Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 12:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe
-
Size
529KB
-
MD5
0d51b37a1bd62ad20dfbc6f94580932b
-
SHA1
fe6cb28411f1e5b36cf42e9e3632090b9ea84fc8
-
SHA256
4143eb6d4482dd6633ef653f5e864a28691d9d29208df2e8bf6a8e6c63c35d54
-
SHA512
45bf48c942eb5405c56492eebc1bb7ed0ec193a190dd5b650e8d8eb3d71d81f888ca03b6878d36c67b28646034abcf0c2f5c41d8c60fbc2247dce07179ce6e74
-
SSDEEP
12288:NU5rCOTeijyy1BBDdv40cVFO31pHDkyDNU48TZwlH4Hp:NUQOJjP1BDxcTOjkoN4TSlH4Hp
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1284 1141.tmp 5012 124B.tmp 4592 13A2.tmp 4196 145E.tmp 1744 1548.tmp 3628 1642.tmp 3428 16DE.tmp 1028 1C4D.tmp 4356 1DA5.tmp 3700 1E70.tmp 4572 1F5A.tmp 1548 2035.tmp 4796 212F.tmp 3792 21FA.tmp 4564 22D5.tmp 2816 23BF.tmp 3828 24AA.tmp 3684 2594.tmp 1812 2640.tmp 3488 27B7.tmp 4240 2844.tmp 2688 297C.tmp 612 2A28.tmp 3324 2B12.tmp 1844 2BED.tmp 4988 2C89.tmp 4360 2D64.tmp 4224 2EBC.tmp 4864 2F58.tmp 3312 3023.tmp 1768 311D.tmp 4292 3208.tmp 3192 32C3.tmp 3848 335F.tmp 1608 3459.tmp 1096 34D6.tmp 2988 3553.tmp 1104 365D.tmp 2244 36EA.tmp 912 37D4.tmp 4944 3851.tmp 4744 38DE.tmp 1260 396A.tmp 5060 39F7.tmp 5112 3AA3.tmp 2672 3C87.tmp 4592 3DEE.tmp 2872 3E6B.tmp 2800 3F08.tmp 960 3F94.tmp 4268 4021.tmp 2196 40AE.tmp 2540 414A.tmp 4892 41F6.tmp 2592 42E0.tmp 3832 438C.tmp 4732 4447.tmp 2308 468A.tmp 2020 47D2.tmp 1164 486E.tmp 4796 48FB.tmp 2376 4978.tmp 1180 49F5.tmp 3968 4B5C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1284 5064 2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe 91 PID 5064 wrote to memory of 1284 5064 2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe 91 PID 5064 wrote to memory of 1284 5064 2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe 91 PID 1284 wrote to memory of 5012 1284 1141.tmp 92 PID 1284 wrote to memory of 5012 1284 1141.tmp 92 PID 1284 wrote to memory of 5012 1284 1141.tmp 92 PID 5012 wrote to memory of 4592 5012 124B.tmp 93 PID 5012 wrote to memory of 4592 5012 124B.tmp 93 PID 5012 wrote to memory of 4592 5012 124B.tmp 93 PID 4592 wrote to memory of 4196 4592 13A2.tmp 94 PID 4592 wrote to memory of 4196 4592 13A2.tmp 94 PID 4592 wrote to memory of 4196 4592 13A2.tmp 94 PID 4196 wrote to memory of 1744 4196 145E.tmp 95 PID 4196 wrote to memory of 1744 4196 145E.tmp 95 PID 4196 wrote to memory of 1744 4196 145E.tmp 95 PID 1744 wrote to memory of 3628 1744 1548.tmp 96 PID 1744 wrote to memory of 3628 1744 1548.tmp 96 PID 1744 wrote to memory of 3628 1744 1548.tmp 96 PID 3628 wrote to memory of 3428 3628 1642.tmp 97 PID 3628 wrote to memory of 3428 3628 1642.tmp 97 PID 3628 wrote to memory of 3428 3628 1642.tmp 97 PID 3428 wrote to memory of 1028 3428 16DE.tmp 98 PID 3428 wrote to memory of 1028 3428 16DE.tmp 98 PID 3428 wrote to memory of 1028 3428 16DE.tmp 98 PID 1028 wrote to memory of 4356 1028 1C4D.tmp 99 PID 1028 wrote to memory of 4356 1028 1C4D.tmp 99 PID 1028 wrote to memory of 4356 1028 1C4D.tmp 99 PID 4356 wrote to memory of 3700 4356 1DA5.tmp 100 PID 4356 wrote to memory of 3700 4356 1DA5.tmp 100 PID 4356 wrote to memory of 3700 4356 1DA5.tmp 100 PID 3700 wrote to memory of 4572 3700 1E70.tmp 101 PID 3700 wrote to memory of 4572 3700 1E70.tmp 101 PID 3700 wrote to memory of 4572 3700 1E70.tmp 101 PID 4572 wrote to memory of 1548 4572 1F5A.tmp 102 PID 4572 wrote to memory of 1548 4572 1F5A.tmp 102 PID 4572 wrote to memory of 1548 4572 1F5A.tmp 102 PID 1548 wrote to memory of 4796 1548 2035.tmp 103 PID 1548 wrote to memory of 4796 1548 2035.tmp 103 PID 1548 wrote to memory of 4796 1548 2035.tmp 103 PID 4796 wrote to memory of 3792 4796 212F.tmp 104 PID 4796 wrote to memory of 3792 4796 212F.tmp 104 PID 4796 wrote to memory of 3792 4796 212F.tmp 104 PID 3792 wrote to memory of 4564 3792 21FA.tmp 105 PID 3792 wrote to memory of 4564 3792 21FA.tmp 105 PID 3792 wrote to memory of 4564 3792 21FA.tmp 105 PID 4564 wrote to memory of 2816 4564 22D5.tmp 106 PID 4564 wrote to memory of 2816 4564 22D5.tmp 106 PID 4564 wrote to memory of 2816 4564 22D5.tmp 106 PID 2816 wrote to memory of 3828 2816 23BF.tmp 107 PID 2816 wrote to memory of 3828 2816 23BF.tmp 107 PID 2816 wrote to memory of 3828 2816 23BF.tmp 107 PID 3828 wrote to memory of 3684 3828 24AA.tmp 108 PID 3828 wrote to memory of 3684 3828 24AA.tmp 108 PID 3828 wrote to memory of 3684 3828 24AA.tmp 108 PID 3684 wrote to memory of 1812 3684 2594.tmp 109 PID 3684 wrote to memory of 1812 3684 2594.tmp 109 PID 3684 wrote to memory of 1812 3684 2594.tmp 109 PID 1812 wrote to memory of 3488 1812 2640.tmp 110 PID 1812 wrote to memory of 3488 1812 2640.tmp 110 PID 1812 wrote to memory of 3488 1812 2640.tmp 110 PID 3488 wrote to memory of 4240 3488 27B7.tmp 111 PID 3488 wrote to memory of 4240 3488 27B7.tmp 111 PID 3488 wrote to memory of 4240 3488 27B7.tmp 111 PID 4240 wrote to memory of 2688 4240 2844.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_0d51b37a1bd62ad20dfbc6f94580932b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\124B.tmp"C:\Users\Admin\AppData\Local\Temp\124B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\145E.tmp"C:\Users\Admin\AppData\Local\Temp\145E.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1642.tmp"C:\Users\Admin\AppData\Local\Temp\1642.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\212F.tmp"C:\Users\Admin\AppData\Local\Temp\212F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\21FA.tmp"C:\Users\Admin\AppData\Local\Temp\21FA.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\24AA.tmp"C:\Users\Admin\AppData\Local\Temp\24AA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"23⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"24⤵
- Executes dropped EXE
PID:612 -
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"25⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"26⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"27⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"28⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"29⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\2F58.tmp"C:\Users\Admin\AppData\Local\Temp\2F58.tmp"30⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\3023.tmp"C:\Users\Admin\AppData\Local\Temp\3023.tmp"31⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"32⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"33⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"34⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"35⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"36⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"37⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"38⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"39⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\36EA.tmp"C:\Users\Admin\AppData\Local\Temp\36EA.tmp"40⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"41⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"42⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"43⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\396A.tmp"C:\Users\Admin\AppData\Local\Temp\396A.tmp"44⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\39F7.tmp"C:\Users\Admin\AppData\Local\Temp\39F7.tmp"45⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"46⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"47⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"48⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"49⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"50⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\3F94.tmp"C:\Users\Admin\AppData\Local\Temp\3F94.tmp"51⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"52⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"53⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"54⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\41F6.tmp"C:\Users\Admin\AppData\Local\Temp\41F6.tmp"55⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"56⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\438C.tmp"C:\Users\Admin\AppData\Local\Temp\438C.tmp"57⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"58⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"59⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\47D2.tmp"C:\Users\Admin\AppData\Local\Temp\47D2.tmp"60⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"61⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"62⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"63⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"64⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"65⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"66⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\4C37.tmp"C:\Users\Admin\AppData\Local\Temp\4C37.tmp"67⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"68⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp"69⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\4FB1.tmp"C:\Users\Admin\AppData\Local\Temp\4FB1.tmp"70⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"71⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\50BB.tmp"C:\Users\Admin\AppData\Local\Temp\50BB.tmp"72⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\5176.tmp"C:\Users\Admin\AppData\Local\Temp\5176.tmp"73⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\5251.tmp"C:\Users\Admin\AppData\Local\Temp\5251.tmp"74⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"75⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"76⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\5445.tmp"C:\Users\Admin\AppData\Local\Temp\5445.tmp"77⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\54B3.tmp"C:\Users\Admin\AppData\Local\Temp\54B3.tmp"78⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\554F.tmp"C:\Users\Admin\AppData\Local\Temp\554F.tmp"79⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\55FB.tmp"C:\Users\Admin\AppData\Local\Temp\55FB.tmp"80⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\5697.tmp"C:\Users\Admin\AppData\Local\Temp\5697.tmp"81⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"82⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\57B0.tmp"C:\Users\Admin\AppData\Local\Temp\57B0.tmp"83⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"84⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp"85⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp"86⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"87⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\5E67.tmp"C:\Users\Admin\AppData\Local\Temp\5E67.tmp"88⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\6201.tmp"C:\Users\Admin\AppData\Local\Temp\6201.tmp"89⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\62AD.tmp"C:\Users\Admin\AppData\Local\Temp\62AD.tmp"90⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\6359.tmp"C:\Users\Admin\AppData\Local\Temp\6359.tmp"91⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\6481.tmp"C:\Users\Admin\AppData\Local\Temp\6481.tmp"92⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\652D.tmp"C:\Users\Admin\AppData\Local\Temp\652D.tmp"93⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\6647.tmp"C:\Users\Admin\AppData\Local\Temp\6647.tmp"94⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"95⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\67DD.tmp"C:\Users\Admin\AppData\Local\Temp\67DD.tmp"96⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"97⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"98⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\69D1.tmp"C:\Users\Admin\AppData\Local\Temp\69D1.tmp"99⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"100⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"101⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\6B57.tmp"C:\Users\Admin\AppData\Local\Temp\6B57.tmp"102⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"103⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\6C61.tmp"C:\Users\Admin\AppData\Local\Temp\6C61.tmp"104⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"105⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\6D7A.tmp"C:\Users\Admin\AppData\Local\Temp\6D7A.tmp"106⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\6E07.tmp"C:\Users\Admin\AppData\Local\Temp\6E07.tmp"107⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"108⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\6F11.tmp"C:\Users\Admin\AppData\Local\Temp\6F11.tmp"109⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"110⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"111⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"112⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\71A1.tmp"C:\Users\Admin\AppData\Local\Temp\71A1.tmp"113⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\723D.tmp"C:\Users\Admin\AppData\Local\Temp\723D.tmp"114⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\74CD.tmp"C:\Users\Admin\AppData\Local\Temp\74CD.tmp"115⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\753B.tmp"C:\Users\Admin\AppData\Local\Temp\753B.tmp"116⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\75A8.tmp"C:\Users\Admin\AppData\Local\Temp\75A8.tmp"117⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\7625.tmp"C:\Users\Admin\AppData\Local\Temp\7625.tmp"118⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\76B2.tmp"C:\Users\Admin\AppData\Local\Temp\76B2.tmp"119⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\7923.tmp"C:\Users\Admin\AppData\Local\Temp\7923.tmp"120⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\7B07.tmp"C:\Users\Admin\AppData\Local\Temp\7B07.tmp"121⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"122⤵PID:3420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-