Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 18:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe
Resource
win7-20240215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe
-
Size
536KB
-
MD5
a11bd5e14e12288072d71e6a8c2e7614
-
SHA1
ee1652f1414abca5b0a73dc688e6fe09e7e03d7b
-
SHA256
23100dc743f0dfc0b8e43243f6dfd2a9bf4a119c0f2b701f2609dc170ac095fb
-
SHA512
138d5a5e9abdecde31bf65ac6b99df2e9c83e999953be60388b2e048081ec081e06b06e85029c9fed11f67cb400f040f197eda40234f2a029744be7c447cf9ed
-
SSDEEP
12288:wU5rCOTeiUgMMSGWrl2xfC2k/PYeZIZxVJ0ZT9:wUQOJUg5XKMaJ/PpIRJ0ZT9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1176 4EDB.tmp 4408 4FC6.tmp 2844 50B0.tmp 3204 519A.tmp 3488 5275.tmp 5020 5350.tmp 1204 542B.tmp 3896 5505.tmp 2960 55FF.tmp 4944 56CB.tmp 60 5776.tmp 4676 5842.tmp 2088 58FD.tmp 2400 5999.tmp 4124 5A74.tmp 5112 5B20.tmp 4388 5BCC.tmp 640 5CB6.tmp 1392 5D72.tmp 5096 5E3D.tmp 3984 5EE9.tmp 1888 5FC3.tmp 4672 607F.tmp 1608 615A.tmp 3392 6206.tmp 3364 62C1.tmp 2316 635D.tmp 3356 6419.tmp 628 6503.tmp 2264 659F.tmp 4728 666B.tmp 520 66E8.tmp 2524 67B3.tmp 5084 6830.tmp 4364 689D.tmp 444 6939.tmp 1792 69C6.tmp 1944 6A33.tmp 2664 6AD0.tmp 4108 6B5C.tmp 4484 6BBA.tmp 4884 6C56.tmp 4160 6CD3.tmp 4756 6D41.tmp 4068 6DAE.tmp 5020 6E1B.tmp 1204 6EA8.tmp 3504 6F44.tmp 2736 6F92.tmp 2312 6FF0.tmp 2420 703E.tmp 2076 708C.tmp 4644 70DA.tmp 668 7129.tmp 1648 7177.tmp 892 71C5.tmp 4532 7223.tmp 2916 7271.tmp 5112 72BF.tmp 3704 731D.tmp 640 736B.tmp 420 73B9.tmp 3312 7426.tmp 4132 7484.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1176 3140 2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe 82 PID 3140 wrote to memory of 1176 3140 2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe 82 PID 3140 wrote to memory of 1176 3140 2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe 82 PID 1176 wrote to memory of 4408 1176 4EDB.tmp 84 PID 1176 wrote to memory of 4408 1176 4EDB.tmp 84 PID 1176 wrote to memory of 4408 1176 4EDB.tmp 84 PID 4408 wrote to memory of 2844 4408 4FC6.tmp 87 PID 4408 wrote to memory of 2844 4408 4FC6.tmp 87 PID 4408 wrote to memory of 2844 4408 4FC6.tmp 87 PID 2844 wrote to memory of 3204 2844 50B0.tmp 88 PID 2844 wrote to memory of 3204 2844 50B0.tmp 88 PID 2844 wrote to memory of 3204 2844 50B0.tmp 88 PID 3204 wrote to memory of 3488 3204 519A.tmp 89 PID 3204 wrote to memory of 3488 3204 519A.tmp 89 PID 3204 wrote to memory of 3488 3204 519A.tmp 89 PID 3488 wrote to memory of 5020 3488 5275.tmp 90 PID 3488 wrote to memory of 5020 3488 5275.tmp 90 PID 3488 wrote to memory of 5020 3488 5275.tmp 90 PID 5020 wrote to memory of 1204 5020 5350.tmp 91 PID 5020 wrote to memory of 1204 5020 5350.tmp 91 PID 5020 wrote to memory of 1204 5020 5350.tmp 91 PID 1204 wrote to memory of 3896 1204 542B.tmp 92 PID 1204 wrote to memory of 3896 1204 542B.tmp 92 PID 1204 wrote to memory of 3896 1204 542B.tmp 92 PID 3896 wrote to memory of 2960 3896 5505.tmp 93 PID 3896 wrote to memory of 2960 3896 5505.tmp 93 PID 3896 wrote to memory of 2960 3896 5505.tmp 93 PID 2960 wrote to memory of 4944 2960 55FF.tmp 94 PID 2960 wrote to memory of 4944 2960 55FF.tmp 94 PID 2960 wrote to memory of 4944 2960 55FF.tmp 94 PID 4944 wrote to memory of 60 4944 56CB.tmp 95 PID 4944 wrote to memory of 60 4944 56CB.tmp 95 PID 4944 wrote to memory of 60 4944 56CB.tmp 95 PID 60 wrote to memory of 4676 60 5776.tmp 96 PID 60 wrote to memory of 4676 60 5776.tmp 96 PID 60 wrote to memory of 4676 60 5776.tmp 96 PID 4676 wrote to memory of 2088 4676 5842.tmp 97 PID 4676 wrote to memory of 2088 4676 5842.tmp 97 PID 4676 wrote to memory of 2088 4676 5842.tmp 97 PID 2088 wrote to memory of 2400 2088 58FD.tmp 98 PID 2088 wrote to memory of 2400 2088 58FD.tmp 98 PID 2088 wrote to memory of 2400 2088 58FD.tmp 98 PID 2400 wrote to memory of 4124 2400 5999.tmp 99 PID 2400 wrote to memory of 4124 2400 5999.tmp 99 PID 2400 wrote to memory of 4124 2400 5999.tmp 99 PID 4124 wrote to memory of 5112 4124 5A74.tmp 100 PID 4124 wrote to memory of 5112 4124 5A74.tmp 100 PID 4124 wrote to memory of 5112 4124 5A74.tmp 100 PID 5112 wrote to memory of 4388 5112 5B20.tmp 101 PID 5112 wrote to memory of 4388 5112 5B20.tmp 101 PID 5112 wrote to memory of 4388 5112 5B20.tmp 101 PID 4388 wrote to memory of 640 4388 5BCC.tmp 102 PID 4388 wrote to memory of 640 4388 5BCC.tmp 102 PID 4388 wrote to memory of 640 4388 5BCC.tmp 102 PID 640 wrote to memory of 1392 640 5CB6.tmp 103 PID 640 wrote to memory of 1392 640 5CB6.tmp 103 PID 640 wrote to memory of 1392 640 5CB6.tmp 103 PID 1392 wrote to memory of 5096 1392 5D72.tmp 104 PID 1392 wrote to memory of 5096 1392 5D72.tmp 104 PID 1392 wrote to memory of 5096 1392 5D72.tmp 104 PID 5096 wrote to memory of 3984 5096 5E3D.tmp 105 PID 5096 wrote to memory of 3984 5096 5E3D.tmp 105 PID 5096 wrote to memory of 3984 5096 5E3D.tmp 105 PID 3984 wrote to memory of 1888 3984 5EE9.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_a11bd5e14e12288072d71e6a8c2e7614_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\4FC6.tmp"C:\Users\Admin\AppData\Local\Temp\4FC6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\50B0.tmp"C:\Users\Admin\AppData\Local\Temp\50B0.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\5275.tmp"C:\Users\Admin\AppData\Local\Temp\5275.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\542B.tmp"C:\Users\Admin\AppData\Local\Temp\542B.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\5505.tmp"C:\Users\Admin\AppData\Local\Temp\5505.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\56CB.tmp"C:\Users\Admin\AppData\Local\Temp\56CB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\5776.tmp"C:\Users\Admin\AppData\Local\Temp\5776.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\5842.tmp"C:\Users\Admin\AppData\Local\Temp\5842.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\5A74.tmp"C:\Users\Admin\AppData\Local\Temp\5A74.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\5B20.tmp"C:\Users\Admin\AppData\Local\Temp\5B20.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"23⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"24⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\615A.tmp"C:\Users\Admin\AppData\Local\Temp\615A.tmp"25⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\6206.tmp"C:\Users\Admin\AppData\Local\Temp\6206.tmp"26⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"27⤵
- Executes dropped EXE
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\635D.tmp"C:\Users\Admin\AppData\Local\Temp\635D.tmp"28⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"29⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"30⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"31⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"32⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\66E8.tmp"C:\Users\Admin\AppData\Local\Temp\66E8.tmp"33⤵
- Executes dropped EXE
PID:520 -
C:\Users\Admin\AppData\Local\Temp\67B3.tmp"C:\Users\Admin\AppData\Local\Temp\67B3.tmp"34⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\6830.tmp"C:\Users\Admin\AppData\Local\Temp\6830.tmp"35⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\689D.tmp"C:\Users\Admin\AppData\Local\Temp\689D.tmp"36⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\6939.tmp"C:\Users\Admin\AppData\Local\Temp\6939.tmp"37⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\69C6.tmp"C:\Users\Admin\AppData\Local\Temp\69C6.tmp"38⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"39⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"40⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"41⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"42⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\6C56.tmp"C:\Users\Admin\AppData\Local\Temp\6C56.tmp"43⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"44⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\6D41.tmp"C:\Users\Admin\AppData\Local\Temp\6D41.tmp"45⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"46⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"47⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"48⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\6F44.tmp"C:\Users\Admin\AppData\Local\Temp\6F44.tmp"49⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"50⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\6FF0.tmp"C:\Users\Admin\AppData\Local\Temp\6FF0.tmp"51⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\703E.tmp"C:\Users\Admin\AppData\Local\Temp\703E.tmp"52⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\708C.tmp"C:\Users\Admin\AppData\Local\Temp\708C.tmp"53⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\70DA.tmp"C:\Users\Admin\AppData\Local\Temp\70DA.tmp"54⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"55⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"56⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"57⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\7223.tmp"C:\Users\Admin\AppData\Local\Temp\7223.tmp"58⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\7271.tmp"C:\Users\Admin\AppData\Local\Temp\7271.tmp"59⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\72BF.tmp"C:\Users\Admin\AppData\Local\Temp\72BF.tmp"60⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\731D.tmp"C:\Users\Admin\AppData\Local\Temp\731D.tmp"61⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\736B.tmp"C:\Users\Admin\AppData\Local\Temp\736B.tmp"62⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\73B9.tmp"C:\Users\Admin\AppData\Local\Temp\73B9.tmp"63⤵
- Executes dropped EXE
PID:420 -
C:\Users\Admin\AppData\Local\Temp\7426.tmp"C:\Users\Admin\AppData\Local\Temp\7426.tmp"64⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"65⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"66⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\7530.tmp"C:\Users\Admin\AppData\Local\Temp\7530.tmp"67⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\757E.tmp"C:\Users\Admin\AppData\Local\Temp\757E.tmp"68⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\75CC.tmp"C:\Users\Admin\AppData\Local\Temp\75CC.tmp"69⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"70⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"71⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\76D6.tmp"C:\Users\Admin\AppData\Local\Temp\76D6.tmp"72⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\7743.tmp"C:\Users\Admin\AppData\Local\Temp\7743.tmp"73⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"74⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"75⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\782D.tmp"C:\Users\Admin\AppData\Local\Temp\782D.tmp"76⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"77⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"78⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\7918.tmp"C:\Users\Admin\AppData\Local\Temp\7918.tmp"79⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\7966.tmp"C:\Users\Admin\AppData\Local\Temp\7966.tmp"80⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\79B4.tmp"C:\Users\Admin\AppData\Local\Temp\79B4.tmp"81⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\7A02.tmp"C:\Users\Admin\AppData\Local\Temp\7A02.tmp"82⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\7A60.tmp"C:\Users\Admin\AppData\Local\Temp\7A60.tmp"83⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"84⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"85⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"86⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\7BB8.tmp"C:\Users\Admin\AppData\Local\Temp\7BB8.tmp"87⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\7C06.tmp"C:\Users\Admin\AppData\Local\Temp\7C06.tmp"88⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"89⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"90⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"91⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"92⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\7DCB.tmp"C:\Users\Admin\AppData\Local\Temp\7DCB.tmp"93⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"94⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\7E67.tmp"C:\Users\Admin\AppData\Local\Temp\7E67.tmp"95⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"96⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\7F13.tmp"C:\Users\Admin\AppData\Local\Temp\7F13.tmp"97⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\7F61.tmp"C:\Users\Admin\AppData\Local\Temp\7F61.tmp"98⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"99⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"100⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\806B.tmp"C:\Users\Admin\AppData\Local\Temp\806B.tmp"101⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\80C9.tmp"C:\Users\Admin\AppData\Local\Temp\80C9.tmp"102⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\8126.tmp"C:\Users\Admin\AppData\Local\Temp\8126.tmp"103⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"104⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\81C3.tmp"C:\Users\Admin\AppData\Local\Temp\81C3.tmp"105⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\8220.tmp"C:\Users\Admin\AppData\Local\Temp\8220.tmp"106⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"107⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\82CC.tmp"C:\Users\Admin\AppData\Local\Temp\82CC.tmp"108⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\831A.tmp"C:\Users\Admin\AppData\Local\Temp\831A.tmp"109⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\8368.tmp"C:\Users\Admin\AppData\Local\Temp\8368.tmp"110⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\83B7.tmp"C:\Users\Admin\AppData\Local\Temp\83B7.tmp"111⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"112⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\8453.tmp"C:\Users\Admin\AppData\Local\Temp\8453.tmp"113⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\84B1.tmp"C:\Users\Admin\AppData\Local\Temp\84B1.tmp"114⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"115⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"116⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\85BA.tmp"C:\Users\Admin\AppData\Local\Temp\85BA.tmp"117⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"118⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"119⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"120⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"121⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\8750.tmp"C:\Users\Admin\AppData\Local\Temp\8750.tmp"122⤵PID:3500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-