Analysis
-
max time kernel
53s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 19:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe
Resource
win7-20240419-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe
-
Size
486KB
-
MD5
8ffee2e45bb507dc731281a35aaf7b85
-
SHA1
cac3a0c19fbcd003c387b2ea925c4428b00fbc5a
-
SHA256
4cf7d84dfba48ea43ad633d5584eb3701c7386e7d0b29e2d867acc53a4882723
-
SHA512
e1a96da28b7c32cf33547a3d834b13297bb72ecf661d3b83ffc70eeae63ee7b70ae164848d93e54eb8ebfc5adf9b74068a23c644def07ef94915fb4002ac3305
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD72nX4hV2kE/tbxioNbRtqJ+HY8mWMWtVG0XrB:/U5rCOTeiD2noejioNhLTXLG0VNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4356 38F2.tmp 532 395F.tmp 3528 39CD.tmp 2512 3A4A.tmp 2916 3AB7.tmp 4012 3B24.tmp 664 3B82.tmp 3916 3BFF.tmp 4376 3C6D.tmp 4192 3CEA.tmp 4388 3D47.tmp 4084 3DB5.tmp 2668 3E32.tmp 820 3E8F.tmp 2660 3EED.tmp 2220 3F6A.tmp 4452 3FE7.tmp 5116 4055.tmp 4704 40B2.tmp 4508 4110.tmp 2788 417D.tmp 2940 41DB.tmp 60 4277.tmp 4028 42F4.tmp 4812 4371.tmp 3228 43EE.tmp 5056 444C.tmp 2144 44BA.tmp 3704 4527.tmp 1724 4575.tmp 2644 45F2.tmp 3268 4640.tmp 4104 46AE.tmp 1340 46FC.tmp 4540 4759.tmp 4696 47C7.tmp 4464 4815.tmp 3176 4863.tmp 4960 48B1.tmp 1996 490F.tmp 5096 495D.tmp 4208 49AB.tmp 3612 4A09.tmp 1700 4A67.tmp 1948 4AC4.tmp 4360 4B13.tmp 5072 4B70.tmp 2388 4BBE.tmp 5112 4C1C.tmp 3152 4C8A.tmp 4876 4CE7.tmp 3392 4D35.tmp 4504 4D93.tmp 4672 4DF1.tmp 4176 4E3F.tmp 2828 4E8D.tmp 2864 4EFB.tmp 4476 4F49.tmp 4760 4FA6.tmp 3236 5004.tmp 3832 5052.tmp 4868 50A0.tmp 2044 50EF.tmp 2404 513D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4356 5108 2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe 85 PID 5108 wrote to memory of 4356 5108 2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe 85 PID 5108 wrote to memory of 4356 5108 2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe 85 PID 4356 wrote to memory of 532 4356 38F2.tmp 86 PID 4356 wrote to memory of 532 4356 38F2.tmp 86 PID 4356 wrote to memory of 532 4356 38F2.tmp 86 PID 532 wrote to memory of 3528 532 395F.tmp 89 PID 532 wrote to memory of 3528 532 395F.tmp 89 PID 532 wrote to memory of 3528 532 395F.tmp 89 PID 3528 wrote to memory of 2512 3528 39CD.tmp 90 PID 3528 wrote to memory of 2512 3528 39CD.tmp 90 PID 3528 wrote to memory of 2512 3528 39CD.tmp 90 PID 2512 wrote to memory of 2916 2512 3A4A.tmp 91 PID 2512 wrote to memory of 2916 2512 3A4A.tmp 91 PID 2512 wrote to memory of 2916 2512 3A4A.tmp 91 PID 2916 wrote to memory of 4012 2916 3AB7.tmp 93 PID 2916 wrote to memory of 4012 2916 3AB7.tmp 93 PID 2916 wrote to memory of 4012 2916 3AB7.tmp 93 PID 4012 wrote to memory of 664 4012 3B24.tmp 94 PID 4012 wrote to memory of 664 4012 3B24.tmp 94 PID 4012 wrote to memory of 664 4012 3B24.tmp 94 PID 664 wrote to memory of 3916 664 3B82.tmp 95 PID 664 wrote to memory of 3916 664 3B82.tmp 95 PID 664 wrote to memory of 3916 664 3B82.tmp 95 PID 3916 wrote to memory of 4376 3916 3BFF.tmp 96 PID 3916 wrote to memory of 4376 3916 3BFF.tmp 96 PID 3916 wrote to memory of 4376 3916 3BFF.tmp 96 PID 4376 wrote to memory of 4192 4376 3C6D.tmp 97 PID 4376 wrote to memory of 4192 4376 3C6D.tmp 97 PID 4376 wrote to memory of 4192 4376 3C6D.tmp 97 PID 4192 wrote to memory of 4388 4192 3CEA.tmp 98 PID 4192 wrote to memory of 4388 4192 3CEA.tmp 98 PID 4192 wrote to memory of 4388 4192 3CEA.tmp 98 PID 4388 wrote to memory of 4084 4388 3D47.tmp 99 PID 4388 wrote to memory of 4084 4388 3D47.tmp 99 PID 4388 wrote to memory of 4084 4388 3D47.tmp 99 PID 4084 wrote to memory of 2668 4084 3DB5.tmp 100 PID 4084 wrote to memory of 2668 4084 3DB5.tmp 100 PID 4084 wrote to memory of 2668 4084 3DB5.tmp 100 PID 2668 wrote to memory of 820 2668 3E32.tmp 101 PID 2668 wrote to memory of 820 2668 3E32.tmp 101 PID 2668 wrote to memory of 820 2668 3E32.tmp 101 PID 820 wrote to memory of 2660 820 3E8F.tmp 102 PID 820 wrote to memory of 2660 820 3E8F.tmp 102 PID 820 wrote to memory of 2660 820 3E8F.tmp 102 PID 2660 wrote to memory of 2220 2660 3EED.tmp 103 PID 2660 wrote to memory of 2220 2660 3EED.tmp 103 PID 2660 wrote to memory of 2220 2660 3EED.tmp 103 PID 2220 wrote to memory of 4452 2220 3F6A.tmp 104 PID 2220 wrote to memory of 4452 2220 3F6A.tmp 104 PID 2220 wrote to memory of 4452 2220 3F6A.tmp 104 PID 4452 wrote to memory of 5116 4452 3FE7.tmp 105 PID 4452 wrote to memory of 5116 4452 3FE7.tmp 105 PID 4452 wrote to memory of 5116 4452 3FE7.tmp 105 PID 5116 wrote to memory of 4704 5116 4055.tmp 106 PID 5116 wrote to memory of 4704 5116 4055.tmp 106 PID 5116 wrote to memory of 4704 5116 4055.tmp 106 PID 4704 wrote to memory of 4508 4704 40B2.tmp 107 PID 4704 wrote to memory of 4508 4704 40B2.tmp 107 PID 4704 wrote to memory of 4508 4704 40B2.tmp 107 PID 4508 wrote to memory of 2788 4508 4110.tmp 108 PID 4508 wrote to memory of 2788 4508 4110.tmp 108 PID 4508 wrote to memory of 2788 4508 4110.tmp 108 PID 2788 wrote to memory of 2940 2788 417D.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_8ffee2e45bb507dc731281a35aaf7b85_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\38F2.tmp"C:\Users\Admin\AppData\Local\Temp\38F2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\395F.tmp"C:\Users\Admin\AppData\Local\Temp\395F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\39CD.tmp"C:\Users\Admin\AppData\Local\Temp\39CD.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\3A4A.tmp"C:\Users\Admin\AppData\Local\Temp\3A4A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3AB7.tmp"C:\Users\Admin\AppData\Local\Temp\3AB7.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3B24.tmp"C:\Users\Admin\AppData\Local\Temp\3B24.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\3B82.tmp"C:\Users\Admin\AppData\Local\Temp\3B82.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\3BFF.tmp"C:\Users\Admin\AppData\Local\Temp\3BFF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\3C6D.tmp"C:\Users\Admin\AppData\Local\Temp\3C6D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\3CEA.tmp"C:\Users\Admin\AppData\Local\Temp\3CEA.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\3D47.tmp"C:\Users\Admin\AppData\Local\Temp\3D47.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3DB5.tmp"C:\Users\Admin\AppData\Local\Temp\3DB5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\3E32.tmp"C:\Users\Admin\AppData\Local\Temp\3E32.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3E8F.tmp"C:\Users\Admin\AppData\Local\Temp\3E8F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3EED.tmp"C:\Users\Admin\AppData\Local\Temp\3EED.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\3F6A.tmp"C:\Users\Admin\AppData\Local\Temp\3F6A.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3FE7.tmp"C:\Users\Admin\AppData\Local\Temp\3FE7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\4055.tmp"C:\Users\Admin\AppData\Local\Temp\4055.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\40B2.tmp"C:\Users\Admin\AppData\Local\Temp\40B2.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\4110.tmp"C:\Users\Admin\AppData\Local\Temp\4110.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\417D.tmp"C:\Users\Admin\AppData\Local\Temp\417D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\41DB.tmp"C:\Users\Admin\AppData\Local\Temp\41DB.tmp"23⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\4277.tmp"C:\Users\Admin\AppData\Local\Temp\4277.tmp"24⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\42F4.tmp"C:\Users\Admin\AppData\Local\Temp\42F4.tmp"25⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\4371.tmp"C:\Users\Admin\AppData\Local\Temp\4371.tmp"26⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\43EE.tmp"C:\Users\Admin\AppData\Local\Temp\43EE.tmp"27⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\444C.tmp"C:\Users\Admin\AppData\Local\Temp\444C.tmp"28⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\44BA.tmp"C:\Users\Admin\AppData\Local\Temp\44BA.tmp"29⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\4527.tmp"C:\Users\Admin\AppData\Local\Temp\4527.tmp"30⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\4575.tmp"C:\Users\Admin\AppData\Local\Temp\4575.tmp"31⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\45F2.tmp"C:\Users\Admin\AppData\Local\Temp\45F2.tmp"32⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\4640.tmp"C:\Users\Admin\AppData\Local\Temp\4640.tmp"33⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\46AE.tmp"C:\Users\Admin\AppData\Local\Temp\46AE.tmp"34⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\46FC.tmp"C:\Users\Admin\AppData\Local\Temp\46FC.tmp"35⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\4759.tmp"C:\Users\Admin\AppData\Local\Temp\4759.tmp"36⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\47C7.tmp"C:\Users\Admin\AppData\Local\Temp\47C7.tmp"37⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\4815.tmp"C:\Users\Admin\AppData\Local\Temp\4815.tmp"38⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\4863.tmp"C:\Users\Admin\AppData\Local\Temp\4863.tmp"39⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\48B1.tmp"C:\Users\Admin\AppData\Local\Temp\48B1.tmp"40⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\490F.tmp"C:\Users\Admin\AppData\Local\Temp\490F.tmp"41⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\495D.tmp"C:\Users\Admin\AppData\Local\Temp\495D.tmp"42⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\49AB.tmp"C:\Users\Admin\AppData\Local\Temp\49AB.tmp"43⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\4A09.tmp"C:\Users\Admin\AppData\Local\Temp\4A09.tmp"44⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\4A67.tmp"C:\Users\Admin\AppData\Local\Temp\4A67.tmp"45⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\4AC4.tmp"C:\Users\Admin\AppData\Local\Temp\4AC4.tmp"46⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\4B13.tmp"C:\Users\Admin\AppData\Local\Temp\4B13.tmp"47⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\4B70.tmp"C:\Users\Admin\AppData\Local\Temp\4B70.tmp"48⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"49⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"50⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"51⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"52⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\4D35.tmp"C:\Users\Admin\AppData\Local\Temp\4D35.tmp"53⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"54⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"55⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"56⤵
- Executes dropped EXE
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"57⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"58⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\4F49.tmp"C:\Users\Admin\AppData\Local\Temp\4F49.tmp"59⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"60⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"61⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"62⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"63⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\50EF.tmp"C:\Users\Admin\AppData\Local\Temp\50EF.tmp"64⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\513D.tmp"C:\Users\Admin\AppData\Local\Temp\513D.tmp"65⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"66⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"67⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\5237.tmp"C:\Users\Admin\AppData\Local\Temp\5237.tmp"68⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\5285.tmp"C:\Users\Admin\AppData\Local\Temp\5285.tmp"69⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"70⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\5340.tmp"C:\Users\Admin\AppData\Local\Temp\5340.tmp"71⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"72⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"73⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"74⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\5498.tmp"C:\Users\Admin\AppData\Local\Temp\5498.tmp"75⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\54F6.tmp"C:\Users\Admin\AppData\Local\Temp\54F6.tmp"76⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\5554.tmp"C:\Users\Admin\AppData\Local\Temp\5554.tmp"77⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\55A2.tmp"C:\Users\Admin\AppData\Local\Temp\55A2.tmp"78⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"79⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"80⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\56AB.tmp"C:\Users\Admin\AppData\Local\Temp\56AB.tmp"81⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\56F9.tmp"C:\Users\Admin\AppData\Local\Temp\56F9.tmp"82⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"83⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"84⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"85⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"86⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"87⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"88⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\594B.tmp"C:\Users\Admin\AppData\Local\Temp\594B.tmp"89⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\59A9.tmp"C:\Users\Admin\AppData\Local\Temp\59A9.tmp"90⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\5A07.tmp"C:\Users\Admin\AppData\Local\Temp\5A07.tmp"91⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\5A64.tmp"C:\Users\Admin\AppData\Local\Temp\5A64.tmp"92⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\5AC2.tmp"C:\Users\Admin\AppData\Local\Temp\5AC2.tmp"93⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\5B20.tmp"C:\Users\Admin\AppData\Local\Temp\5B20.tmp"94⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"95⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"96⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\5C2A.tmp"C:\Users\Admin\AppData\Local\Temp\5C2A.tmp"97⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp"98⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"99⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\5D33.tmp"C:\Users\Admin\AppData\Local\Temp\5D33.tmp"100⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\5D81.tmp"C:\Users\Admin\AppData\Local\Temp\5D81.tmp"101⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"102⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"103⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\5E8B.tmp"C:\Users\Admin\AppData\Local\Temp\5E8B.tmp"104⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"105⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"106⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"107⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"108⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\6040.tmp"C:\Users\Admin\AppData\Local\Temp\6040.tmp"109⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\608F.tmp"C:\Users\Admin\AppData\Local\Temp\608F.tmp"110⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\60DD.tmp"C:\Users\Admin\AppData\Local\Temp\60DD.tmp"111⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\613A.tmp"C:\Users\Admin\AppData\Local\Temp\613A.tmp"112⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\6198.tmp"C:\Users\Admin\AppData\Local\Temp\6198.tmp"113⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\61E6.tmp"C:\Users\Admin\AppData\Local\Temp\61E6.tmp"114⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\6244.tmp"C:\Users\Admin\AppData\Local\Temp\6244.tmp"115⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\62A2.tmp"C:\Users\Admin\AppData\Local\Temp\62A2.tmp"116⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\6300.tmp"C:\Users\Admin\AppData\Local\Temp\6300.tmp"117⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\634E.tmp"C:\Users\Admin\AppData\Local\Temp\634E.tmp"118⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\63BB.tmp"C:\Users\Admin\AppData\Local\Temp\63BB.tmp"119⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"120⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\6467.tmp"C:\Users\Admin\AppData\Local\Temp\6467.tmp"121⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\64C5.tmp"C:\Users\Admin\AppData\Local\Temp\64C5.tmp"122⤵PID:3796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-