Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe
-
Size
530KB
-
MD5
3a8e164e579a82983254b50d6ae55c63
-
SHA1
ff433b988c250afaee65282ccadde79193c97e55
-
SHA256
344514449927d2dcf59d572309c16878e8e67f401ad891ed9d641b2650035384
-
SHA512
e62c79c9549f0d2aa85e6eea6cc641df1100e3cc0653e323edf4a497734a59de99d481e112ae003d90711739d70747ebdf93949ba3a153f135f5866bb38413c4
-
SSDEEP
12288:AU5rCOTeio2kuw6+yY2J7xxdP4vNZulFVg0M1:AUQOJoJ6xY2JNx1INclFV/M1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3840 40B2.tmp 1112 414F.tmp 3744 41EB.tmp 4684 4287.tmp 452 42E5.tmp 3892 4371.tmp 4844 43DF.tmp 2432 445C.tmp 2944 44F8.tmp 2196 4575.tmp 3512 45E2.tmp 3192 466F.tmp 1936 46CD.tmp 1756 474A.tmp 1932 47C7.tmp 4764 4834.tmp 2904 48A2.tmp 1072 490F.tmp 2168 499C.tmp 3476 4A28.tmp 2504 4AB5.tmp 1780 4B22.tmp 3756 4B90.tmp 1548 4C1C.tmp 3844 4C8A.tmp 3116 4D16.tmp 4452 4D93.tmp 868 4E20.tmp 780 4E8D.tmp 2192 4EFB.tmp 908 4F58.tmp 3984 4FB6.tmp 2184 5023.tmp 548 5072.tmp 4708 50CF.tmp 2060 511D.tmp 216 516C.tmp 3580 51BA.tmp 4688 5217.tmp 2160 5266.tmp 4912 52B4.tmp 3848 5302.tmp 2156 5360.tmp 876 53BD.tmp 4088 540B.tmp 516 545A.tmp 1340 54B7.tmp 3196 5515.tmp 4684 5573.tmp 4760 55D1.tmp 2104 562E.tmp 2932 567C.tmp 4780 56CB.tmp 1088 5719.tmp 3024 5776.tmp 4392 57C5.tmp 3332 5822.tmp 3052 5880.tmp 4960 58DE.tmp 4116 592C.tmp 3140 597A.tmp 372 59E7.tmp 1756 5A45.tmp 996 5AA3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 3840 960 2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe 83 PID 960 wrote to memory of 3840 960 2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe 83 PID 960 wrote to memory of 3840 960 2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe 83 PID 3840 wrote to memory of 1112 3840 40B2.tmp 85 PID 3840 wrote to memory of 1112 3840 40B2.tmp 85 PID 3840 wrote to memory of 1112 3840 40B2.tmp 85 PID 1112 wrote to memory of 3744 1112 414F.tmp 86 PID 1112 wrote to memory of 3744 1112 414F.tmp 86 PID 1112 wrote to memory of 3744 1112 414F.tmp 86 PID 3744 wrote to memory of 4684 3744 41EB.tmp 88 PID 3744 wrote to memory of 4684 3744 41EB.tmp 88 PID 3744 wrote to memory of 4684 3744 41EB.tmp 88 PID 4684 wrote to memory of 452 4684 4287.tmp 89 PID 4684 wrote to memory of 452 4684 4287.tmp 89 PID 4684 wrote to memory of 452 4684 4287.tmp 89 PID 452 wrote to memory of 3892 452 42E5.tmp 90 PID 452 wrote to memory of 3892 452 42E5.tmp 90 PID 452 wrote to memory of 3892 452 42E5.tmp 90 PID 3892 wrote to memory of 4844 3892 4371.tmp 91 PID 3892 wrote to memory of 4844 3892 4371.tmp 91 PID 3892 wrote to memory of 4844 3892 4371.tmp 91 PID 4844 wrote to memory of 2432 4844 43DF.tmp 92 PID 4844 wrote to memory of 2432 4844 43DF.tmp 92 PID 4844 wrote to memory of 2432 4844 43DF.tmp 92 PID 2432 wrote to memory of 2944 2432 445C.tmp 93 PID 2432 wrote to memory of 2944 2432 445C.tmp 93 PID 2432 wrote to memory of 2944 2432 445C.tmp 93 PID 2944 wrote to memory of 2196 2944 44F8.tmp 94 PID 2944 wrote to memory of 2196 2944 44F8.tmp 94 PID 2944 wrote to memory of 2196 2944 44F8.tmp 94 PID 2196 wrote to memory of 3512 2196 4575.tmp 95 PID 2196 wrote to memory of 3512 2196 4575.tmp 95 PID 2196 wrote to memory of 3512 2196 4575.tmp 95 PID 3512 wrote to memory of 3192 3512 45E2.tmp 96 PID 3512 wrote to memory of 3192 3512 45E2.tmp 96 PID 3512 wrote to memory of 3192 3512 45E2.tmp 96 PID 3192 wrote to memory of 1936 3192 466F.tmp 97 PID 3192 wrote to memory of 1936 3192 466F.tmp 97 PID 3192 wrote to memory of 1936 3192 466F.tmp 97 PID 1936 wrote to memory of 1756 1936 46CD.tmp 98 PID 1936 wrote to memory of 1756 1936 46CD.tmp 98 PID 1936 wrote to memory of 1756 1936 46CD.tmp 98 PID 1756 wrote to memory of 1932 1756 474A.tmp 99 PID 1756 wrote to memory of 1932 1756 474A.tmp 99 PID 1756 wrote to memory of 1932 1756 474A.tmp 99 PID 1932 wrote to memory of 4764 1932 47C7.tmp 100 PID 1932 wrote to memory of 4764 1932 47C7.tmp 100 PID 1932 wrote to memory of 4764 1932 47C7.tmp 100 PID 4764 wrote to memory of 2904 4764 4834.tmp 101 PID 4764 wrote to memory of 2904 4764 4834.tmp 101 PID 4764 wrote to memory of 2904 4764 4834.tmp 101 PID 2904 wrote to memory of 1072 2904 48A2.tmp 102 PID 2904 wrote to memory of 1072 2904 48A2.tmp 102 PID 2904 wrote to memory of 1072 2904 48A2.tmp 102 PID 1072 wrote to memory of 2168 1072 490F.tmp 103 PID 1072 wrote to memory of 2168 1072 490F.tmp 103 PID 1072 wrote to memory of 2168 1072 490F.tmp 103 PID 2168 wrote to memory of 3476 2168 499C.tmp 104 PID 2168 wrote to memory of 3476 2168 499C.tmp 104 PID 2168 wrote to memory of 3476 2168 499C.tmp 104 PID 3476 wrote to memory of 2504 3476 4A28.tmp 105 PID 3476 wrote to memory of 2504 3476 4A28.tmp 105 PID 3476 wrote to memory of 2504 3476 4A28.tmp 105 PID 2504 wrote to memory of 1780 2504 4AB5.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_3a8e164e579a82983254b50d6ae55c63_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\40B2.tmp"C:\Users\Admin\AppData\Local\Temp\40B2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\414F.tmp"C:\Users\Admin\AppData\Local\Temp\414F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\41EB.tmp"C:\Users\Admin\AppData\Local\Temp\41EB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\4287.tmp"C:\Users\Admin\AppData\Local\Temp\4287.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\42E5.tmp"C:\Users\Admin\AppData\Local\Temp\42E5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\4371.tmp"C:\Users\Admin\AppData\Local\Temp\4371.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\43DF.tmp"C:\Users\Admin\AppData\Local\Temp\43DF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\445C.tmp"C:\Users\Admin\AppData\Local\Temp\445C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\44F8.tmp"C:\Users\Admin\AppData\Local\Temp\44F8.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\4575.tmp"C:\Users\Admin\AppData\Local\Temp\4575.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\45E2.tmp"C:\Users\Admin\AppData\Local\Temp\45E2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\466F.tmp"C:\Users\Admin\AppData\Local\Temp\466F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\46CD.tmp"C:\Users\Admin\AppData\Local\Temp\46CD.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\474A.tmp"C:\Users\Admin\AppData\Local\Temp\474A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\47C7.tmp"C:\Users\Admin\AppData\Local\Temp\47C7.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4834.tmp"C:\Users\Admin\AppData\Local\Temp\4834.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\48A2.tmp"C:\Users\Admin\AppData\Local\Temp\48A2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\490F.tmp"C:\Users\Admin\AppData\Local\Temp\490F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\499C.tmp"C:\Users\Admin\AppData\Local\Temp\499C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\4A28.tmp"C:\Users\Admin\AppData\Local\Temp\4A28.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\4B22.tmp"C:\Users\Admin\AppData\Local\Temp\4B22.tmp"23⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\4B90.tmp"C:\Users\Admin\AppData\Local\Temp\4B90.tmp"24⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"25⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"26⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\4D16.tmp"C:\Users\Admin\AppData\Local\Temp\4D16.tmp"27⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"28⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\4E20.tmp"C:\Users\Admin\AppData\Local\Temp\4E20.tmp"29⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"30⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"31⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"32⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"33⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp"34⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\5072.tmp"C:\Users\Admin\AppData\Local\Temp\5072.tmp"35⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\50CF.tmp"C:\Users\Admin\AppData\Local\Temp\50CF.tmp"36⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\511D.tmp"C:\Users\Admin\AppData\Local\Temp\511D.tmp"37⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\516C.tmp"C:\Users\Admin\AppData\Local\Temp\516C.tmp"38⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\51BA.tmp"C:\Users\Admin\AppData\Local\Temp\51BA.tmp"39⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\5217.tmp"C:\Users\Admin\AppData\Local\Temp\5217.tmp"40⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"41⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"42⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\5302.tmp"C:\Users\Admin\AppData\Local\Temp\5302.tmp"43⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\5360.tmp"C:\Users\Admin\AppData\Local\Temp\5360.tmp"44⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\53BD.tmp"C:\Users\Admin\AppData\Local\Temp\53BD.tmp"45⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\540B.tmp"C:\Users\Admin\AppData\Local\Temp\540B.tmp"46⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"47⤵
- Executes dropped EXE
PID:516 -
C:\Users\Admin\AppData\Local\Temp\54B7.tmp"C:\Users\Admin\AppData\Local\Temp\54B7.tmp"48⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\5515.tmp"C:\Users\Admin\AppData\Local\Temp\5515.tmp"49⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\5573.tmp"C:\Users\Admin\AppData\Local\Temp\5573.tmp"50⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\55D1.tmp"C:\Users\Admin\AppData\Local\Temp\55D1.tmp"51⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\562E.tmp"C:\Users\Admin\AppData\Local\Temp\562E.tmp"52⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\567C.tmp"C:\Users\Admin\AppData\Local\Temp\567C.tmp"53⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\56CB.tmp"C:\Users\Admin\AppData\Local\Temp\56CB.tmp"54⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\5719.tmp"C:\Users\Admin\AppData\Local\Temp\5719.tmp"55⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\5776.tmp"C:\Users\Admin\AppData\Local\Temp\5776.tmp"56⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\57C5.tmp"C:\Users\Admin\AppData\Local\Temp\57C5.tmp"57⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\5822.tmp"C:\Users\Admin\AppData\Local\Temp\5822.tmp"58⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\5880.tmp"C:\Users\Admin\AppData\Local\Temp\5880.tmp"59⤵
- Executes dropped EXE
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\58DE.tmp"C:\Users\Admin\AppData\Local\Temp\58DE.tmp"60⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"61⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\597A.tmp"C:\Users\Admin\AppData\Local\Temp\597A.tmp"62⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"63⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\5A45.tmp"C:\Users\Admin\AppData\Local\Temp\5A45.tmp"64⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"65⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\5B01.tmp"C:\Users\Admin\AppData\Local\Temp\5B01.tmp"66⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\5B4F.tmp"C:\Users\Admin\AppData\Local\Temp\5B4F.tmp"67⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\5B9D.tmp"C:\Users\Admin\AppData\Local\Temp\5B9D.tmp"68⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"C:\Users\Admin\AppData\Local\Temp\5BFB.tmp"69⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\5C58.tmp"C:\Users\Admin\AppData\Local\Temp\5C58.tmp"70⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\5CA7.tmp"C:\Users\Admin\AppData\Local\Temp\5CA7.tmp"71⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\5D04.tmp"C:\Users\Admin\AppData\Local\Temp\5D04.tmp"72⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\5D62.tmp"C:\Users\Admin\AppData\Local\Temp\5D62.tmp"73⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"74⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\5E1E.tmp"C:\Users\Admin\AppData\Local\Temp\5E1E.tmp"75⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\5E6C.tmp"C:\Users\Admin\AppData\Local\Temp\5E6C.tmp"76⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\5EC9.tmp"C:\Users\Admin\AppData\Local\Temp\5EC9.tmp"77⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\5F27.tmp"C:\Users\Admin\AppData\Local\Temp\5F27.tmp"78⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\5F75.tmp"C:\Users\Admin\AppData\Local\Temp\5F75.tmp"79⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"80⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"81⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"82⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\60CD.tmp"C:\Users\Admin\AppData\Local\Temp\60CD.tmp"83⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"84⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"85⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\61C7.tmp"C:\Users\Admin\AppData\Local\Temp\61C7.tmp"86⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\6215.tmp"C:\Users\Admin\AppData\Local\Temp\6215.tmp"87⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"88⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"89⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\630F.tmp"C:\Users\Admin\AppData\Local\Temp\630F.tmp"90⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\636D.tmp"C:\Users\Admin\AppData\Local\Temp\636D.tmp"91⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\63CB.tmp"C:\Users\Admin\AppData\Local\Temp\63CB.tmp"92⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"93⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\6477.tmp"C:\Users\Admin\AppData\Local\Temp\6477.tmp"94⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\64D4.tmp"C:\Users\Admin\AppData\Local\Temp\64D4.tmp"95⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\6522.tmp"C:\Users\Admin\AppData\Local\Temp\6522.tmp"96⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\6580.tmp"C:\Users\Admin\AppData\Local\Temp\6580.tmp"97⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\65CE.tmp"C:\Users\Admin\AppData\Local\Temp\65CE.tmp"98⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"99⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\668A.tmp"C:\Users\Admin\AppData\Local\Temp\668A.tmp"100⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\66E8.tmp"C:\Users\Admin\AppData\Local\Temp\66E8.tmp"101⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\6745.tmp"C:\Users\Admin\AppData\Local\Temp\6745.tmp"102⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\67A3.tmp"C:\Users\Admin\AppData\Local\Temp\67A3.tmp"103⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\6801.tmp"C:\Users\Admin\AppData\Local\Temp\6801.tmp"104⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"105⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\68BC.tmp"C:\Users\Admin\AppData\Local\Temp\68BC.tmp"106⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\691A.tmp"C:\Users\Admin\AppData\Local\Temp\691A.tmp"107⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\6968.tmp"C:\Users\Admin\AppData\Local\Temp\6968.tmp"108⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\69C6.tmp"C:\Users\Admin\AppData\Local\Temp\69C6.tmp"109⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"110⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"111⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"112⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"113⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"114⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"115⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\6C47.tmp"C:\Users\Admin\AppData\Local\Temp\6C47.tmp"116⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"117⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\6D12.tmp"C:\Users\Admin\AppData\Local\Temp\6D12.tmp"118⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"119⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\6DBE.tmp"C:\Users\Admin\AppData\Local\Temp\6DBE.tmp"120⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"121⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"122⤵PID:4032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-