Analysis
-
max time kernel
159s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe
-
Size
486KB
-
MD5
ad3ebb4caa508935eacdf046b24672e1
-
SHA1
ee813ea8c45f25b7df2e91753c36492557718603
-
SHA256
2ff5d20e5d1482498c584e11fd1f4b635bbff562b0a7850b4c713d42588868d8
-
SHA512
453d6e20ec0756042566f8d21ee8632dc11976a2754c905cc0a465074fc1d3fbdea7b95405ea742d449dc33a79a2e10947398e483f0b9f10820e57d40ff7875a
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7SbsqMwoq83CSZa2ca2sAVcdA1he7e+71oanT:/U5rCOTeiDS4qqvk3a2sR7XBvylQNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1992 4F34.tmp 4040 531C.tmp 2760 53F7.tmp 972 5510.tmp 3288 5687.tmp 1420 57DF.tmp 5420 58E9.tmp 5404 5BE6.tmp 5632 6230.tmp 3988 6387.tmp 5356 6702.tmp 5568 6983.tmp 4532 6D6B.tmp 4168 71C0.tmp 3016 73F3.tmp 5960 7615.tmp 5964 77AC.tmp 5996 7A4C.tmp 5824 7C11.tmp 5504 7E72.tmp 5496 7FAB.tmp 4812 81ED.tmp 5076 846D.tmp 5156 878A.tmp 5256 8901.tmp 2104 89DC.tmp 5812 8AA7.tmp 1768 8B72.tmp 2168 8D28.tmp 3784 8E02.tmp 224 8F2B.tmp 3084 8FE7.tmp 6028 91AC.tmp 368 9296.tmp 1144 940D.tmp 5208 948A.tmp 4296 9517.tmp 2640 95B3.tmp 4452 9621.tmp 3332 9788.tmp 5008 991E.tmp 5796 9B70.tmp 2328 9D83.tmp 5176 A033.tmp 1440 A207.tmp 4764 A294.tmp 3980 A40B.tmp 2932 A505.tmp 1652 A69B.tmp 3416 A7F3.tmp 3532 A880.tmp 2884 A999.tmp 1864 AB00.tmp 3816 ACD5.tmp 1504 AD91.tmp 4836 ADFE.tmp 5204 AE8B.tmp 2952 AF27.tmp 4664 AFE2.tmp 3232 B06F.tmp 3800 B244.tmp 4884 B3BB.tmp 4468 B428.tmp 1604 B4A5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1992 3424 2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe 91 PID 3424 wrote to memory of 1992 3424 2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe 91 PID 3424 wrote to memory of 1992 3424 2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe 91 PID 1992 wrote to memory of 4040 1992 4F34.tmp 92 PID 1992 wrote to memory of 4040 1992 4F34.tmp 92 PID 1992 wrote to memory of 4040 1992 4F34.tmp 92 PID 4040 wrote to memory of 2760 4040 531C.tmp 93 PID 4040 wrote to memory of 2760 4040 531C.tmp 93 PID 4040 wrote to memory of 2760 4040 531C.tmp 93 PID 2760 wrote to memory of 972 2760 53F7.tmp 94 PID 2760 wrote to memory of 972 2760 53F7.tmp 94 PID 2760 wrote to memory of 972 2760 53F7.tmp 94 PID 972 wrote to memory of 3288 972 5510.tmp 95 PID 972 wrote to memory of 3288 972 5510.tmp 95 PID 972 wrote to memory of 3288 972 5510.tmp 95 PID 3288 wrote to memory of 1420 3288 5687.tmp 96 PID 3288 wrote to memory of 1420 3288 5687.tmp 96 PID 3288 wrote to memory of 1420 3288 5687.tmp 96 PID 1420 wrote to memory of 5420 1420 57DF.tmp 97 PID 1420 wrote to memory of 5420 1420 57DF.tmp 97 PID 1420 wrote to memory of 5420 1420 57DF.tmp 97 PID 5420 wrote to memory of 5404 5420 58E9.tmp 98 PID 5420 wrote to memory of 5404 5420 58E9.tmp 98 PID 5420 wrote to memory of 5404 5420 58E9.tmp 98 PID 5404 wrote to memory of 5632 5404 5BE6.tmp 99 PID 5404 wrote to memory of 5632 5404 5BE6.tmp 99 PID 5404 wrote to memory of 5632 5404 5BE6.tmp 99 PID 5632 wrote to memory of 3988 5632 6230.tmp 100 PID 5632 wrote to memory of 3988 5632 6230.tmp 100 PID 5632 wrote to memory of 3988 5632 6230.tmp 100 PID 3988 wrote to memory of 5356 3988 6387.tmp 101 PID 3988 wrote to memory of 5356 3988 6387.tmp 101 PID 3988 wrote to memory of 5356 3988 6387.tmp 101 PID 5356 wrote to memory of 5568 5356 6702.tmp 102 PID 5356 wrote to memory of 5568 5356 6702.tmp 102 PID 5356 wrote to memory of 5568 5356 6702.tmp 102 PID 5568 wrote to memory of 4532 5568 6983.tmp 103 PID 5568 wrote to memory of 4532 5568 6983.tmp 103 PID 5568 wrote to memory of 4532 5568 6983.tmp 103 PID 4532 wrote to memory of 4168 4532 6D6B.tmp 104 PID 4532 wrote to memory of 4168 4532 6D6B.tmp 104 PID 4532 wrote to memory of 4168 4532 6D6B.tmp 104 PID 4168 wrote to memory of 3016 4168 71C0.tmp 105 PID 4168 wrote to memory of 3016 4168 71C0.tmp 105 PID 4168 wrote to memory of 3016 4168 71C0.tmp 105 PID 3016 wrote to memory of 5960 3016 73F3.tmp 106 PID 3016 wrote to memory of 5960 3016 73F3.tmp 106 PID 3016 wrote to memory of 5960 3016 73F3.tmp 106 PID 5960 wrote to memory of 5964 5960 7615.tmp 107 PID 5960 wrote to memory of 5964 5960 7615.tmp 107 PID 5960 wrote to memory of 5964 5960 7615.tmp 107 PID 5964 wrote to memory of 5996 5964 77AC.tmp 109 PID 5964 wrote to memory of 5996 5964 77AC.tmp 109 PID 5964 wrote to memory of 5996 5964 77AC.tmp 109 PID 5996 wrote to memory of 5824 5996 7A4C.tmp 110 PID 5996 wrote to memory of 5824 5996 7A4C.tmp 110 PID 5996 wrote to memory of 5824 5996 7A4C.tmp 110 PID 5824 wrote to memory of 5504 5824 7C11.tmp 111 PID 5824 wrote to memory of 5504 5824 7C11.tmp 111 PID 5824 wrote to memory of 5504 5824 7C11.tmp 111 PID 5504 wrote to memory of 5496 5504 7E72.tmp 113 PID 5504 wrote to memory of 5496 5504 7E72.tmp 113 PID 5504 wrote to memory of 5496 5504 7E72.tmp 113 PID 5496 wrote to memory of 4812 5496 7FAB.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-09_ad3ebb4caa508935eacdf046b24672e1_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\531C.tmp"C:\Users\Admin\AppData\Local\Temp\531C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\53F7.tmp"C:\Users\Admin\AppData\Local\Temp\53F7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\5687.tmp"C:\Users\Admin\AppData\Local\Temp\5687.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\57DF.tmp"C:\Users\Admin\AppData\Local\Temp\57DF.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5420 -
C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5404 -
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5632 -
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\6702.tmp"C:\Users\Admin\AppData\Local\Temp\6702.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5356 -
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\73F3.tmp"C:\Users\Admin\AppData\Local\Temp\73F3.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\7615.tmp"C:\Users\Admin\AppData\Local\Temp\7615.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5960 -
C:\Users\Admin\AppData\Local\Temp\77AC.tmp"C:\Users\Admin\AppData\Local\Temp\77AC.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5964 -
C:\Users\Admin\AppData\Local\Temp\7A4C.tmp"C:\Users\Admin\AppData\Local\Temp\7A4C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\7C11.tmp"C:\Users\Admin\AppData\Local\Temp\7C11.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5824 -
C:\Users\Admin\AppData\Local\Temp\7E72.tmp"C:\Users\Admin\AppData\Local\Temp\7E72.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\81ED.tmp"C:\Users\Admin\AppData\Local\Temp\81ED.tmp"23⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\846D.tmp"C:\Users\Admin\AppData\Local\Temp\846D.tmp"24⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\878A.tmp"C:\Users\Admin\AppData\Local\Temp\878A.tmp"25⤵
- Executes dropped EXE
PID:5156 -
C:\Users\Admin\AppData\Local\Temp\8901.tmp"C:\Users\Admin\AppData\Local\Temp\8901.tmp"26⤵
- Executes dropped EXE
PID:5256 -
C:\Users\Admin\AppData\Local\Temp\89DC.tmp"C:\Users\Admin\AppData\Local\Temp\89DC.tmp"27⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\8AA7.tmp"C:\Users\Admin\AppData\Local\Temp\8AA7.tmp"28⤵
- Executes dropped EXE
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\8B72.tmp"C:\Users\Admin\AppData\Local\Temp\8B72.tmp"29⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\8D28.tmp"C:\Users\Admin\AppData\Local\Temp\8D28.tmp"30⤵
- Executes dropped EXE
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\8E02.tmp"C:\Users\Admin\AppData\Local\Temp\8E02.tmp"31⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"32⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\8FE7.tmp"C:\Users\Admin\AppData\Local\Temp\8FE7.tmp"33⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\91AC.tmp"C:\Users\Admin\AppData\Local\Temp\91AC.tmp"34⤵
- Executes dropped EXE
PID:6028 -
C:\Users\Admin\AppData\Local\Temp\9296.tmp"C:\Users\Admin\AppData\Local\Temp\9296.tmp"35⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\940D.tmp"C:\Users\Admin\AppData\Local\Temp\940D.tmp"36⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\948A.tmp"C:\Users\Admin\AppData\Local\Temp\948A.tmp"37⤵
- Executes dropped EXE
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\9517.tmp"C:\Users\Admin\AppData\Local\Temp\9517.tmp"38⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\95B3.tmp"C:\Users\Admin\AppData\Local\Temp\95B3.tmp"39⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\9621.tmp"C:\Users\Admin\AppData\Local\Temp\9621.tmp"40⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\9788.tmp"C:\Users\Admin\AppData\Local\Temp\9788.tmp"41⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\991E.tmp"C:\Users\Admin\AppData\Local\Temp\991E.tmp"42⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\9B70.tmp"C:\Users\Admin\AppData\Local\Temp\9B70.tmp"43⤵
- Executes dropped EXE
PID:5796 -
C:\Users\Admin\AppData\Local\Temp\9D83.tmp"C:\Users\Admin\AppData\Local\Temp\9D83.tmp"44⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\A033.tmp"C:\Users\Admin\AppData\Local\Temp\A033.tmp"45⤵
- Executes dropped EXE
PID:5176 -
C:\Users\Admin\AppData\Local\Temp\A207.tmp"C:\Users\Admin\AppData\Local\Temp\A207.tmp"46⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\A294.tmp"C:\Users\Admin\AppData\Local\Temp\A294.tmp"47⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\A40B.tmp"C:\Users\Admin\AppData\Local\Temp\A40B.tmp"48⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\A505.tmp"C:\Users\Admin\AppData\Local\Temp\A505.tmp"49⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\A69B.tmp"C:\Users\Admin\AppData\Local\Temp\A69B.tmp"50⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"51⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\A880.tmp"C:\Users\Admin\AppData\Local\Temp\A880.tmp"52⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\A999.tmp"C:\Users\Admin\AppData\Local\Temp\A999.tmp"53⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\AB00.tmp"C:\Users\Admin\AppData\Local\Temp\AB00.tmp"54⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\ACD5.tmp"C:\Users\Admin\AppData\Local\Temp\ACD5.tmp"55⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\AD91.tmp"C:\Users\Admin\AppData\Local\Temp\AD91.tmp"56⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\ADFE.tmp"C:\Users\Admin\AppData\Local\Temp\ADFE.tmp"57⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\AE8B.tmp"C:\Users\Admin\AppData\Local\Temp\AE8B.tmp"58⤵
- Executes dropped EXE
PID:5204 -
C:\Users\Admin\AppData\Local\Temp\AF27.tmp"C:\Users\Admin\AppData\Local\Temp\AF27.tmp"59⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"60⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\B06F.tmp"C:\Users\Admin\AppData\Local\Temp\B06F.tmp"61⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\B244.tmp"C:\Users\Admin\AppData\Local\Temp\B244.tmp"62⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\B3BB.tmp"C:\Users\Admin\AppData\Local\Temp\B3BB.tmp"63⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\B428.tmp"C:\Users\Admin\AppData\Local\Temp\B428.tmp"64⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"65⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\B522.tmp"C:\Users\Admin\AppData\Local\Temp\B522.tmp"66⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\B689.tmp"C:\Users\Admin\AppData\Local\Temp\B689.tmp"67⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\E6A2.tmp"C:\Users\Admin\AppData\Local\Temp\E6A2.tmp"68⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\E75D.tmp"C:\Users\Admin\AppData\Local\Temp\E75D.tmp"69⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\E8E4.tmp"C:\Users\Admin\AppData\Local\Temp\E8E4.tmp"70⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\E990.tmp"C:\Users\Admin\AppData\Local\Temp\E990.tmp"71⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\EA0D.tmp"C:\Users\Admin\AppData\Local\Temp\EA0D.tmp"72⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\EA8A.tmp"C:\Users\Admin\AppData\Local\Temp\EA8A.tmp"73⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\EB07.tmp"C:\Users\Admin\AppData\Local\Temp\EB07.tmp"74⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"75⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\ED1A.tmp"C:\Users\Admin\AppData\Local\Temp\ED1A.tmp"76⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\EDA7.tmp"C:\Users\Admin\AppData\Local\Temp\EDA7.tmp"77⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\F056.tmp"C:\Users\Admin\AppData\Local\Temp\F056.tmp"78⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"79⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\F131.tmp"C:\Users\Admin\AppData\Local\Temp\F131.tmp"80⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\F1AE.tmp"C:\Users\Admin\AppData\Local\Temp\F1AE.tmp"81⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\F24A.tmp"C:\Users\Admin\AppData\Local\Temp\F24A.tmp"82⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\F2C7.tmp"C:\Users\Admin\AppData\Local\Temp\F2C7.tmp"83⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\F373.tmp"C:\Users\Admin\AppData\Local\Temp\F373.tmp"84⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\F567.tmp"C:\Users\Admin\AppData\Local\Temp\F567.tmp"85⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\F603.tmp"C:\Users\Admin\AppData\Local\Temp\F603.tmp"86⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\F690.tmp"C:\Users\Admin\AppData\Local\Temp\F690.tmp"87⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\F98E.tmp"C:\Users\Admin\AppData\Local\Temp\F98E.tmp"88⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\FA1A.tmp"C:\Users\Admin\AppData\Local\Temp\FA1A.tmp"89⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\FB53.tmp"C:\Users\Admin\AppData\Local\Temp\FB53.tmp"90⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\FBC0.tmp"C:\Users\Admin\AppData\Local\Temp\FBC0.tmp"91⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\FC5C.tmp"C:\Users\Admin\AppData\Local\Temp\FC5C.tmp"92⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\FCCA.tmp"C:\Users\Admin\AppData\Local\Temp\FCCA.tmp"93⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\FE8F.tmp"C:\Users\Admin\AppData\Local\Temp\FE8F.tmp"94⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\238.tmp"C:\Users\Admin\AppData\Local\Temp\238.tmp"95⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2C5.tmp"C:\Users\Admin\AppData\Local\Temp\2C5.tmp"96⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\332.tmp"C:\Users\Admin\AppData\Local\Temp\332.tmp"97⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\3DE.tmp"C:\Users\Admin\AppData\Local\Temp\3DE.tmp"98⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\68E.tmp"C:\Users\Admin\AppData\Local\Temp\68E.tmp"99⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\9DA.tmp"C:\Users\Admin\AppData\Local\Temp\9DA.tmp"100⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\A47.tmp"C:\Users\Admin\AppData\Local\Temp\A47.tmp"101⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\AE3.tmp"C:\Users\Admin\AppData\Local\Temp\AE3.tmp"102⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\CC8.tmp"C:\Users\Admin\AppData\Local\Temp\CC8.tmp"103⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\E9C.tmp"C:\Users\Admin\AppData\Local\Temp\E9C.tmp"104⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\F96.tmp"C:\Users\Admin\AppData\Local\Temp\F96.tmp"105⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\1013.tmp"C:\Users\Admin\AppData\Local\Temp\1013.tmp"106⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\11C9.tmp"C:\Users\Admin\AppData\Local\Temp\11C9.tmp"107⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\1246.tmp"C:\Users\Admin\AppData\Local\Temp\1246.tmp"108⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\12C3.tmp"C:\Users\Admin\AppData\Local\Temp\12C3.tmp"109⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\1330.tmp"C:\Users\Admin\AppData\Local\Temp\1330.tmp"110⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\13AD.tmp"C:\Users\Admin\AppData\Local\Temp\13AD.tmp"111⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\141B.tmp"C:\Users\Admin\AppData\Local\Temp\141B.tmp"112⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\14A7.tmp"C:\Users\Admin\AppData\Local\Temp\14A7.tmp"113⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\1524.tmp"C:\Users\Admin\AppData\Local\Temp\1524.tmp"114⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\15B1.tmp"C:\Users\Admin\AppData\Local\Temp\15B1.tmp"115⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\161E.tmp"C:\Users\Admin\AppData\Local\Temp\161E.tmp"116⤵PID:6088
-
C:\Users\Admin\AppData\Local\Temp\169B.tmp"C:\Users\Admin\AppData\Local\Temp\169B.tmp"117⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\1709.tmp"C:\Users\Admin\AppData\Local\Temp\1709.tmp"118⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\17A5.tmp"C:\Users\Admin\AppData\Local\Temp\17A5.tmp"119⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\1831.tmp"C:\Users\Admin\AppData\Local\Temp\1831.tmp"120⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\189F.tmp"C:\Users\Admin\AppData\Local\Temp\189F.tmp"121⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\190C.tmp"C:\Users\Admin\AppData\Local\Temp\190C.tmp"122⤵PID:2640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-