Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 12:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe
-
Size
536KB
-
MD5
626e3852bed5537d2b32796c6bc236b4
-
SHA1
66e7c78fb3e858806f306ce1d6ed8daa59f46425
-
SHA256
2ef1e39f11cebda8f3987b2e4441b6df540a78618163027bd38fa9161e449c82
-
SHA512
889bc9c31d619cc5eeaf40a3955423571e7b9f5ad0edc046221beaa9eaca4a5308d76a5037047f827def906930d0c05cfe8a48d797bbf0ffe9c1b011124a19b9
-
SSDEEP
12288:wU5rCOTeiUzWKyOrm27Iz4Ylutv7AOIZxVJ0ZT9:wUQOJUzzkHny7RIRJ0ZT9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 624 37E8.tmp 4580 3894.tmp 3056 3902.tmp 976 397F.tmp 3372 39EC.tmp 4896 3A98.tmp 3344 3B44.tmp 2732 3BE0.tmp 4356 3C4D.tmp 4512 3CBB.tmp 1408 3D67.tmp 4528 3DD4.tmp 1472 3E41.tmp 4456 3EBE.tmp 2364 3F7A.tmp 4508 4006.tmp 3308 40A3.tmp 880 413F.tmp 1540 41AC.tmp 4792 4229.tmp 3848 4287.tmp 3728 4323.tmp 3340 43B0.tmp 2592 441D.tmp 3156 44AA.tmp 3788 4537.tmp 840 45C3.tmp 4308 4621.tmp 3772 46AE.tmp 5020 472B.tmp 4544 4788.tmp 1892 47F6.tmp 2188 4844.tmp 4540 4892.tmp 2356 48E0.tmp 2688 493E.tmp 3448 498C.tmp 1192 49EA.tmp 4960 4A38.tmp 4068 4A96.tmp 3748 4AE4.tmp 2268 4B32.tmp 4912 4B90.tmp 804 4BED.tmp 4604 4C5B.tmp 772 4CA9.tmp 832 4D07.tmp 1052 4D55.tmp 3460 4DA3.tmp 4408 4DF1.tmp 2156 4E4F.tmp 2932 4EAC.tmp 4948 4EFB.tmp 2440 4F58.tmp 4792 4FA6.tmp 2096 4FF5.tmp 4784 5043.tmp 2972 50A0.tmp 3604 50FE.tmp 2592 514C.tmp 2244 519A.tmp 3300 51E9.tmp 4308 5237.tmp 4420 5294.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 624 1448 2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe 83 PID 1448 wrote to memory of 624 1448 2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe 83 PID 1448 wrote to memory of 624 1448 2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe 83 PID 624 wrote to memory of 4580 624 37E8.tmp 84 PID 624 wrote to memory of 4580 624 37E8.tmp 84 PID 624 wrote to memory of 4580 624 37E8.tmp 84 PID 4580 wrote to memory of 3056 4580 3894.tmp 85 PID 4580 wrote to memory of 3056 4580 3894.tmp 85 PID 4580 wrote to memory of 3056 4580 3894.tmp 85 PID 3056 wrote to memory of 976 3056 3902.tmp 86 PID 3056 wrote to memory of 976 3056 3902.tmp 86 PID 3056 wrote to memory of 976 3056 3902.tmp 86 PID 976 wrote to memory of 3372 976 397F.tmp 87 PID 976 wrote to memory of 3372 976 397F.tmp 87 PID 976 wrote to memory of 3372 976 397F.tmp 87 PID 3372 wrote to memory of 4896 3372 39EC.tmp 89 PID 3372 wrote to memory of 4896 3372 39EC.tmp 89 PID 3372 wrote to memory of 4896 3372 39EC.tmp 89 PID 4896 wrote to memory of 3344 4896 3A98.tmp 91 PID 4896 wrote to memory of 3344 4896 3A98.tmp 91 PID 4896 wrote to memory of 3344 4896 3A98.tmp 91 PID 3344 wrote to memory of 2732 3344 3B44.tmp 93 PID 3344 wrote to memory of 2732 3344 3B44.tmp 93 PID 3344 wrote to memory of 2732 3344 3B44.tmp 93 PID 2732 wrote to memory of 4356 2732 3BE0.tmp 94 PID 2732 wrote to memory of 4356 2732 3BE0.tmp 94 PID 2732 wrote to memory of 4356 2732 3BE0.tmp 94 PID 4356 wrote to memory of 4512 4356 3C4D.tmp 95 PID 4356 wrote to memory of 4512 4356 3C4D.tmp 95 PID 4356 wrote to memory of 4512 4356 3C4D.tmp 95 PID 4512 wrote to memory of 1408 4512 3CBB.tmp 96 PID 4512 wrote to memory of 1408 4512 3CBB.tmp 96 PID 4512 wrote to memory of 1408 4512 3CBB.tmp 96 PID 1408 wrote to memory of 4528 1408 3D67.tmp 97 PID 1408 wrote to memory of 4528 1408 3D67.tmp 97 PID 1408 wrote to memory of 4528 1408 3D67.tmp 97 PID 4528 wrote to memory of 1472 4528 3DD4.tmp 98 PID 4528 wrote to memory of 1472 4528 3DD4.tmp 98 PID 4528 wrote to memory of 1472 4528 3DD4.tmp 98 PID 1472 wrote to memory of 4456 1472 3E41.tmp 99 PID 1472 wrote to memory of 4456 1472 3E41.tmp 99 PID 1472 wrote to memory of 4456 1472 3E41.tmp 99 PID 4456 wrote to memory of 2364 4456 3EBE.tmp 100 PID 4456 wrote to memory of 2364 4456 3EBE.tmp 100 PID 4456 wrote to memory of 2364 4456 3EBE.tmp 100 PID 2364 wrote to memory of 4508 2364 3F7A.tmp 101 PID 2364 wrote to memory of 4508 2364 3F7A.tmp 101 PID 2364 wrote to memory of 4508 2364 3F7A.tmp 101 PID 4508 wrote to memory of 3308 4508 4006.tmp 102 PID 4508 wrote to memory of 3308 4508 4006.tmp 102 PID 4508 wrote to memory of 3308 4508 4006.tmp 102 PID 3308 wrote to memory of 880 3308 40A3.tmp 103 PID 3308 wrote to memory of 880 3308 40A3.tmp 103 PID 3308 wrote to memory of 880 3308 40A3.tmp 103 PID 880 wrote to memory of 1540 880 413F.tmp 104 PID 880 wrote to memory of 1540 880 413F.tmp 104 PID 880 wrote to memory of 1540 880 413F.tmp 104 PID 1540 wrote to memory of 4792 1540 41AC.tmp 105 PID 1540 wrote to memory of 4792 1540 41AC.tmp 105 PID 1540 wrote to memory of 4792 1540 41AC.tmp 105 PID 4792 wrote to memory of 3848 4792 4229.tmp 106 PID 4792 wrote to memory of 3848 4792 4229.tmp 106 PID 4792 wrote to memory of 3848 4792 4229.tmp 106 PID 3848 wrote to memory of 3728 3848 4287.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_626e3852bed5537d2b32796c6bc236b4_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\37E8.tmp"C:\Users\Admin\AppData\Local\Temp\37E8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\3894.tmp"C:\Users\Admin\AppData\Local\Temp\3894.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\3902.tmp"C:\Users\Admin\AppData\Local\Temp\3902.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\397F.tmp"C:\Users\Admin\AppData\Local\Temp\397F.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\39EC.tmp"C:\Users\Admin\AppData\Local\Temp\39EC.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\3A98.tmp"C:\Users\Admin\AppData\Local\Temp\3A98.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3B44.tmp"C:\Users\Admin\AppData\Local\Temp\3B44.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\3BE0.tmp"C:\Users\Admin\AppData\Local\Temp\3BE0.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\3C4D.tmp"C:\Users\Admin\AppData\Local\Temp\3C4D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\3CBB.tmp"C:\Users\Admin\AppData\Local\Temp\3CBB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3D67.tmp"C:\Users\Admin\AppData\Local\Temp\3D67.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\3DD4.tmp"C:\Users\Admin\AppData\Local\Temp\3DD4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3E41.tmp"C:\Users\Admin\AppData\Local\Temp\3E41.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3EBE.tmp"C:\Users\Admin\AppData\Local\Temp\3EBE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3F7A.tmp"C:\Users\Admin\AppData\Local\Temp\3F7A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\4006.tmp"C:\Users\Admin\AppData\Local\Temp\4006.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\40A3.tmp"C:\Users\Admin\AppData\Local\Temp\40A3.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\413F.tmp"C:\Users\Admin\AppData\Local\Temp\413F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\41AC.tmp"C:\Users\Admin\AppData\Local\Temp\41AC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\4229.tmp"C:\Users\Admin\AppData\Local\Temp\4229.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\4287.tmp"C:\Users\Admin\AppData\Local\Temp\4287.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\4323.tmp"C:\Users\Admin\AppData\Local\Temp\4323.tmp"23⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\43B0.tmp"C:\Users\Admin\AppData\Local\Temp\43B0.tmp"24⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\441D.tmp"C:\Users\Admin\AppData\Local\Temp\441D.tmp"25⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\44AA.tmp"C:\Users\Admin\AppData\Local\Temp\44AA.tmp"26⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\4537.tmp"C:\Users\Admin\AppData\Local\Temp\4537.tmp"27⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\45C3.tmp"C:\Users\Admin\AppData\Local\Temp\45C3.tmp"28⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\4621.tmp"C:\Users\Admin\AppData\Local\Temp\4621.tmp"29⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\46AE.tmp"C:\Users\Admin\AppData\Local\Temp\46AE.tmp"30⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\472B.tmp"C:\Users\Admin\AppData\Local\Temp\472B.tmp"31⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\4788.tmp"C:\Users\Admin\AppData\Local\Temp\4788.tmp"32⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\47F6.tmp"C:\Users\Admin\AppData\Local\Temp\47F6.tmp"33⤵
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\4844.tmp"C:\Users\Admin\AppData\Local\Temp\4844.tmp"34⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\4892.tmp"C:\Users\Admin\AppData\Local\Temp\4892.tmp"35⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\48E0.tmp"C:\Users\Admin\AppData\Local\Temp\48E0.tmp"36⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\493E.tmp"C:\Users\Admin\AppData\Local\Temp\493E.tmp"37⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\498C.tmp"C:\Users\Admin\AppData\Local\Temp\498C.tmp"38⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\49EA.tmp"C:\Users\Admin\AppData\Local\Temp\49EA.tmp"39⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\4A38.tmp"C:\Users\Admin\AppData\Local\Temp\4A38.tmp"40⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\4A96.tmp"C:\Users\Admin\AppData\Local\Temp\4A96.tmp"41⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"42⤵
- Executes dropped EXE
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\4B32.tmp"C:\Users\Admin\AppData\Local\Temp\4B32.tmp"43⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\4B90.tmp"C:\Users\Admin\AppData\Local\Temp\4B90.tmp"44⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\4BED.tmp"C:\Users\Admin\AppData\Local\Temp\4BED.tmp"45⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"C:\Users\Admin\AppData\Local\Temp\4C5B.tmp"46⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"47⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\4D07.tmp"C:\Users\Admin\AppData\Local\Temp\4D07.tmp"48⤵
- Executes dropped EXE
PID:832 -
C:\Users\Admin\AppData\Local\Temp\4D55.tmp"C:\Users\Admin\AppData\Local\Temp\4D55.tmp"49⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\4DA3.tmp"C:\Users\Admin\AppData\Local\Temp\4DA3.tmp"50⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"51⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"52⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"53⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"54⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"55⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"56⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"57⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\5043.tmp"C:\Users\Admin\AppData\Local\Temp\5043.tmp"58⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"59⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"60⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"61⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"62⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"63⤵
- Executes dropped EXE
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\5237.tmp"C:\Users\Admin\AppData\Local\Temp\5237.tmp"64⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\5294.tmp"C:\Users\Admin\AppData\Local\Temp\5294.tmp"65⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"66⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\5331.tmp"C:\Users\Admin\AppData\Local\Temp\5331.tmp"67⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\537F.tmp"C:\Users\Admin\AppData\Local\Temp\537F.tmp"68⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\53CD.tmp"C:\Users\Admin\AppData\Local\Temp\53CD.tmp"69⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\541B.tmp"C:\Users\Admin\AppData\Local\Temp\541B.tmp"70⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\5479.tmp"C:\Users\Admin\AppData\Local\Temp\5479.tmp"71⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\54C7.tmp"C:\Users\Admin\AppData\Local\Temp\54C7.tmp"72⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\5515.tmp"C:\Users\Admin\AppData\Local\Temp\5515.tmp"73⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\5563.tmp"C:\Users\Admin\AppData\Local\Temp\5563.tmp"74⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\55B1.tmp"C:\Users\Admin\AppData\Local\Temp\55B1.tmp"75⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\55FF.tmp"C:\Users\Admin\AppData\Local\Temp\55FF.tmp"76⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"77⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\56BB.tmp"C:\Users\Admin\AppData\Local\Temp\56BB.tmp"78⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"79⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"80⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"81⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\5803.tmp"C:\Users\Admin\AppData\Local\Temp\5803.tmp"82⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"83⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\589F.tmp"C:\Users\Admin\AppData\Local\Temp\589F.tmp"84⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\58ED.tmp"C:\Users\Admin\AppData\Local\Temp\58ED.tmp"85⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\593C.tmp"C:\Users\Admin\AppData\Local\Temp\593C.tmp"86⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"87⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"88⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"89⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"90⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"91⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\5B30.tmp"C:\Users\Admin\AppData\Local\Temp\5B30.tmp"92⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"93⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"94⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\5C2A.tmp"C:\Users\Admin\AppData\Local\Temp\5C2A.tmp"95⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"96⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"97⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\5D43.tmp"C:\Users\Admin\AppData\Local\Temp\5D43.tmp"98⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\5D91.tmp"C:\Users\Admin\AppData\Local\Temp\5D91.tmp"99⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"100⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"101⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"102⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"103⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"104⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"105⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"106⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"107⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\606F.tmp"C:\Users\Admin\AppData\Local\Temp\606F.tmp"108⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"109⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"110⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"111⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\61C7.tmp"C:\Users\Admin\AppData\Local\Temp\61C7.tmp"112⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"113⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"114⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"115⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\630F.tmp"C:\Users\Admin\AppData\Local\Temp\630F.tmp"116⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\635D.tmp"C:\Users\Admin\AppData\Local\Temp\635D.tmp"117⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\63AB.tmp"C:\Users\Admin\AppData\Local\Temp\63AB.tmp"118⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\63FA.tmp"C:\Users\Admin\AppData\Local\Temp\63FA.tmp"119⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\6448.tmp"C:\Users\Admin\AppData\Local\Temp\6448.tmp"120⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"121⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\64E4.tmp"C:\Users\Admin\AppData\Local\Temp\64E4.tmp"122⤵PID:912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-