Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 13:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe
-
Size
712KB
-
MD5
988db4a63fe86dab1044bb9353bc939c
-
SHA1
92c2185fddc4082c9d9f835b88585bb27ef6e923
-
SHA256
49356660df61b2c7928c8f1f2d0c0c001b0cb5945a3a8edcc3f02073bb3415c1
-
SHA512
ee2af12d40d46e46f492cae6d61b0ef242311b12a821e879c239e6be905b573979a50c426b59e14925e3b901e73f66a7089eb7242bec2cd74ff8429a2b9e1143
-
SSDEEP
12288:FU5rCOTeiDAibm/LpPITkdNrAVWDh+NZdCvq5TJLCvY90D8/LVBlVk736Y79GWzC:FUQOJDAiK/tPAkdNrAA1+NnCvq5TJLC0
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4004 1028.tmp 3352 1160.tmp 2756 1289.tmp 4352 1316.tmp 2776 1393.tmp 4572 14BC.tmp 4612 1558.tmp 1152 1604.tmp 4708 16CF.tmp 3044 179A.tmp 1712 1807.tmp 1552 1894.tmp 4292 1940.tmp 1504 1AF5.tmp 1680 1B92.tmp 1544 1C1E.tmp 1720 1CBA.tmp 2616 1DC4.tmp 408 1E31.tmp 1480 1EAE.tmp 3348 1F3B.tmp 4748 20A2.tmp 3168 212F.tmp 3872 21FA.tmp 4472 2277.tmp 4344 2323.tmp 4664 2390.tmp 2208 241D.tmp 3980 24AA.tmp 2536 2527.tmp 4372 25F2.tmp 4532 26AD.tmp 4868 28B1.tmp 3180 297C.tmp 4300 2A28.tmp 1260 2AE3.tmp 4540 2B70.tmp 4976 2BDD.tmp 4716 2C4B.tmp 64 2CF7.tmp 5040 2D64.tmp 4004 2DD1.tmp 4456 2E4E.tmp 4588 2EBC.tmp 3012 2F29.tmp 848 3062.tmp 2776 312D.tmp 4572 31D9.tmp 3304 3275.tmp 3152 32F2.tmp 1548 335F.tmp 1152 33DC.tmp 3092 344A.tmp 4984 34D6.tmp 4848 3553.tmp 3924 35C1.tmp 1012 365D.tmp 556 36F9.tmp 516 3767.tmp 1640 37F3.tmp 3484 3861.tmp 5016 38CE.tmp 1544 395B.tmp 1824 39C8.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4004 2748 2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe 91 PID 2748 wrote to memory of 4004 2748 2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe 91 PID 2748 wrote to memory of 4004 2748 2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe 91 PID 4004 wrote to memory of 3352 4004 1028.tmp 92 PID 4004 wrote to memory of 3352 4004 1028.tmp 92 PID 4004 wrote to memory of 3352 4004 1028.tmp 92 PID 3352 wrote to memory of 2756 3352 1160.tmp 93 PID 3352 wrote to memory of 2756 3352 1160.tmp 93 PID 3352 wrote to memory of 2756 3352 1160.tmp 93 PID 2756 wrote to memory of 4352 2756 1289.tmp 94 PID 2756 wrote to memory of 4352 2756 1289.tmp 94 PID 2756 wrote to memory of 4352 2756 1289.tmp 94 PID 4352 wrote to memory of 2776 4352 1316.tmp 189 PID 4352 wrote to memory of 2776 4352 1316.tmp 189 PID 4352 wrote to memory of 2776 4352 1316.tmp 189 PID 2776 wrote to memory of 4572 2776 1393.tmp 236 PID 2776 wrote to memory of 4572 2776 1393.tmp 236 PID 2776 wrote to memory of 4572 2776 1393.tmp 236 PID 4572 wrote to memory of 4612 4572 14BC.tmp 97 PID 4572 wrote to memory of 4612 4572 14BC.tmp 97 PID 4572 wrote to memory of 4612 4572 14BC.tmp 97 PID 4612 wrote to memory of 1152 4612 1558.tmp 142 PID 4612 wrote to memory of 1152 4612 1558.tmp 142 PID 4612 wrote to memory of 1152 4612 1558.tmp 142 PID 1152 wrote to memory of 4708 1152 1604.tmp 99 PID 1152 wrote to memory of 4708 1152 1604.tmp 99 PID 1152 wrote to memory of 4708 1152 1604.tmp 99 PID 4708 wrote to memory of 3044 4708 16CF.tmp 276 PID 4708 wrote to memory of 3044 4708 16CF.tmp 276 PID 4708 wrote to memory of 3044 4708 16CF.tmp 276 PID 3044 wrote to memory of 1712 3044 179A.tmp 101 PID 3044 wrote to memory of 1712 3044 179A.tmp 101 PID 3044 wrote to memory of 1712 3044 179A.tmp 101 PID 1712 wrote to memory of 1552 1712 1807.tmp 102 PID 1712 wrote to memory of 1552 1712 1807.tmp 102 PID 1712 wrote to memory of 1552 1712 1807.tmp 102 PID 1552 wrote to memory of 4292 1552 1894.tmp 103 PID 1552 wrote to memory of 4292 1552 1894.tmp 103 PID 1552 wrote to memory of 4292 1552 1894.tmp 103 PID 4292 wrote to memory of 1504 4292 1940.tmp 104 PID 4292 wrote to memory of 1504 4292 1940.tmp 104 PID 4292 wrote to memory of 1504 4292 1940.tmp 104 PID 1504 wrote to memory of 1680 1504 1AF5.tmp 105 PID 1504 wrote to memory of 1680 1504 1AF5.tmp 105 PID 1504 wrote to memory of 1680 1504 1AF5.tmp 105 PID 1680 wrote to memory of 1544 1680 1B92.tmp 280 PID 1680 wrote to memory of 1544 1680 1B92.tmp 280 PID 1680 wrote to memory of 1544 1680 1B92.tmp 280 PID 1544 wrote to memory of 1720 1544 1C1E.tmp 155 PID 1544 wrote to memory of 1720 1544 1C1E.tmp 155 PID 1544 wrote to memory of 1720 1544 1C1E.tmp 155 PID 1720 wrote to memory of 2616 1720 1CBA.tmp 108 PID 1720 wrote to memory of 2616 1720 1CBA.tmp 108 PID 1720 wrote to memory of 2616 1720 1CBA.tmp 108 PID 2616 wrote to memory of 408 2616 1DC4.tmp 109 PID 2616 wrote to memory of 408 2616 1DC4.tmp 109 PID 2616 wrote to memory of 408 2616 1DC4.tmp 109 PID 408 wrote to memory of 1480 408 1E31.tmp 159 PID 408 wrote to memory of 1480 408 1E31.tmp 159 PID 408 wrote to memory of 1480 408 1E31.tmp 159 PID 1480 wrote to memory of 3348 1480 1EAE.tmp 111 PID 1480 wrote to memory of 3348 1480 1EAE.tmp 111 PID 1480 wrote to memory of 3348 1480 1EAE.tmp 111 PID 3348 wrote to memory of 4748 3348 1F3B.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_988db4a63fe86dab1044bb9353bc939c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\1160.tmp"C:\Users\Admin\AppData\Local\Temp\1160.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\1316.tmp"C:\Users\Admin\AppData\Local\Temp\1316.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\14BC.tmp"C:\Users\Admin\AppData\Local\Temp\14BC.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\1558.tmp"C:\Users\Admin\AppData\Local\Temp\1558.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\16CF.tmp"C:\Users\Admin\AppData\Local\Temp\16CF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\1B92.tmp"C:\Users\Admin\AppData\Local\Temp\1B92.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\1F3B.tmp"C:\Users\Admin\AppData\Local\Temp\1F3B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\20A2.tmp"C:\Users\Admin\AppData\Local\Temp\20A2.tmp"23⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\212F.tmp"C:\Users\Admin\AppData\Local\Temp\212F.tmp"24⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\21FA.tmp"C:\Users\Admin\AppData\Local\Temp\21FA.tmp"25⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\2277.tmp"C:\Users\Admin\AppData\Local\Temp\2277.tmp"26⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\2323.tmp"C:\Users\Admin\AppData\Local\Temp\2323.tmp"27⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\2390.tmp"C:\Users\Admin\AppData\Local\Temp\2390.tmp"28⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\241D.tmp"C:\Users\Admin\AppData\Local\Temp\241D.tmp"29⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\24AA.tmp"C:\Users\Admin\AppData\Local\Temp\24AA.tmp"30⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\2527.tmp"C:\Users\Admin\AppData\Local\Temp\2527.tmp"31⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"32⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"33⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"34⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"35⤵
- Executes dropped EXE
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"36⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"37⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\2B70.tmp"C:\Users\Admin\AppData\Local\Temp\2B70.tmp"38⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"39⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"40⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"41⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"42⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"43⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"44⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"45⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"46⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"47⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"48⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\31D9.tmp"C:\Users\Admin\AppData\Local\Temp\31D9.tmp"49⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"50⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"51⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"52⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"53⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"54⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"55⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"56⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"57⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"58⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"59⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"60⤵
- Executes dropped EXE
PID:516 -
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"61⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\3861.tmp"C:\Users\Admin\AppData\Local\Temp\3861.tmp"62⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\38CE.tmp"C:\Users\Admin\AppData\Local\Temp\38CE.tmp"63⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\395B.tmp"C:\Users\Admin\AppData\Local\Temp\395B.tmp"64⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\39C8.tmp"C:\Users\Admin\AppData\Local\Temp\39C8.tmp"65⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"66⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"67⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"68⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\3C39.tmp"C:\Users\Admin\AppData\Local\Temp\3C39.tmp"69⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"70⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"71⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"72⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"73⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"74⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"75⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"76⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"77⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\4159.tmp"C:\Users\Admin\AppData\Local\Temp\4159.tmp"78⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\41D6.tmp"C:\Users\Admin\AppData\Local\Temp\41D6.tmp"79⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"80⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\42F0.tmp"C:\Users\Admin\AppData\Local\Temp\42F0.tmp"81⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"82⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"83⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"84⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"85⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"86⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"87⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"88⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"89⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\4929.tmp"C:\Users\Admin\AppData\Local\Temp\4929.tmp"90⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"91⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"92⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"93⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\4C37.tmp"C:\Users\Admin\AppData\Local\Temp\4C37.tmp"94⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"95⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"96⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"97⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"98⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"99⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"100⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"101⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\503E.tmp"C:\Users\Admin\AppData\Local\Temp\503E.tmp"102⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\50CB.tmp"C:\Users\Admin\AppData\Local\Temp\50CB.tmp"103⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\5138.tmp"C:\Users\Admin\AppData\Local\Temp\5138.tmp"104⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\51A5.tmp"C:\Users\Admin\AppData\Local\Temp\51A5.tmp"105⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\5280.tmp"C:\Users\Admin\AppData\Local\Temp\5280.tmp"106⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\52FD.tmp"C:\Users\Admin\AppData\Local\Temp\52FD.tmp"107⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"108⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"109⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\5474.tmp"C:\Users\Admin\AppData\Local\Temp\5474.tmp"110⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\54F1.tmp"C:\Users\Admin\AppData\Local\Temp\54F1.tmp"111⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\557E.tmp"C:\Users\Admin\AppData\Local\Temp\557E.tmp"112⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\55EB.tmp"C:\Users\Admin\AppData\Local\Temp\55EB.tmp"113⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\5697.tmp"C:\Users\Admin\AppData\Local\Temp\5697.tmp"114⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\5704.tmp"C:\Users\Admin\AppData\Local\Temp\5704.tmp"115⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\57C0.tmp"C:\Users\Admin\AppData\Local\Temp\57C0.tmp"116⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\584C.tmp"C:\Users\Admin\AppData\Local\Temp\584C.tmp"117⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"118⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\5927.tmp"C:\Users\Admin\AppData\Local\Temp\5927.tmp"119⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\59B4.tmp"C:\Users\Admin\AppData\Local\Temp\59B4.tmp"120⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\5A60.tmp"C:\Users\Admin\AppData\Local\Temp\5A60.tmp"121⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"122⤵PID:2172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-