Analysis
-
max time kernel
160s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 21:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe
-
Size
530KB
-
MD5
ef0429c8e281e263f6825a446242de94
-
SHA1
d9ddd821a96c53cbabaf7109a7e4b372f62249cd
-
SHA256
dbce36d6f0b6cd754c1667934dbbe9b44a1451013101949f0d430ac83e7b203c
-
SHA512
2ed8a27c7de9d0f8d26c16bc6f50d717e6380553bd08f3ef8e169be5dc95f1b847a31ad291eaab921830f8b80c49b93944d93993568676ca6c2af64a78eb4092
-
SSDEEP
12288:AU5rCOTeiotcWPLRi61X9Oe0hES9hvrN9MNZulFVg0M1:AUQOJothLRi61ISSb8NclFV/M1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4340 2AD4.tmp 4976 2F0A.tmp 1900 32A4.tmp 1108 33AD.tmp 2772 342A.tmp 4168 3505.tmp 1112 39A9.tmp 4672 3A93.tmp 2976 3CE5.tmp 4368 3E7B.tmp 4068 3F37.tmp 2524 405F.tmp 3656 40FC.tmp 5056 4188.tmp 1672 4215.tmp 628 42E0.tmp 4104 43AB.tmp 4564 4419.tmp 1816 4541.tmp 3284 460D.tmp 3728 4699.tmp 2124 4755.tmp 3420 47D2.tmp 4172 484F.tmp 3904 49A6.tmp 3752 4A14.tmp 1496 4ADF.tmp 4772 4B6C.tmp 4312 4BE9.tmp 1600 4CC3.tmp 4344 4E0B.tmp 1564 4F92.tmp 2728 500F.tmp 3796 508C.tmp 792 5251.tmp 4716 52BF.tmp 1312 532C.tmp 4392 53A9.tmp 3100 5649.tmp 3168 5A7F.tmp 4428 5B98.tmp 4380 5C44.tmp 4976 5CE0.tmp 3356 5D7D.tmp 2656 5E96.tmp 1868 5F51.tmp 5032 5FBF.tmp 3804 604B.tmp 4752 60F7.tmp 3792 6193.tmp 432 6220.tmp 512 6378.tmp 4044 63E5.tmp 1008 6453.tmp 4952 64DF.tmp 4460 654D.tmp 3656 6712.tmp 2272 677F.tmp 4252 680C.tmp 4100 69F0.tmp 2012 6ACB.tmp 3596 6B38.tmp 4032 6BC5.tmp 4376 6C42.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 4340 1392 2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe 90 PID 1392 wrote to memory of 4340 1392 2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe 90 PID 1392 wrote to memory of 4340 1392 2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe 90 PID 4340 wrote to memory of 4976 4340 2AD4.tmp 91 PID 4340 wrote to memory of 4976 4340 2AD4.tmp 91 PID 4340 wrote to memory of 4976 4340 2AD4.tmp 91 PID 4976 wrote to memory of 1900 4976 2F0A.tmp 92 PID 4976 wrote to memory of 1900 4976 2F0A.tmp 92 PID 4976 wrote to memory of 1900 4976 2F0A.tmp 92 PID 1900 wrote to memory of 1108 1900 32A4.tmp 93 PID 1900 wrote to memory of 1108 1900 32A4.tmp 93 PID 1900 wrote to memory of 1108 1900 32A4.tmp 93 PID 1108 wrote to memory of 2772 1108 33AD.tmp 94 PID 1108 wrote to memory of 2772 1108 33AD.tmp 94 PID 1108 wrote to memory of 2772 1108 33AD.tmp 94 PID 2772 wrote to memory of 4168 2772 342A.tmp 95 PID 2772 wrote to memory of 4168 2772 342A.tmp 95 PID 2772 wrote to memory of 4168 2772 342A.tmp 95 PID 4168 wrote to memory of 1112 4168 3505.tmp 96 PID 4168 wrote to memory of 1112 4168 3505.tmp 96 PID 4168 wrote to memory of 1112 4168 3505.tmp 96 PID 1112 wrote to memory of 4672 1112 39A9.tmp 97 PID 1112 wrote to memory of 4672 1112 39A9.tmp 97 PID 1112 wrote to memory of 4672 1112 39A9.tmp 97 PID 4672 wrote to memory of 2976 4672 3A93.tmp 98 PID 4672 wrote to memory of 2976 4672 3A93.tmp 98 PID 4672 wrote to memory of 2976 4672 3A93.tmp 98 PID 2976 wrote to memory of 4368 2976 3CE5.tmp 99 PID 2976 wrote to memory of 4368 2976 3CE5.tmp 99 PID 2976 wrote to memory of 4368 2976 3CE5.tmp 99 PID 4368 wrote to memory of 4068 4368 3E7B.tmp 100 PID 4368 wrote to memory of 4068 4368 3E7B.tmp 100 PID 4368 wrote to memory of 4068 4368 3E7B.tmp 100 PID 4068 wrote to memory of 2524 4068 3F37.tmp 101 PID 4068 wrote to memory of 2524 4068 3F37.tmp 101 PID 4068 wrote to memory of 2524 4068 3F37.tmp 101 PID 2524 wrote to memory of 3656 2524 405F.tmp 102 PID 2524 wrote to memory of 3656 2524 405F.tmp 102 PID 2524 wrote to memory of 3656 2524 405F.tmp 102 PID 3656 wrote to memory of 5056 3656 40FC.tmp 103 PID 3656 wrote to memory of 5056 3656 40FC.tmp 103 PID 3656 wrote to memory of 5056 3656 40FC.tmp 103 PID 5056 wrote to memory of 1672 5056 4188.tmp 104 PID 5056 wrote to memory of 1672 5056 4188.tmp 104 PID 5056 wrote to memory of 1672 5056 4188.tmp 104 PID 1672 wrote to memory of 628 1672 4215.tmp 105 PID 1672 wrote to memory of 628 1672 4215.tmp 105 PID 1672 wrote to memory of 628 1672 4215.tmp 105 PID 628 wrote to memory of 4104 628 42E0.tmp 106 PID 628 wrote to memory of 4104 628 42E0.tmp 106 PID 628 wrote to memory of 4104 628 42E0.tmp 106 PID 4104 wrote to memory of 4564 4104 43AB.tmp 107 PID 4104 wrote to memory of 4564 4104 43AB.tmp 107 PID 4104 wrote to memory of 4564 4104 43AB.tmp 107 PID 4564 wrote to memory of 1816 4564 4419.tmp 108 PID 4564 wrote to memory of 1816 4564 4419.tmp 108 PID 4564 wrote to memory of 1816 4564 4419.tmp 108 PID 1816 wrote to memory of 3284 1816 4541.tmp 109 PID 1816 wrote to memory of 3284 1816 4541.tmp 109 PID 1816 wrote to memory of 3284 1816 4541.tmp 109 PID 3284 wrote to memory of 3728 3284 460D.tmp 110 PID 3284 wrote to memory of 3728 3284 460D.tmp 110 PID 3284 wrote to memory of 3728 3284 460D.tmp 110 PID 3728 wrote to memory of 2124 3728 4699.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-08_ef0429c8e281e263f6825a446242de94_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\3A93.tmp"C:\Users\Admin\AppData\Local\Temp\3A93.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3F37.tmp"C:\Users\Admin\AppData\Local\Temp\3F37.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\4188.tmp"C:\Users\Admin\AppData\Local\Temp\4188.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\4215.tmp"C:\Users\Admin\AppData\Local\Temp\4215.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\4419.tmp"C:\Users\Admin\AppData\Local\Temp\4419.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\460D.tmp"C:\Users\Admin\AppData\Local\Temp\460D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"23⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\47D2.tmp"C:\Users\Admin\AppData\Local\Temp\47D2.tmp"24⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"25⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"26⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\4A14.tmp"C:\Users\Admin\AppData\Local\Temp\4A14.tmp"27⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\4ADF.tmp"C:\Users\Admin\AppData\Local\Temp\4ADF.tmp"28⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"29⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"30⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"31⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\4E0B.tmp"C:\Users\Admin\AppData\Local\Temp\4E0B.tmp"32⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"33⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\500F.tmp"C:\Users\Admin\AppData\Local\Temp\500F.tmp"34⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\508C.tmp"C:\Users\Admin\AppData\Local\Temp\508C.tmp"35⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\5251.tmp"C:\Users\Admin\AppData\Local\Temp\5251.tmp"36⤵
- Executes dropped EXE
PID:792 -
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"37⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"38⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\53A9.tmp"C:\Users\Admin\AppData\Local\Temp\53A9.tmp"39⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"40⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"41⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\5B98.tmp"C:\Users\Admin\AppData\Local\Temp\5B98.tmp"42⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\5C44.tmp"C:\Users\Admin\AppData\Local\Temp\5C44.tmp"43⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"44⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"45⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"46⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"47⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"48⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\604B.tmp"C:\Users\Admin\AppData\Local\Temp\604B.tmp"49⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\60F7.tmp"C:\Users\Admin\AppData\Local\Temp\60F7.tmp"50⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\6193.tmp"C:\Users\Admin\AppData\Local\Temp\6193.tmp"51⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\6220.tmp"C:\Users\Admin\AppData\Local\Temp\6220.tmp"52⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\6378.tmp"C:\Users\Admin\AppData\Local\Temp\6378.tmp"53⤵
- Executes dropped EXE
PID:512 -
C:\Users\Admin\AppData\Local\Temp\63E5.tmp"C:\Users\Admin\AppData\Local\Temp\63E5.tmp"54⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\6453.tmp"C:\Users\Admin\AppData\Local\Temp\6453.tmp"55⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"56⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\654D.tmp"C:\Users\Admin\AppData\Local\Temp\654D.tmp"57⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\6712.tmp"C:\Users\Admin\AppData\Local\Temp\6712.tmp"58⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\677F.tmp"C:\Users\Admin\AppData\Local\Temp\677F.tmp"59⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\680C.tmp"C:\Users\Admin\AppData\Local\Temp\680C.tmp"60⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"61⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"62⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\6B38.tmp"C:\Users\Admin\AppData\Local\Temp\6B38.tmp"63⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\6BC5.tmp"C:\Users\Admin\AppData\Local\Temp\6BC5.tmp"64⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\6C42.tmp"C:\Users\Admin\AppData\Local\Temp\6C42.tmp"65⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"66⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"67⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\6E84.tmp"C:\Users\Admin\AppData\Local\Temp\6E84.tmp"68⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\6F01.tmp"C:\Users\Admin\AppData\Local\Temp\6F01.tmp"69⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\6F8E.tmp"C:\Users\Admin\AppData\Local\Temp\6F8E.tmp"70⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"71⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"72⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\7105.tmp"C:\Users\Admin\AppData\Local\Temp\7105.tmp"73⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\7182.tmp"C:\Users\Admin\AppData\Local\Temp\7182.tmp"74⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\7318.tmp"C:\Users\Admin\AppData\Local\Temp\7318.tmp"75⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\73B4.tmp"C:\Users\Admin\AppData\Local\Temp\73B4.tmp"76⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\7441.tmp"C:\Users\Admin\AppData\Local\Temp\7441.tmp"77⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\74DD.tmp"C:\Users\Admin\AppData\Local\Temp\74DD.tmp"78⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\755A.tmp"C:\Users\Admin\AppData\Local\Temp\755A.tmp"79⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\75E7.tmp"C:\Users\Admin\AppData\Local\Temp\75E7.tmp"80⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7692.tmp"C:\Users\Admin\AppData\Local\Temp\7692.tmp"81⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\770F.tmp"C:\Users\Admin\AppData\Local\Temp\770F.tmp"82⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\778C.tmp"C:\Users\Admin\AppData\Local\Temp\778C.tmp"83⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\77FA.tmp"C:\Users\Admin\AppData\Local\Temp\77FA.tmp"84⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\7867.tmp"C:\Users\Admin\AppData\Local\Temp\7867.tmp"85⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\78E4.tmp"C:\Users\Admin\AppData\Local\Temp\78E4.tmp"86⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\7971.tmp"C:\Users\Admin\AppData\Local\Temp\7971.tmp"87⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\7A0D.tmp"C:\Users\Admin\AppData\Local\Temp\7A0D.tmp"88⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"89⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\7AF7.tmp"C:\Users\Admin\AppData\Local\Temp\7AF7.tmp"90⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\7B65.tmp"C:\Users\Admin\AppData\Local\Temp\7B65.tmp"91⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"92⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"93⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\7CDC.tmp"C:\Users\Admin\AppData\Local\Temp\7CDC.tmp"94⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\7D49.tmp"C:\Users\Admin\AppData\Local\Temp\7D49.tmp"95⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\7DB7.tmp"C:\Users\Admin\AppData\Local\Temp\7DB7.tmp"96⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\7E24.tmp"C:\Users\Admin\AppData\Local\Temp\7E24.tmp"97⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"98⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"99⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"100⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\8085.tmp"C:\Users\Admin\AppData\Local\Temp\8085.tmp"101⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\8102.tmp"C:\Users\Admin\AppData\Local\Temp\8102.tmp"102⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\819F.tmp"C:\Users\Admin\AppData\Local\Temp\819F.tmp"103⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\821C.tmp"C:\Users\Admin\AppData\Local\Temp\821C.tmp"104⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\8299.tmp"C:\Users\Admin\AppData\Local\Temp\8299.tmp"105⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\8344.tmp"C:\Users\Admin\AppData\Local\Temp\8344.tmp"106⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\83B2.tmp"C:\Users\Admin\AppData\Local\Temp\83B2.tmp"107⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"108⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\84BB.tmp"C:\Users\Admin\AppData\Local\Temp\84BB.tmp"109⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\8548.tmp"C:\Users\Admin\AppData\Local\Temp\8548.tmp"110⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\85B5.tmp"C:\Users\Admin\AppData\Local\Temp\85B5.tmp"111⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\8671.tmp"C:\Users\Admin\AppData\Local\Temp\8671.tmp"112⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\86EE.tmp"C:\Users\Admin\AppData\Local\Temp\86EE.tmp"113⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\876B.tmp"C:\Users\Admin\AppData\Local\Temp\876B.tmp"114⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\87F8.tmp"C:\Users\Admin\AppData\Local\Temp\87F8.tmp"115⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\8865.tmp"C:\Users\Admin\AppData\Local\Temp\8865.tmp"116⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\8901.tmp"C:\Users\Admin\AppData\Local\Temp\8901.tmp"117⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\89AD.tmp"C:\Users\Admin\AppData\Local\Temp\89AD.tmp"118⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\8A3A.tmp"C:\Users\Admin\AppData\Local\Temp\8A3A.tmp"119⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\8AD6.tmp"C:\Users\Admin\AppData\Local\Temp\8AD6.tmp"120⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\8B82.tmp"C:\Users\Admin\AppData\Local\Temp\8B82.tmp"121⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"122⤵PID:4040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-