Local\Temp\9D25.tmp"60⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\9DC2.tmp"C:\Users\Admin\AppData\Local\Temp\9DC2.tmp"61⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"62⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\9ECB.tmp"C:\Users\Admin\AppData\Local\Temp\9ECB.tmp"63⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\A0FE.tmp"C:\Users\Admin\AppData\Local\Temp\A0FE.tmp"64⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\A18A.tmp"C:\Users\Admin\AppData\Local\Temp\A18A.tmp"65⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\A265.tmp"C:\Users\Admin\AppData\Local\Temp\A265.tmp"66⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"67⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\A43A.tmp"C:\Users\Admin\AppData\Local\Temp\A43A.tmp"68⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\A4E6.tmp"C:\Users\Admin\AppData\Local\Temp\A4E6.tmp"69⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"70⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\A66C.tmp"C:\Users\Admin\AppData\Local\Temp\A66C.tmp"71⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\A860.tmp"C:\Users\Admin\AppData\Local\Temp\A860.tmp"72⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"73⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\A999.tmp"C:\Users\Admin\AppData\Local\Temp\A999.tmp"74⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\AA26.tmp"C:\Users\Admin\AppData\Local\Temp\AA26.tmp"75⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\AAE1.tmp"C:\Users\Admin\AppData\Local\Temp\AAE1.tmp"76⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\AB6E.tmp"C:\Users\Admin\AppData\Local\Temp\AB6E.tmp"77⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"78⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\AC58.tmp"C:\Users\Admin\AppData\Local\Temp\AC58.tmp"79⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\AD71.tmp"C:\Users\Admin\AppData\Local\Temp\AD71.tmp"80⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\ADEE.tmp"C:\Users\Admin\AppData\Local\Temp\ADEE.tmp"81⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\AE6B.tmp"C:\Users\Admin\AppData\Local\Temp\AE6B.tmp"82⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\AF27.tmp"C:\Users\Admin\AppData\Local\Temp\AF27.tmp"83⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\AFF2.tmp"C:\Users\Admin\AppData\Local\Temp\AFF2.tmp"84⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\B07F.tmp"C:\Users\Admin\AppData\Local\Temp\B07F.tmp"85⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\B12A.tmp"C:\Users\Admin\AppData\Local\Temp\B12A.tmp"86⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\B198.tmp"C:\Users\Admin\AppData\Local\Temp\B198.tmp"87⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\B224.tmp"C:\Users\Admin\AppData\Local\Temp\B224.tmp"88⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"89⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\B37C.tmp"C:\Users\Admin\AppData\Local\Temp\B37C.tmp"90⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\B418.tmp"C:\Users\Admin\AppData\Local\Temp\B418.tmp"91⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\B486.tmp"C:\Users\Admin\AppData\Local\Temp\B486.tmp"92⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\B532.tmp"C:\Users\Admin\AppData\Local\Temp\B532.tmp"93⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\B5DE.tmp"C:\Users\Admin\AppData\Local\Temp\B5DE.tmp"94⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\B64B.tmp"C:\Users\Admin\AppData\Local\Temp\B64B.tmp"95⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\B84F.tmp"C:\Users\Admin\AppData\Local\Temp\B84F.tmp"96⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\B8EB.tmp"C:\Users\Admin\AppData\Local\Temp\B8EB.tmp"97⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\B968.tmp"C:\Users\Admin\AppData\Local\Temp\B968.tmp"98⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\B9F4.tmp"C:\Users\Admin\AppData\Local\Temp\B9F4.tmp"99⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\BA81.tmp"C:\Users\Admin\AppData\Local\Temp\BA81.tmp"100⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\BB0E.tmp"C:\Users\Admin\AppData\Local\Temp\BB0E.tmp"101⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"102⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\BC65.tmp"C:\Users\Admin\AppData\Local\Temp\BC65.tmp"103⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\BCD3.tmp"C:\Users\Admin\AppData\Local\Temp\BCD3.tmp"104⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\BD7F.tmp"C:\Users\Admin\AppData\Local\Temp\BD7F.tmp"105⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\BF15.tmp"C:\Users\Admin\AppData\Local\Temp\BF15.tmp"106⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\BF92.tmp"C:\Users\Admin\AppData\Local\Temp\BF92.tmp"107⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\C00F.tmp"C:\Users\Admin\AppData\Local\Temp\C00F.tmp"108⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\C0AB.tmp"C:\Users\Admin\AppData\Local\Temp\C0AB.tmp"109⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\C147.tmp"C:\Users\Admin\AppData\Local\Temp\C147.tmp"110⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\C1E4.tmp"C:\Users\Admin\AppData\Local\Temp\C1E4.tmp"111⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\C261.tmp"C:\Users\Admin\AppData\Local\Temp\C261.tmp"112⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\C2ED.tmp"C:\Users\Admin\AppData\Local\Temp\C2ED.tmp"113⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\C35B.tmp"C:\Users\Admin\AppData\Local\Temp\C35B.tmp"114⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\C435.tmp"C:\Users\Admin\AppData\Local\Temp\C435.tmp"115⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\C52F.tmp"C:\Users\Admin\AppData\Local\Temp\C52F.tmp"116⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\C59D.tmp"C:\Users\Admin\AppData\Local\Temp\C59D.tmp"117⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\C629.tmp"C:\Users\Admin\AppData\Local\Temp\C629.tmp"118⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\C6F5.tmp"C:\Users\Admin\AppData\Local\Temp\C6F5.tmp"119⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\C781.tmp"C:\Users\Admin\AppData\Local\Temp\C781.tmp"120⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"121⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\C88B.tmp"C:\Users\Admin\AppData\Local\Temp\C88B.tmp"122⤵PID:4760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-