Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 20:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe
Resource
win7-20240419-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe
-
Size
520KB
-
MD5
e3e5a2d57b3fdc3d26b9df9488a1e603
-
SHA1
f6862acf70657d4a7afc063bab898d96ff154710
-
SHA256
14a05fa023234df1e5e137cfdded7132bbb34a4cf4a49484b404fb009bd340ba
-
SHA512
93401cb477db60d6646f5aaebbad11052572bb7500bedb380617829c1b2086850b00a459877579b88877218dea1212ed077e3a69f811f61d6852b313abe59d1b
-
SSDEEP
12288:gj8fuxR21t5i8ftM0Y6lcqZKPlLCeeX1NZ:gj8fuK1GY5Y6GDP7elN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2960 1057.tmp 4520 121C.tmp 820 1325.tmp 2596 150A.tmp 4080 1604.tmp 5108 177B.tmp 2440 1894.tmp 3412 197E.tmp 1244 1AA7.tmp 116 1B92.tmp 3468 1C7C.tmp 4836 1DD4.tmp 960 1ECE.tmp 996 1F89.tmp 1952 2054.tmp 3016 2110.tmp 856 21DB.tmp 1856 2277.tmp 3044 2352.tmp 2224 244C.tmp 2376 2517.tmp 3396 25E2.tmp 2828 26AD.tmp 3508 274A.tmp 3028 27D6.tmp 3864 28FF.tmp 5020 29DA.tmp 2232 2AB5.tmp 1860 2B9F.tmp 3692 2CE7.tmp 796 2D64.tmp 4580 2E20.tmp 2076 2EDB.tmp 4184 2F97.tmp 3656 3023.tmp 3960 30B0.tmp 4548 311D.tmp 2736 319A.tmp 3800 3236.tmp 1304 3330.tmp 2032 33AD.tmp 660 344A.tmp 3004 3592.tmp 2456 35FF.tmp 3608 367C.tmp 4720 3728.tmp 1792 37B5.tmp 1052 3822.tmp 5108 389F.tmp 1160 393B.tmp 1596 39B8.tmp 5084 3A26.tmp 5024 3AB2.tmp 1084 3B4F.tmp 4360 3BEB.tmp 3172 3C97.tmp 2284 3D33.tmp 1000 3DB0.tmp 2848 3E3D.tmp 2524 3EAA.tmp 3016 3F27.tmp 3080 3FB4.tmp 3876 407F.tmp 2728 40EC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2960 2112 2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe 91 PID 2112 wrote to memory of 2960 2112 2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe 91 PID 2112 wrote to memory of 2960 2112 2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe 91 PID 2960 wrote to memory of 4520 2960 1057.tmp 92 PID 2960 wrote to memory of 4520 2960 1057.tmp 92 PID 2960 wrote to memory of 4520 2960 1057.tmp 92 PID 4520 wrote to memory of 820 4520 121C.tmp 93 PID 4520 wrote to memory of 820 4520 121C.tmp 93 PID 4520 wrote to memory of 820 4520 121C.tmp 93 PID 820 wrote to memory of 2596 820 1325.tmp 94 PID 820 wrote to memory of 2596 820 1325.tmp 94 PID 820 wrote to memory of 2596 820 1325.tmp 94 PID 2596 wrote to memory of 4080 2596 150A.tmp 95 PID 2596 wrote to memory of 4080 2596 150A.tmp 95 PID 2596 wrote to memory of 4080 2596 150A.tmp 95 PID 4080 wrote to memory of 5108 4080 1604.tmp 96 PID 4080 wrote to memory of 5108 4080 1604.tmp 96 PID 4080 wrote to memory of 5108 4080 1604.tmp 96 PID 5108 wrote to memory of 2440 5108 177B.tmp 97 PID 5108 wrote to memory of 2440 5108 177B.tmp 97 PID 5108 wrote to memory of 2440 5108 177B.tmp 97 PID 2440 wrote to memory of 3412 2440 1894.tmp 98 PID 2440 wrote to memory of 3412 2440 1894.tmp 98 PID 2440 wrote to memory of 3412 2440 1894.tmp 98 PID 3412 wrote to memory of 1244 3412 197E.tmp 99 PID 3412 wrote to memory of 1244 3412 197E.tmp 99 PID 3412 wrote to memory of 1244 3412 197E.tmp 99 PID 1244 wrote to memory of 116 1244 1AA7.tmp 100 PID 1244 wrote to memory of 116 1244 1AA7.tmp 100 PID 1244 wrote to memory of 116 1244 1AA7.tmp 100 PID 116 wrote to memory of 3468 116 1B92.tmp 101 PID 116 wrote to memory of 3468 116 1B92.tmp 101 PID 116 wrote to memory of 3468 116 1B92.tmp 101 PID 3468 wrote to memory of 4836 3468 1C7C.tmp 102 PID 3468 wrote to memory of 4836 3468 1C7C.tmp 102 PID 3468 wrote to memory of 4836 3468 1C7C.tmp 102 PID 4836 wrote to memory of 960 4836 1DD4.tmp 103 PID 4836 wrote to memory of 960 4836 1DD4.tmp 103 PID 4836 wrote to memory of 960 4836 1DD4.tmp 103 PID 960 wrote to memory of 996 960 1ECE.tmp 104 PID 960 wrote to memory of 996 960 1ECE.tmp 104 PID 960 wrote to memory of 996 960 1ECE.tmp 104 PID 996 wrote to memory of 1952 996 1F89.tmp 105 PID 996 wrote to memory of 1952 996 1F89.tmp 105 PID 996 wrote to memory of 1952 996 1F89.tmp 105 PID 1952 wrote to memory of 3016 1952 2054.tmp 106 PID 1952 wrote to memory of 3016 1952 2054.tmp 106 PID 1952 wrote to memory of 3016 1952 2054.tmp 106 PID 3016 wrote to memory of 856 3016 2110.tmp 107 PID 3016 wrote to memory of 856 3016 2110.tmp 107 PID 3016 wrote to memory of 856 3016 2110.tmp 107 PID 856 wrote to memory of 1856 856 21DB.tmp 108 PID 856 wrote to memory of 1856 856 21DB.tmp 108 PID 856 wrote to memory of 1856 856 21DB.tmp 108 PID 1856 wrote to memory of 3044 1856 2277.tmp 109 PID 1856 wrote to memory of 3044 1856 2277.tmp 109 PID 1856 wrote to memory of 3044 1856 2277.tmp 109 PID 3044 wrote to memory of 2224 3044 2352.tmp 110 PID 3044 wrote to memory of 2224 3044 2352.tmp 110 PID 3044 wrote to memory of 2224 3044 2352.tmp 110 PID 2224 wrote to memory of 2376 2224 244C.tmp 111 PID 2224 wrote to memory of 2376 2224 244C.tmp 111 PID 2224 wrote to memory of 2376 2224 244C.tmp 111 PID 2376 wrote to memory of 3396 2376 2517.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_e3e5a2d57b3fdc3d26b9df9488a1e603_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\1325.tmp"C:\Users\Admin\AppData\Local\Temp\1325.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\197E.tmp"C:\Users\Admin\AppData\Local\Temp\197E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\1AA7.tmp"C:\Users\Admin\AppData\Local\Temp\1AA7.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\1B92.tmp"C:\Users\Admin\AppData\Local\Temp\1B92.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\1F89.tmp"C:\Users\Admin\AppData\Local\Temp\1F89.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\2054.tmp"C:\Users\Admin\AppData\Local\Temp\2054.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\2110.tmp"C:\Users\Admin\AppData\Local\Temp\2110.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\2277.tmp"C:\Users\Admin\AppData\Local\Temp\2277.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\2352.tmp"C:\Users\Admin\AppData\Local\Temp\2352.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\25E2.tmp"C:\Users\Admin\AppData\Local\Temp\25E2.tmp"23⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"24⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"25⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\27D6.tmp"C:\Users\Admin\AppData\Local\Temp\27D6.tmp"26⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\28FF.tmp"C:\Users\Admin\AppData\Local\Temp\28FF.tmp"27⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"28⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"29⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"30⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"31⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"32⤵
- Executes dropped EXE
PID:796 -
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"33⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"34⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"35⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\3023.tmp"C:\Users\Admin\AppData\Local\Temp\3023.tmp"36⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"37⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"38⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"39⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"40⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"41⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"42⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"43⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"44⤵
- Executes dropped EXE
PID:660 -
C:\Users\Admin\AppData\Local\Temp\3592.tmp"C:\Users\Admin\AppData\Local\Temp\3592.tmp"45⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"46⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"47⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"48⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\37B5.tmp"C:\Users\Admin\AppData\Local\Temp\37B5.tmp"49⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"50⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\389F.tmp"C:\Users\Admin\AppData\Local\Temp\389F.tmp"51⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\393B.tmp"C:\Users\Admin\AppData\Local\Temp\393B.tmp"52⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"53⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"54⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"55⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"56⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"57⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\3C97.tmp"C:\Users\Admin\AppData\Local\Temp\3C97.tmp"58⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"59⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"60⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"61⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"62⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\3F27.tmp"C:\Users\Admin\AppData\Local\Temp\3F27.tmp"63⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"64⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"65⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"66⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"67⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\41F6.tmp"C:\Users\Admin\AppData\Local\Temp\41F6.tmp"68⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp"69⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"70⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"71⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\4513.tmp"C:\Users\Admin\AppData\Local\Temp\4513.tmp"72⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"73⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\460D.tmp"C:\Users\Admin\AppData\Local\Temp\460D.tmp"74⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"75⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\482F.tmp"C:\Users\Admin\AppData\Local\Temp\482F.tmp"76⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"77⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"78⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"79⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"80⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\4C17.tmp"C:\Users\Admin\AppData\Local\Temp\4C17.tmp"81⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"82⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"83⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\4E98.tmp"C:\Users\Admin\AppData\Local\Temp\4E98.tmp"84⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"85⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\503E.tmp"C:\Users\Admin\AppData\Local\Temp\503E.tmp"86⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\50DA.tmp"C:\Users\Admin\AppData\Local\Temp\50DA.tmp"87⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\5196.tmp"C:\Users\Admin\AppData\Local\Temp\5196.tmp"88⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"89⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"90⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"91⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"92⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"93⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"94⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"95⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"96⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\5704.tmp"C:\Users\Admin\AppData\Local\Temp\5704.tmp"97⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"98⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\57FE.tmp"C:\Users\Admin\AppData\Local\Temp\57FE.tmp"99⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\58AA.tmp"C:\Users\Admin\AppData\Local\Temp\58AA.tmp"100⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"101⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\59C3.tmp"C:\Users\Admin\AppData\Local\Temp\59C3.tmp"102⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"103⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"104⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"105⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"106⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"107⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\5D2E.tmp"C:\Users\Admin\AppData\Local\Temp\5D2E.tmp"108⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"109⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"110⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"111⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\5F42.tmp"C:\Users\Admin\AppData\Local\Temp\5F42.tmp"112⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"113⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"114⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"115⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\61C2.tmp"C:\Users\Admin\AppData\Local\Temp\61C2.tmp"116⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\624F.tmp"C:\Users\Admin\AppData\Local\Temp\624F.tmp"117⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\62EB.tmp"C:\Users\Admin\AppData\Local\Temp\62EB.tmp"118⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\6378.tmp"C:\Users\Admin\AppData\Local\Temp\6378.tmp"119⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"120⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\6472.tmp"C:\Users\Admin\AppData\Local\Temp\6472.tmp"121⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"122⤵PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-