Analysis
-
max time kernel
78s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 14:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe
Resource
win7-20240419-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe
Resource
win10v2004-20240419-en
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe
-
Size
536KB
-
MD5
087f8ce4ed7d03f94feee810c48d84ed
-
SHA1
b4ede67a07e2ec5a1b627f93ff7330e8ea398a5a
-
SHA256
22adf0bc64509f44a22571005ba31503da4db5bf404ad9b9d0f038bb10b913ea
-
SHA512
53cc90779b3732ba85ad36a12463c75ec96fa983703e5217962cd134e561e7d9985e50f9932ea47e687a868e2e2b8c8145ac7786c5f8a27f0c05b300d743dd02
-
SSDEEP
12288:wU5rCOTeiUogWuYdshF0CZB4Rot2Z6VIZxVJ0ZT9:wUQOJUovuMq0C74iRIRJ0ZT9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3088 31FD.tmp 4512 32D7.tmp 3324 3393.tmp 3156 342F.tmp 4736 34DB.tmp 2064 3577.tmp 4448 3623.tmp 396 36CF.tmp 3308 376B.tmp 1404 37D9.tmp 4912 3894.tmp 4264 3911.tmp 232 39AD.tmp 2988 3A4A.tmp 3664 3AE6.tmp 2316 3B92.tmp 4240 3C1E.tmp 4296 3CCA.tmp 1636 3D76.tmp 412 3DF3.tmp 3520 3EAF.tmp 4924 3F2C.tmp 3892 3FE7.tmp 3208 4083.tmp 3284 415E.tmp 3132 41FA.tmp 2564 42A6.tmp 4424 4333.tmp 4748 43CF.tmp 3000 444C.tmp 956 44D9.tmp 5020 4575.tmp 1568 4602.tmp 4684 4650.tmp 3088 46AE.tmp 3508 472B.tmp 760 4788.tmp 1712 4805.tmp 2120 4853.tmp 2284 48B1.tmp 3004 491F.tmp 3716 498C.tmp 1184 49DA.tmp 3204 4A57.tmp 1752 4AB5.tmp 4104 4B13.tmp 3712 4B80.tmp 4816 4BED.tmp 5108 4C4B.tmp 3980 4C99.tmp 5000 4CE7.tmp 3640 4D35.tmp 2012 4D84.tmp 1036 4DE1.tmp 3664 4E3F.tmp 1376 4E8D.tmp 4148 4ECC.tmp 4240 4F0A.tmp 4460 4F58.tmp 1528 4FB6.tmp 2244 5004.tmp 412 5052.tmp 4356 50B0.tmp 3468 50EF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3088 4128 2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe 84 PID 4128 wrote to memory of 3088 4128 2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe 84 PID 4128 wrote to memory of 3088 4128 2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe 84 PID 3088 wrote to memory of 4512 3088 31FD.tmp 85 PID 3088 wrote to memory of 4512 3088 31FD.tmp 85 PID 3088 wrote to memory of 4512 3088 31FD.tmp 85 PID 4512 wrote to memory of 3324 4512 32D7.tmp 87 PID 4512 wrote to memory of 3324 4512 32D7.tmp 87 PID 4512 wrote to memory of 3324 4512 32D7.tmp 87 PID 3324 wrote to memory of 3156 3324 3393.tmp 89 PID 3324 wrote to memory of 3156 3324 3393.tmp 89 PID 3324 wrote to memory of 3156 3324 3393.tmp 89 PID 3156 wrote to memory of 4736 3156 342F.tmp 91 PID 3156 wrote to memory of 4736 3156 342F.tmp 91 PID 3156 wrote to memory of 4736 3156 342F.tmp 91 PID 4736 wrote to memory of 2064 4736 34DB.tmp 92 PID 4736 wrote to memory of 2064 4736 34DB.tmp 92 PID 4736 wrote to memory of 2064 4736 34DB.tmp 92 PID 2064 wrote to memory of 4448 2064 3577.tmp 93 PID 2064 wrote to memory of 4448 2064 3577.tmp 93 PID 2064 wrote to memory of 4448 2064 3577.tmp 93 PID 4448 wrote to memory of 396 4448 3623.tmp 94 PID 4448 wrote to memory of 396 4448 3623.tmp 94 PID 4448 wrote to memory of 396 4448 3623.tmp 94 PID 396 wrote to memory of 3308 396 36CF.tmp 95 PID 396 wrote to memory of 3308 396 36CF.tmp 95 PID 396 wrote to memory of 3308 396 36CF.tmp 95 PID 3308 wrote to memory of 1404 3308 376B.tmp 96 PID 3308 wrote to memory of 1404 3308 376B.tmp 96 PID 3308 wrote to memory of 1404 3308 376B.tmp 96 PID 1404 wrote to memory of 4912 1404 37D9.tmp 97 PID 1404 wrote to memory of 4912 1404 37D9.tmp 97 PID 1404 wrote to memory of 4912 1404 37D9.tmp 97 PID 4912 wrote to memory of 4264 4912 3894.tmp 98 PID 4912 wrote to memory of 4264 4912 3894.tmp 98 PID 4912 wrote to memory of 4264 4912 3894.tmp 98 PID 4264 wrote to memory of 232 4264 3911.tmp 99 PID 4264 wrote to memory of 232 4264 3911.tmp 99 PID 4264 wrote to memory of 232 4264 3911.tmp 99 PID 232 wrote to memory of 2988 232 39AD.tmp 100 PID 232 wrote to memory of 2988 232 39AD.tmp 100 PID 232 wrote to memory of 2988 232 39AD.tmp 100 PID 2988 wrote to memory of 3664 2988 3A4A.tmp 101 PID 2988 wrote to memory of 3664 2988 3A4A.tmp 101 PID 2988 wrote to memory of 3664 2988 3A4A.tmp 101 PID 3664 wrote to memory of 2316 3664 3AE6.tmp 102 PID 3664 wrote to memory of 2316 3664 3AE6.tmp 102 PID 3664 wrote to memory of 2316 3664 3AE6.tmp 102 PID 2316 wrote to memory of 4240 2316 3B92.tmp 103 PID 2316 wrote to memory of 4240 2316 3B92.tmp 103 PID 2316 wrote to memory of 4240 2316 3B92.tmp 103 PID 4240 wrote to memory of 4296 4240 3C1E.tmp 104 PID 4240 wrote to memory of 4296 4240 3C1E.tmp 104 PID 4240 wrote to memory of 4296 4240 3C1E.tmp 104 PID 4296 wrote to memory of 1636 4296 3CCA.tmp 105 PID 4296 wrote to memory of 1636 4296 3CCA.tmp 105 PID 4296 wrote to memory of 1636 4296 3CCA.tmp 105 PID 1636 wrote to memory of 412 1636 3D76.tmp 106 PID 1636 wrote to memory of 412 1636 3D76.tmp 106 PID 1636 wrote to memory of 412 1636 3D76.tmp 106 PID 412 wrote to memory of 3520 412 3DF3.tmp 107 PID 412 wrote to memory of 3520 412 3DF3.tmp 107 PID 412 wrote to memory of 3520 412 3DF3.tmp 107 PID 3520 wrote to memory of 4924 3520 3EAF.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-29_087f8ce4ed7d03f94feee810c48d84ed_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\31FD.tmp"C:\Users\Admin\AppData\Local\Temp\31FD.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\32D7.tmp"C:\Users\Admin\AppData\Local\Temp\32D7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3393.tmp"C:\Users\Admin\AppData\Local\Temp\3393.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\342F.tmp"C:\Users\Admin\AppData\Local\Temp\342F.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\34DB.tmp"C:\Users\Admin\AppData\Local\Temp\34DB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\3577.tmp"C:\Users\Admin\AppData\Local\Temp\3577.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\3623.tmp"C:\Users\Admin\AppData\Local\Temp\3623.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\36CF.tmp"C:\Users\Admin\AppData\Local\Temp\36CF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\376B.tmp"C:\Users\Admin\AppData\Local\Temp\376B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\37D9.tmp"C:\Users\Admin\AppData\Local\Temp\37D9.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\3894.tmp"C:\Users\Admin\AppData\Local\Temp\3894.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\3911.tmp"C:\Users\Admin\AppData\Local\Temp\3911.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\39AD.tmp"C:\Users\Admin\AppData\Local\Temp\39AD.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\3A4A.tmp"C:\Users\Admin\AppData\Local\Temp\3A4A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3AE6.tmp"C:\Users\Admin\AppData\Local\Temp\3AE6.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\3B92.tmp"C:\Users\Admin\AppData\Local\Temp\3B92.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\3C1E.tmp"C:\Users\Admin\AppData\Local\Temp\3C1E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\3CCA.tmp"C:\Users\Admin\AppData\Local\Temp\3CCA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\3D76.tmp"C:\Users\Admin\AppData\Local\Temp\3D76.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3DF3.tmp"C:\Users\Admin\AppData\Local\Temp\3DF3.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3EAF.tmp"C:\Users\Admin\AppData\Local\Temp\3EAF.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\3F2C.tmp"C:\Users\Admin\AppData\Local\Temp\3F2C.tmp"23⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\3FE7.tmp"C:\Users\Admin\AppData\Local\Temp\3FE7.tmp"24⤵
- Executes dropped EXE
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\4083.tmp"C:\Users\Admin\AppData\Local\Temp\4083.tmp"25⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\415E.tmp"C:\Users\Admin\AppData\Local\Temp\415E.tmp"26⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\41FA.tmp"C:\Users\Admin\AppData\Local\Temp\41FA.tmp"27⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\42A6.tmp"C:\Users\Admin\AppData\Local\Temp\42A6.tmp"28⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\4333.tmp"C:\Users\Admin\AppData\Local\Temp\4333.tmp"29⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\43CF.tmp"C:\Users\Admin\AppData\Local\Temp\43CF.tmp"30⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\444C.tmp"C:\Users\Admin\AppData\Local\Temp\444C.tmp"31⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\44D9.tmp"C:\Users\Admin\AppData\Local\Temp\44D9.tmp"32⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\4575.tmp"C:\Users\Admin\AppData\Local\Temp\4575.tmp"33⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\4602.tmp"C:\Users\Admin\AppData\Local\Temp\4602.tmp"34⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\4650.tmp"C:\Users\Admin\AppData\Local\Temp\4650.tmp"35⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\46AE.tmp"C:\Users\Admin\AppData\Local\Temp\46AE.tmp"36⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\472B.tmp"C:\Users\Admin\AppData\Local\Temp\472B.tmp"37⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\4788.tmp"C:\Users\Admin\AppData\Local\Temp\4788.tmp"38⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\4805.tmp"C:\Users\Admin\AppData\Local\Temp\4805.tmp"39⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\4853.tmp"C:\Users\Admin\AppData\Local\Temp\4853.tmp"40⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\48B1.tmp"C:\Users\Admin\AppData\Local\Temp\48B1.tmp"41⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\491F.tmp"C:\Users\Admin\AppData\Local\Temp\491F.tmp"42⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\498C.tmp"C:\Users\Admin\AppData\Local\Temp\498C.tmp"43⤵
- Executes dropped EXE
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\49DA.tmp"C:\Users\Admin\AppData\Local\Temp\49DA.tmp"44⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\4A57.tmp"C:\Users\Admin\AppData\Local\Temp\4A57.tmp"45⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"46⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\4B13.tmp"C:\Users\Admin\AppData\Local\Temp\4B13.tmp"47⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\4B80.tmp"C:\Users\Admin\AppData\Local\Temp\4B80.tmp"48⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\4BED.tmp"C:\Users\Admin\AppData\Local\Temp\4BED.tmp"49⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\4C4B.tmp"C:\Users\Admin\AppData\Local\Temp\4C4B.tmp"50⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\4C99.tmp"C:\Users\Admin\AppData\Local\Temp\4C99.tmp"51⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"52⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\4D35.tmp"C:\Users\Admin\AppData\Local\Temp\4D35.tmp"53⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp"54⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"55⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"56⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"57⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"58⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"59⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"60⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"61⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"62⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"63⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\50B0.tmp"C:\Users\Admin\AppData\Local\Temp\50B0.tmp"64⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\50EF.tmp"C:\Users\Admin\AppData\Local\Temp\50EF.tmp"65⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\513D.tmp"C:\Users\Admin\AppData\Local\Temp\513D.tmp"66⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\518B.tmp"C:\Users\Admin\AppData\Local\Temp\518B.tmp"67⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\51D9.tmp"C:\Users\Admin\AppData\Local\Temp\51D9.tmp"68⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\5217.tmp"C:\Users\Admin\AppData\Local\Temp\5217.tmp"69⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\5275.tmp"C:\Users\Admin\AppData\Local\Temp\5275.tmp"70⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\52C3.tmp"C:\Users\Admin\AppData\Local\Temp\52C3.tmp"71⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\5311.tmp"C:\Users\Admin\AppData\Local\Temp\5311.tmp"72⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"73⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"74⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\53DD.tmp"C:\Users\Admin\AppData\Local\Temp\53DD.tmp"75⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\541B.tmp"C:\Users\Admin\AppData\Local\Temp\541B.tmp"76⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\5469.tmp"C:\Users\Admin\AppData\Local\Temp\5469.tmp"77⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\54B7.tmp"C:\Users\Admin\AppData\Local\Temp\54B7.tmp"78⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\5515.tmp"C:\Users\Admin\AppData\Local\Temp\5515.tmp"79⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"80⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"81⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"82⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\564E.tmp"C:\Users\Admin\AppData\Local\Temp\564E.tmp"83⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\56AB.tmp"C:\Users\Admin\AppData\Local\Temp\56AB.tmp"84⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\56F9.tmp"C:\Users\Admin\AppData\Local\Temp\56F9.tmp"85⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\5748.tmp"C:\Users\Admin\AppData\Local\Temp\5748.tmp"86⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"87⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\5803.tmp"C:\Users\Admin\AppData\Local\Temp\5803.tmp"88⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"89⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\589F.tmp"C:\Users\Admin\AppData\Local\Temp\589F.tmp"90⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\58ED.tmp"C:\Users\Admin\AppData\Local\Temp\58ED.tmp"91⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"92⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"93⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"94⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\5A45.tmp"C:\Users\Admin\AppData\Local\Temp\5A45.tmp"95⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\5A93.tmp"C:\Users\Admin\AppData\Local\Temp\5A93.tmp"96⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"97⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"98⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"99⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"100⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"101⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"102⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"103⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"104⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"105⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"106⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"107⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"108⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"109⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"110⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"111⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"112⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"113⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"114⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\60DD.tmp"C:\Users\Admin\AppData\Local\Temp\60DD.tmp"115⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\612B.tmp"C:\Users\Admin\AppData\Local\Temp\612B.tmp"116⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\6189.tmp"C:\Users\Admin\AppData\Local\Temp\6189.tmp"117⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\61D7.tmp"C:\Users\Admin\AppData\Local\Temp\61D7.tmp"118⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"119⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"120⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"121⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\631F.tmp"C:\Users\Admin\AppData\Local\Temp\631F.tmp"122⤵PID:548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-