Analysis
-
max time kernel
40s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 20:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe
Resource
win10v2004-20240419-en
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe
-
Size
487KB
-
MD5
a42f97da76413a92efbdb095bb054cf2
-
SHA1
9185a9bda1aba9b0b63a7939aef97f9325ee5e2e
-
SHA256
e06bdf3b9b34533c94c72da7a43ffdb3846471d76721e1476fc5572274768533
-
SHA512
54ef579c27c56c6100585c5cebe4a3f19d677d9c32dcfe542f54c90b2e6e0bf4add3a8caba1454b2539f547ac10b73ab83d42388ac6950fb9082e07c30da31ca
-
SSDEEP
12288:yU5rCOTeiN/gO/5+tRv6VS8kqqA2iQ6BYbZ:yUQOJN/gOB+Lykt0Yb
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3704 37D9.tmp 1620 3875.tmp 2752 38D3.tmp 2984 3950.tmp 3588 39CD.tmp 3336 3A2A.tmp 2928 3AA7.tmp 2272 3B24.tmp 2900 3BA1.tmp 4516 3BF0.tmp 1548 3C4D.tmp 5020 3CBB.tmp 4072 3D09.tmp 2044 3D86.tmp 4732 3DE4.tmp 1356 3E41.tmp 3160 3EAF.tmp 4940 3F1C.tmp 4532 3F99.tmp 3412 4026.tmp 3508 4093.tmp 4036 40E1.tmp 944 414F.tmp 1184 41AC.tmp 2624 4229.tmp 1328 4287.tmp 3736 42D5.tmp 4468 4343.tmp 2724 43A0.tmp 4884 43EE.tmp 4632 446B.tmp 4368 44E8.tmp 1744 4546.tmp 772 4594.tmp 3628 45E2.tmp 732 4631.tmp 4132 467F.tmp 4860 46CD.tmp 3224 471B.tmp 4672 4779.tmp 4996 47D6.tmp 4276 4825.tmp 2928 4882.tmp 692 48D0.tmp 4980 492E.tmp 2956 499C.tmp 1520 49EA.tmp 4416 4A38.tmp 712 4A96.tmp 4732 4AE4.tmp 4840 4B41.tmp 4364 4B90.tmp 2476 4BED.tmp 4592 4C3B.tmp 996 4C99.tmp 4720 4CE7.tmp 2428 4D45.tmp 3100 4D93.tmp 2064 4DF1.tmp 4376 4E3F.tmp 740 4E9D.tmp 60 4EFB.tmp 2480 4F49.tmp 864 4FA6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3704 4012 2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe 84 PID 4012 wrote to memory of 3704 4012 2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe 84 PID 4012 wrote to memory of 3704 4012 2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe 84 PID 3704 wrote to memory of 1620 3704 37D9.tmp 85 PID 3704 wrote to memory of 1620 3704 37D9.tmp 85 PID 3704 wrote to memory of 1620 3704 37D9.tmp 85 PID 1620 wrote to memory of 2752 1620 3875.tmp 87 PID 1620 wrote to memory of 2752 1620 3875.tmp 87 PID 1620 wrote to memory of 2752 1620 3875.tmp 87 PID 2752 wrote to memory of 2984 2752 38D3.tmp 89 PID 2752 wrote to memory of 2984 2752 38D3.tmp 89 PID 2752 wrote to memory of 2984 2752 38D3.tmp 89 PID 2984 wrote to memory of 3588 2984 3950.tmp 90 PID 2984 wrote to memory of 3588 2984 3950.tmp 90 PID 2984 wrote to memory of 3588 2984 3950.tmp 90 PID 3588 wrote to memory of 3336 3588 39CD.tmp 92 PID 3588 wrote to memory of 3336 3588 39CD.tmp 92 PID 3588 wrote to memory of 3336 3588 39CD.tmp 92 PID 3336 wrote to memory of 2928 3336 3A2A.tmp 93 PID 3336 wrote to memory of 2928 3336 3A2A.tmp 93 PID 3336 wrote to memory of 2928 3336 3A2A.tmp 93 PID 2928 wrote to memory of 2272 2928 3AA7.tmp 94 PID 2928 wrote to memory of 2272 2928 3AA7.tmp 94 PID 2928 wrote to memory of 2272 2928 3AA7.tmp 94 PID 2272 wrote to memory of 2900 2272 3B24.tmp 95 PID 2272 wrote to memory of 2900 2272 3B24.tmp 95 PID 2272 wrote to memory of 2900 2272 3B24.tmp 95 PID 2900 wrote to memory of 4516 2900 3BA1.tmp 96 PID 2900 wrote to memory of 4516 2900 3BA1.tmp 96 PID 2900 wrote to memory of 4516 2900 3BA1.tmp 96 PID 4516 wrote to memory of 1548 4516 3BF0.tmp 97 PID 4516 wrote to memory of 1548 4516 3BF0.tmp 97 PID 4516 wrote to memory of 1548 4516 3BF0.tmp 97 PID 1548 wrote to memory of 5020 1548 3C4D.tmp 98 PID 1548 wrote to memory of 5020 1548 3C4D.tmp 98 PID 1548 wrote to memory of 5020 1548 3C4D.tmp 98 PID 5020 wrote to memory of 4072 5020 3CBB.tmp 99 PID 5020 wrote to memory of 4072 5020 3CBB.tmp 99 PID 5020 wrote to memory of 4072 5020 3CBB.tmp 99 PID 4072 wrote to memory of 2044 4072 3D09.tmp 100 PID 4072 wrote to memory of 2044 4072 3D09.tmp 100 PID 4072 wrote to memory of 2044 4072 3D09.tmp 100 PID 2044 wrote to memory of 4732 2044 3D86.tmp 101 PID 2044 wrote to memory of 4732 2044 3D86.tmp 101 PID 2044 wrote to memory of 4732 2044 3D86.tmp 101 PID 4732 wrote to memory of 1356 4732 3DE4.tmp 102 PID 4732 wrote to memory of 1356 4732 3DE4.tmp 102 PID 4732 wrote to memory of 1356 4732 3DE4.tmp 102 PID 1356 wrote to memory of 3160 1356 3E41.tmp 103 PID 1356 wrote to memory of 3160 1356 3E41.tmp 103 PID 1356 wrote to memory of 3160 1356 3E41.tmp 103 PID 3160 wrote to memory of 4940 3160 3EAF.tmp 104 PID 3160 wrote to memory of 4940 3160 3EAF.tmp 104 PID 3160 wrote to memory of 4940 3160 3EAF.tmp 104 PID 4940 wrote to memory of 4532 4940 3F1C.tmp 105 PID 4940 wrote to memory of 4532 4940 3F1C.tmp 105 PID 4940 wrote to memory of 4532 4940 3F1C.tmp 105 PID 4532 wrote to memory of 3412 4532 3F99.tmp 106 PID 4532 wrote to memory of 3412 4532 3F99.tmp 106 PID 4532 wrote to memory of 3412 4532 3F99.tmp 106 PID 3412 wrote to memory of 3508 3412 4026.tmp 107 PID 3412 wrote to memory of 3508 3412 4026.tmp 107 PID 3412 wrote to memory of 3508 3412 4026.tmp 107 PID 3508 wrote to memory of 4036 3508 4093.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_a42f97da76413a92efbdb095bb054cf2_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\37D9.tmp"C:\Users\Admin\AppData\Local\Temp\37D9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\3875.tmp"C:\Users\Admin\AppData\Local\Temp\3875.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\38D3.tmp"C:\Users\Admin\AppData\Local\Temp\38D3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\3950.tmp"C:\Users\Admin\AppData\Local\Temp\3950.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\39CD.tmp"C:\Users\Admin\AppData\Local\Temp\39CD.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\3A2A.tmp"C:\Users\Admin\AppData\Local\Temp\3A2A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\3AA7.tmp"C:\Users\Admin\AppData\Local\Temp\3AA7.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3B24.tmp"C:\Users\Admin\AppData\Local\Temp\3B24.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3BA1.tmp"C:\Users\Admin\AppData\Local\Temp\3BA1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3BF0.tmp"C:\Users\Admin\AppData\Local\Temp\3BF0.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\3C4D.tmp"C:\Users\Admin\AppData\Local\Temp\3C4D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\3CBB.tmp"C:\Users\Admin\AppData\Local\Temp\3CBB.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\3D09.tmp"C:\Users\Admin\AppData\Local\Temp\3D09.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3D86.tmp"C:\Users\Admin\AppData\Local\Temp\3D86.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3DE4.tmp"C:\Users\Admin\AppData\Local\Temp\3DE4.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\3E41.tmp"C:\Users\Admin\AppData\Local\Temp\3E41.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3EAF.tmp"C:\Users\Admin\AppData\Local\Temp\3EAF.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\3F1C.tmp"C:\Users\Admin\AppData\Local\Temp\3F1C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\3F99.tmp"C:\Users\Admin\AppData\Local\Temp\3F99.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\4026.tmp"C:\Users\Admin\AppData\Local\Temp\4026.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\4093.tmp"C:\Users\Admin\AppData\Local\Temp\4093.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\40E1.tmp"C:\Users\Admin\AppData\Local\Temp\40E1.tmp"23⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\414F.tmp"C:\Users\Admin\AppData\Local\Temp\414F.tmp"24⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\41AC.tmp"C:\Users\Admin\AppData\Local\Temp\41AC.tmp"25⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\4229.tmp"C:\Users\Admin\AppData\Local\Temp\4229.tmp"26⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\4287.tmp"C:\Users\Admin\AppData\Local\Temp\4287.tmp"27⤵
- Executes dropped EXE
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\42D5.tmp"C:\Users\Admin\AppData\Local\Temp\42D5.tmp"28⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\4343.tmp"C:\Users\Admin\AppData\Local\Temp\4343.tmp"29⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\43A0.tmp"C:\Users\Admin\AppData\Local\Temp\43A0.tmp"30⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\43EE.tmp"C:\Users\Admin\AppData\Local\Temp\43EE.tmp"31⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\446B.tmp"C:\Users\Admin\AppData\Local\Temp\446B.tmp"32⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\44E8.tmp"C:\Users\Admin\AppData\Local\Temp\44E8.tmp"33⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\4546.tmp"C:\Users\Admin\AppData\Local\Temp\4546.tmp"34⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\4594.tmp"C:\Users\Admin\AppData\Local\Temp\4594.tmp"35⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\45E2.tmp"C:\Users\Admin\AppData\Local\Temp\45E2.tmp"36⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\4631.tmp"C:\Users\Admin\AppData\Local\Temp\4631.tmp"37⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\467F.tmp"C:\Users\Admin\AppData\Local\Temp\467F.tmp"38⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\46CD.tmp"C:\Users\Admin\AppData\Local\Temp\46CD.tmp"39⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\471B.tmp"C:\Users\Admin\AppData\Local\Temp\471B.tmp"40⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\4779.tmp"C:\Users\Admin\AppData\Local\Temp\4779.tmp"41⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\47D6.tmp"C:\Users\Admin\AppData\Local\Temp\47D6.tmp"42⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\4825.tmp"C:\Users\Admin\AppData\Local\Temp\4825.tmp"43⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\4882.tmp"C:\Users\Admin\AppData\Local\Temp\4882.tmp"44⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\48D0.tmp"C:\Users\Admin\AppData\Local\Temp\48D0.tmp"45⤵
- Executes dropped EXE
PID:692 -
C:\Users\Admin\AppData\Local\Temp\492E.tmp"C:\Users\Admin\AppData\Local\Temp\492E.tmp"46⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\499C.tmp"C:\Users\Admin\AppData\Local\Temp\499C.tmp"47⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\49EA.tmp"C:\Users\Admin\AppData\Local\Temp\49EA.tmp"48⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\4A38.tmp"C:\Users\Admin\AppData\Local\Temp\4A38.tmp"49⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\4A96.tmp"C:\Users\Admin\AppData\Local\Temp\4A96.tmp"50⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"51⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\4B41.tmp"C:\Users\Admin\AppData\Local\Temp\4B41.tmp"52⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\4B90.tmp"C:\Users\Admin\AppData\Local\Temp\4B90.tmp"53⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\4BED.tmp"C:\Users\Admin\AppData\Local\Temp\4BED.tmp"54⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"55⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\4C99.tmp"C:\Users\Admin\AppData\Local\Temp\4C99.tmp"56⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"C:\Users\Admin\AppData\Local\Temp\4CE7.tmp"57⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\4D45.tmp"C:\Users\Admin\AppData\Local\Temp\4D45.tmp"58⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"59⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"60⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"61⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"62⤵
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"63⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\4F49.tmp"C:\Users\Admin\AppData\Local\Temp\4F49.tmp"64⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"65⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"66⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"67⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"68⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"69⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"70⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\51AA.tmp"C:\Users\Admin\AppData\Local\Temp\51AA.tmp"71⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"72⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\5256.tmp"C:\Users\Admin\AppData\Local\Temp\5256.tmp"73⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"74⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\5311.tmp"C:\Users\Admin\AppData\Local\Temp\5311.tmp"75⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\5360.tmp"C:\Users\Admin\AppData\Local\Temp\5360.tmp"76⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\53AE.tmp"C:\Users\Admin\AppData\Local\Temp\53AE.tmp"77⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\540B.tmp"C:\Users\Admin\AppData\Local\Temp\540B.tmp"78⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"79⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\54A8.tmp"C:\Users\Admin\AppData\Local\Temp\54A8.tmp"80⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\54F6.tmp"C:\Users\Admin\AppData\Local\Temp\54F6.tmp"81⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\5544.tmp"C:\Users\Admin\AppData\Local\Temp\5544.tmp"82⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\5592.tmp"C:\Users\Admin\AppData\Local\Temp\5592.tmp"83⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"84⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"85⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\56AB.tmp"C:\Users\Admin\AppData\Local\Temp\56AB.tmp"86⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"87⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"88⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"89⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\5803.tmp"C:\Users\Admin\AppData\Local\Temp\5803.tmp"90⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\5861.tmp"C:\Users\Admin\AppData\Local\Temp\5861.tmp"91⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\58BF.tmp"C:\Users\Admin\AppData\Local\Temp\58BF.tmp"92⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\591C.tmp"C:\Users\Admin\AppData\Local\Temp\591C.tmp"93⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\596A.tmp"C:\Users\Admin\AppData\Local\Temp\596A.tmp"94⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\59C8.tmp"C:\Users\Admin\AppData\Local\Temp\59C8.tmp"95⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\5A26.tmp"C:\Users\Admin\AppData\Local\Temp\5A26.tmp"96⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\5A74.tmp"C:\Users\Admin\AppData\Local\Temp\5A74.tmp"97⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"98⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\5B30.tmp"C:\Users\Admin\AppData\Local\Temp\5B30.tmp"99⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"100⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"101⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"102⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"103⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"104⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\5D43.tmp"C:\Users\Admin\AppData\Local\Temp\5D43.tmp"105⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\5D91.tmp"C:\Users\Admin\AppData\Local\Temp\5D91.tmp"106⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"107⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"108⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"109⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\5F18.tmp"C:\Users\Admin\AppData\Local\Temp\5F18.tmp"110⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\5F66.tmp"C:\Users\Admin\AppData\Local\Temp\5F66.tmp"111⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"112⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\6012.tmp"C:\Users\Admin\AppData\Local\Temp\6012.tmp"113⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\606F.tmp"C:\Users\Admin\AppData\Local\Temp\606F.tmp"114⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\60CD.tmp"C:\Users\Admin\AppData\Local\Temp\60CD.tmp"115⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"116⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"117⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\61D7.tmp"C:\Users\Admin\AppData\Local\Temp\61D7.tmp"118⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\6234.tmp"C:\Users\Admin\AppData\Local\Temp\6234.tmp"119⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"120⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\62D1.tmp"C:\Users\Admin\AppData\Local\Temp\62D1.tmp"121⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\631F.tmp"C:\Users\Admin\AppData\Local\Temp\631F.tmp"122⤵PID:3612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-