Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 22:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe
Resource
win10v2004-20240419-en
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe
-
Size
486KB
-
MD5
3ec507da93f08901f80a2a26a4d2f712
-
SHA1
8e8ff01caecbfb620de632f02d6e66afbaa84ec5
-
SHA256
d175c41d3574f16f9fb11c6ebd37db7fe313aca6e8e576281f3d594f03f20a3a
-
SHA512
e6398bf59efd388cf07e08e2f706b3adf70b0bc744b4f853c9a3797d4bc57e01bf8d7c09ae2956e96c2b853ace99b0c07d8fc087b2dba4d57e309491ee65a575
-
SSDEEP
12288:UU5rCOTeiDaxF5djPOo4sWU6qbvDFOgNZ:UUQOJDaf7tjvpOgN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2516 30F3.tmp 5016 3170.tmp 4548 320C.tmp 408 3299.tmp 860 3316.tmp 624 3374.tmp 2336 33D1.tmp 3060 3420.tmp 1688 349D.tmp 1196 350A.tmp 428 3587.tmp 2320 35F4.tmp 4616 3671.tmp 2888 36FE.tmp 4392 376B.tmp 1516 37D9.tmp 3228 3856.tmp 3104 38B3.tmp 3492 3921.tmp 3456 398E.tmp 5084 3A1B.tmp 4904 3A98.tmp 2216 3B05.tmp 4520 3B53.tmp 4688 3BC1.tmp 1288 3C3E.tmp 2576 3CAB.tmp 2040 3D09.tmp 540 3D76.tmp 2464 3DD4.tmp 2448 3E32.tmp 3916 3EAF.tmp 2444 3F1C.tmp 3468 3F6A.tmp 4924 3FD8.tmp 5064 4035.tmp 4928 4093.tmp 1528 40F1.tmp 4448 414F.tmp 4960 419D.tmp 3312 41FA.tmp 4468 4249.tmp 3416 4297.tmp 4876 42E5.tmp 3976 4333.tmp 4320 4381.tmp 4908 43CF.tmp 2536 441D.tmp 2516 446B.tmp 380 44BA.tmp 5032 4508.tmp 220 4556.tmp 3000 45B4.tmp 2052 4602.tmp 2076 4650.tmp 4180 46AE.tmp 2988 46FC.tmp 756 474A.tmp 3204 4798.tmp 4500 47E6.tmp 2336 4834.tmp 2944 4892.tmp 1532 48E0.tmp 4900 492E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2516 1520 2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe 84 PID 1520 wrote to memory of 2516 1520 2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe 84 PID 1520 wrote to memory of 2516 1520 2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe 84 PID 2516 wrote to memory of 5016 2516 30F3.tmp 85 PID 2516 wrote to memory of 5016 2516 30F3.tmp 85 PID 2516 wrote to memory of 5016 2516 30F3.tmp 85 PID 5016 wrote to memory of 4548 5016 3170.tmp 86 PID 5016 wrote to memory of 4548 5016 3170.tmp 86 PID 5016 wrote to memory of 4548 5016 3170.tmp 86 PID 4548 wrote to memory of 408 4548 320C.tmp 88 PID 4548 wrote to memory of 408 4548 320C.tmp 88 PID 4548 wrote to memory of 408 4548 320C.tmp 88 PID 408 wrote to memory of 860 408 3299.tmp 90 PID 408 wrote to memory of 860 408 3299.tmp 90 PID 408 wrote to memory of 860 408 3299.tmp 90 PID 860 wrote to memory of 624 860 3316.tmp 92 PID 860 wrote to memory of 624 860 3316.tmp 92 PID 860 wrote to memory of 624 860 3316.tmp 92 PID 624 wrote to memory of 2336 624 3374.tmp 93 PID 624 wrote to memory of 2336 624 3374.tmp 93 PID 624 wrote to memory of 2336 624 3374.tmp 93 PID 2336 wrote to memory of 3060 2336 33D1.tmp 94 PID 2336 wrote to memory of 3060 2336 33D1.tmp 94 PID 2336 wrote to memory of 3060 2336 33D1.tmp 94 PID 3060 wrote to memory of 1688 3060 3420.tmp 95 PID 3060 wrote to memory of 1688 3060 3420.tmp 95 PID 3060 wrote to memory of 1688 3060 3420.tmp 95 PID 1688 wrote to memory of 1196 1688 349D.tmp 96 PID 1688 wrote to memory of 1196 1688 349D.tmp 96 PID 1688 wrote to memory of 1196 1688 349D.tmp 96 PID 1196 wrote to memory of 428 1196 350A.tmp 97 PID 1196 wrote to memory of 428 1196 350A.tmp 97 PID 1196 wrote to memory of 428 1196 350A.tmp 97 PID 428 wrote to memory of 2320 428 3587.tmp 98 PID 428 wrote to memory of 2320 428 3587.tmp 98 PID 428 wrote to memory of 2320 428 3587.tmp 98 PID 2320 wrote to memory of 4616 2320 35F4.tmp 99 PID 2320 wrote to memory of 4616 2320 35F4.tmp 99 PID 2320 wrote to memory of 4616 2320 35F4.tmp 99 PID 4616 wrote to memory of 2888 4616 3671.tmp 100 PID 4616 wrote to memory of 2888 4616 3671.tmp 100 PID 4616 wrote to memory of 2888 4616 3671.tmp 100 PID 2888 wrote to memory of 4392 2888 36FE.tmp 101 PID 2888 wrote to memory of 4392 2888 36FE.tmp 101 PID 2888 wrote to memory of 4392 2888 36FE.tmp 101 PID 4392 wrote to memory of 1516 4392 376B.tmp 102 PID 4392 wrote to memory of 1516 4392 376B.tmp 102 PID 4392 wrote to memory of 1516 4392 376B.tmp 102 PID 1516 wrote to memory of 3228 1516 37D9.tmp 103 PID 1516 wrote to memory of 3228 1516 37D9.tmp 103 PID 1516 wrote to memory of 3228 1516 37D9.tmp 103 PID 3228 wrote to memory of 3104 3228 3856.tmp 104 PID 3228 wrote to memory of 3104 3228 3856.tmp 104 PID 3228 wrote to memory of 3104 3228 3856.tmp 104 PID 3104 wrote to memory of 3492 3104 38B3.tmp 105 PID 3104 wrote to memory of 3492 3104 38B3.tmp 105 PID 3104 wrote to memory of 3492 3104 38B3.tmp 105 PID 3492 wrote to memory of 3456 3492 3921.tmp 106 PID 3492 wrote to memory of 3456 3492 3921.tmp 106 PID 3492 wrote to memory of 3456 3492 3921.tmp 106 PID 3456 wrote to memory of 5084 3456 398E.tmp 107 PID 3456 wrote to memory of 5084 3456 398E.tmp 107 PID 3456 wrote to memory of 5084 3456 398E.tmp 107 PID 5084 wrote to memory of 4904 5084 3A1B.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_3ec507da93f08901f80a2a26a4d2f712_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\30F3.tmp"C:\Users\Admin\AppData\Local\Temp\30F3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3170.tmp"C:\Users\Admin\AppData\Local\Temp\3170.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\320C.tmp"C:\Users\Admin\AppData\Local\Temp\320C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\3299.tmp"C:\Users\Admin\AppData\Local\Temp\3299.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\3316.tmp"C:\Users\Admin\AppData\Local\Temp\3316.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\3374.tmp"C:\Users\Admin\AppData\Local\Temp\3374.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\33D1.tmp"C:\Users\Admin\AppData\Local\Temp\33D1.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\3420.tmp"C:\Users\Admin\AppData\Local\Temp\3420.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\349D.tmp"C:\Users\Admin\AppData\Local\Temp\349D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\350A.tmp"C:\Users\Admin\AppData\Local\Temp\350A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\3587.tmp"C:\Users\Admin\AppData\Local\Temp\3587.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\35F4.tmp"C:\Users\Admin\AppData\Local\Temp\35F4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\3671.tmp"C:\Users\Admin\AppData\Local\Temp\3671.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\36FE.tmp"C:\Users\Admin\AppData\Local\Temp\36FE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\376B.tmp"C:\Users\Admin\AppData\Local\Temp\376B.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\37D9.tmp"C:\Users\Admin\AppData\Local\Temp\37D9.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3856.tmp"C:\Users\Admin\AppData\Local\Temp\3856.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\38B3.tmp"C:\Users\Admin\AppData\Local\Temp\38B3.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\3921.tmp"C:\Users\Admin\AppData\Local\Temp\3921.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\398E.tmp"C:\Users\Admin\AppData\Local\Temp\398E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\3A1B.tmp"C:\Users\Admin\AppData\Local\Temp\3A1B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\3A98.tmp"C:\Users\Admin\AppData\Local\Temp\3A98.tmp"23⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3B05.tmp"C:\Users\Admin\AppData\Local\Temp\3B05.tmp"24⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\3B53.tmp"C:\Users\Admin\AppData\Local\Temp\3B53.tmp"25⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\3BC1.tmp"C:\Users\Admin\AppData\Local\Temp\3BC1.tmp"26⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\3C3E.tmp"C:\Users\Admin\AppData\Local\Temp\3C3E.tmp"27⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3CAB.tmp"C:\Users\Admin\AppData\Local\Temp\3CAB.tmp"28⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3D09.tmp"C:\Users\Admin\AppData\Local\Temp\3D09.tmp"29⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3D76.tmp"C:\Users\Admin\AppData\Local\Temp\3D76.tmp"30⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3DD4.tmp"C:\Users\Admin\AppData\Local\Temp\3DD4.tmp"31⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\3E32.tmp"C:\Users\Admin\AppData\Local\Temp\3E32.tmp"32⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\3EAF.tmp"C:\Users\Admin\AppData\Local\Temp\3EAF.tmp"33⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\3F1C.tmp"C:\Users\Admin\AppData\Local\Temp\3F1C.tmp"34⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3F6A.tmp"C:\Users\Admin\AppData\Local\Temp\3F6A.tmp"35⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"36⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\4035.tmp"C:\Users\Admin\AppData\Local\Temp\4035.tmp"37⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\4093.tmp"C:\Users\Admin\AppData\Local\Temp\4093.tmp"38⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\40F1.tmp"C:\Users\Admin\AppData\Local\Temp\40F1.tmp"39⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\414F.tmp"C:\Users\Admin\AppData\Local\Temp\414F.tmp"40⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\419D.tmp"C:\Users\Admin\AppData\Local\Temp\419D.tmp"41⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\41FA.tmp"C:\Users\Admin\AppData\Local\Temp\41FA.tmp"42⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\4249.tmp"C:\Users\Admin\AppData\Local\Temp\4249.tmp"43⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\4297.tmp"C:\Users\Admin\AppData\Local\Temp\4297.tmp"44⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\42E5.tmp"C:\Users\Admin\AppData\Local\Temp\42E5.tmp"45⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\4333.tmp"C:\Users\Admin\AppData\Local\Temp\4333.tmp"46⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\4381.tmp"C:\Users\Admin\AppData\Local\Temp\4381.tmp"47⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\43CF.tmp"C:\Users\Admin\AppData\Local\Temp\43CF.tmp"48⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\441D.tmp"C:\Users\Admin\AppData\Local\Temp\441D.tmp"49⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\446B.tmp"C:\Users\Admin\AppData\Local\Temp\446B.tmp"50⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\44BA.tmp"C:\Users\Admin\AppData\Local\Temp\44BA.tmp"51⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\4508.tmp"C:\Users\Admin\AppData\Local\Temp\4508.tmp"52⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\4556.tmp"C:\Users\Admin\AppData\Local\Temp\4556.tmp"53⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\45B4.tmp"C:\Users\Admin\AppData\Local\Temp\45B4.tmp"54⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\4602.tmp"C:\Users\Admin\AppData\Local\Temp\4602.tmp"55⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\4650.tmp"C:\Users\Admin\AppData\Local\Temp\4650.tmp"56⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\46AE.tmp"C:\Users\Admin\AppData\Local\Temp\46AE.tmp"57⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\46FC.tmp"C:\Users\Admin\AppData\Local\Temp\46FC.tmp"58⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\474A.tmp"C:\Users\Admin\AppData\Local\Temp\474A.tmp"59⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\4798.tmp"C:\Users\Admin\AppData\Local\Temp\4798.tmp"60⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\47E6.tmp"C:\Users\Admin\AppData\Local\Temp\47E6.tmp"61⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\4834.tmp"C:\Users\Admin\AppData\Local\Temp\4834.tmp"62⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\4892.tmp"C:\Users\Admin\AppData\Local\Temp\4892.tmp"63⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\48E0.tmp"C:\Users\Admin\AppData\Local\Temp\48E0.tmp"64⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\492E.tmp"C:\Users\Admin\AppData\Local\Temp\492E.tmp"65⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\497C.tmp"C:\Users\Admin\AppData\Local\Temp\497C.tmp"66⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\49CA.tmp"C:\Users\Admin\AppData\Local\Temp\49CA.tmp"67⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\4A19.tmp"C:\Users\Admin\AppData\Local\Temp\4A19.tmp"68⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\4A67.tmp"C:\Users\Admin\AppData\Local\Temp\4A67.tmp"69⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"70⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\4B03.tmp"C:\Users\Admin\AppData\Local\Temp\4B03.tmp"71⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\4B51.tmp"C:\Users\Admin\AppData\Local\Temp\4B51.tmp"72⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\4BAF.tmp"C:\Users\Admin\AppData\Local\Temp\4BAF.tmp"73⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\4BFD.tmp"C:\Users\Admin\AppData\Local\Temp\4BFD.tmp"74⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"75⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"76⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"77⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\4D45.tmp"C:\Users\Admin\AppData\Local\Temp\4D45.tmp"78⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"79⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"80⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"81⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"82⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"83⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"84⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"85⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"86⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\5014.tmp"C:\Users\Admin\AppData\Local\Temp\5014.tmp"87⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\5062.tmp"C:\Users\Admin\AppData\Local\Temp\5062.tmp"88⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\50C0.tmp"C:\Users\Admin\AppData\Local\Temp\50C0.tmp"89⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\510E.tmp"C:\Users\Admin\AppData\Local\Temp\510E.tmp"90⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\516C.tmp"C:\Users\Admin\AppData\Local\Temp\516C.tmp"91⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\51C9.tmp"C:\Users\Admin\AppData\Local\Temp\51C9.tmp"92⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\5227.tmp"C:\Users\Admin\AppData\Local\Temp\5227.tmp"93⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\5285.tmp"C:\Users\Admin\AppData\Local\Temp\5285.tmp"94⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"95⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\5340.tmp"C:\Users\Admin\AppData\Local\Temp\5340.tmp"96⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\538E.tmp"C:\Users\Admin\AppData\Local\Temp\538E.tmp"97⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"98⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"99⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\5498.tmp"C:\Users\Admin\AppData\Local\Temp\5498.tmp"100⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\5505.tmp"C:\Users\Admin\AppData\Local\Temp\5505.tmp"101⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"102⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"103⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\560F.tmp"C:\Users\Admin\AppData\Local\Temp\560F.tmp"104⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"105⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\56BB.tmp"C:\Users\Admin\AppData\Local\Temp\56BB.tmp"106⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"107⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"108⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"109⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\5813.tmp"C:\Users\Admin\AppData\Local\Temp\5813.tmp"110⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\5861.tmp"C:\Users\Admin\AppData\Local\Temp\5861.tmp"111⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"112⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"113⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"114⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"115⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\59D8.tmp"C:\Users\Admin\AppData\Local\Temp\59D8.tmp"116⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\5A26.tmp"C:\Users\Admin\AppData\Local\Temp\5A26.tmp"117⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"118⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"119⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"120⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"121⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"122⤵PID:2968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-