Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 08:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe
-
Size
541KB
-
MD5
08db09855429aad7ab2311950a37b901
-
SHA1
0fc13ba55986151a6fd83194da8fae71ea0814d8
-
SHA256
ddefeb189ed1d6f42e971107d90960d172b2239397c69ebcff73df5fdb8c8f9f
-
SHA512
f7e46d9d32bc390dd14ada4dc08615238494fa5f30c7a5c8cc0634cd62257296998f537bf3da1054a97ff0e3d54a97062cc5b90b00a3183c8302bdee5875ae42
-
SSDEEP
12288:UU5rCOTeifRDjSBYFCww5Nqo3JWxac696rZa73ctO:UUQOJf8eCnWxjrU73ctO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3712 50C.tmp 2892 683.tmp 3668 C01.tmp 1860 D1A.tmp 1668 F4D.tmp 2184 1289.tmp 4744 1393.tmp 1104 15B6.tmp 3112 16FE.tmp 2732 1817.tmp 4728 18F2.tmp 1944 19EC.tmp 2620 1B72.tmp 692 1C8C.tmp 1984 1DA5.tmp 760 1E51.tmp 2336 1F6A.tmp 5116 2045.tmp 788 20E1.tmp 1900 21EB.tmp 4008 22E5.tmp 1556 23BF.tmp 3604 248A.tmp 732 2536.tmp 3628 2611.tmp 976 269E.tmp 2364 27C7.tmp 4072 28C1.tmp 4516 295D.tmp 2288 2A28.tmp 4456 2AF3.tmp 4592 2B80.tmp 4420 2C89.tmp 1360 2D64.tmp 4968 2E20.tmp 3140 2F1A.tmp 564 2FB6.tmp 3616 3208.tmp 3976 32A4.tmp 4576 336F.tmp 1516 341B.tmp 1700 3488.tmp 3564 361E.tmp 3392 36BB.tmp 1192 3767.tmp 440 3812.tmp 1920 388F.tmp 1668 392C.tmp 2184 39B8.tmp 3156 3A74.tmp 4280 3AF1.tmp 3112 3B5E.tmp 4308 3BEB.tmp 2112 3CB6.tmp 2072 3D52.tmp 692 3DEE.tmp 2164 3E6B.tmp 496 3F27.tmp 1336 3FA4.tmp 2840 4040.tmp 788 40BD.tmp 3780 41C7.tmp 4608 4263.tmp 3508 42E0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3712 3220 2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe 90 PID 3220 wrote to memory of 3712 3220 2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe 90 PID 3220 wrote to memory of 3712 3220 2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe 90 PID 3712 wrote to memory of 2892 3712 50C.tmp 91 PID 3712 wrote to memory of 2892 3712 50C.tmp 91 PID 3712 wrote to memory of 2892 3712 50C.tmp 91 PID 2892 wrote to memory of 3668 2892 683.tmp 92 PID 2892 wrote to memory of 3668 2892 683.tmp 92 PID 2892 wrote to memory of 3668 2892 683.tmp 92 PID 3668 wrote to memory of 1860 3668 C01.tmp 93 PID 3668 wrote to memory of 1860 3668 C01.tmp 93 PID 3668 wrote to memory of 1860 3668 C01.tmp 93 PID 1860 wrote to memory of 1668 1860 D1A.tmp 94 PID 1860 wrote to memory of 1668 1860 D1A.tmp 94 PID 1860 wrote to memory of 1668 1860 D1A.tmp 94 PID 1668 wrote to memory of 2184 1668 F4D.tmp 95 PID 1668 wrote to memory of 2184 1668 F4D.tmp 95 PID 1668 wrote to memory of 2184 1668 F4D.tmp 95 PID 2184 wrote to memory of 4744 2184 1289.tmp 96 PID 2184 wrote to memory of 4744 2184 1289.tmp 96 PID 2184 wrote to memory of 4744 2184 1289.tmp 96 PID 4744 wrote to memory of 1104 4744 1393.tmp 97 PID 4744 wrote to memory of 1104 4744 1393.tmp 97 PID 4744 wrote to memory of 1104 4744 1393.tmp 97 PID 1104 wrote to memory of 3112 1104 15B6.tmp 98 PID 1104 wrote to memory of 3112 1104 15B6.tmp 98 PID 1104 wrote to memory of 3112 1104 15B6.tmp 98 PID 3112 wrote to memory of 2732 3112 16FE.tmp 99 PID 3112 wrote to memory of 2732 3112 16FE.tmp 99 PID 3112 wrote to memory of 2732 3112 16FE.tmp 99 PID 2732 wrote to memory of 4728 2732 1817.tmp 100 PID 2732 wrote to memory of 4728 2732 1817.tmp 100 PID 2732 wrote to memory of 4728 2732 1817.tmp 100 PID 4728 wrote to memory of 1944 4728 18F2.tmp 101 PID 4728 wrote to memory of 1944 4728 18F2.tmp 101 PID 4728 wrote to memory of 1944 4728 18F2.tmp 101 PID 1944 wrote to memory of 2620 1944 19EC.tmp 102 PID 1944 wrote to memory of 2620 1944 19EC.tmp 102 PID 1944 wrote to memory of 2620 1944 19EC.tmp 102 PID 2620 wrote to memory of 692 2620 1B72.tmp 103 PID 2620 wrote to memory of 692 2620 1B72.tmp 103 PID 2620 wrote to memory of 692 2620 1B72.tmp 103 PID 692 wrote to memory of 1984 692 1C8C.tmp 104 PID 692 wrote to memory of 1984 692 1C8C.tmp 104 PID 692 wrote to memory of 1984 692 1C8C.tmp 104 PID 1984 wrote to memory of 760 1984 1DA5.tmp 105 PID 1984 wrote to memory of 760 1984 1DA5.tmp 105 PID 1984 wrote to memory of 760 1984 1DA5.tmp 105 PID 760 wrote to memory of 2336 760 1E51.tmp 106 PID 760 wrote to memory of 2336 760 1E51.tmp 106 PID 760 wrote to memory of 2336 760 1E51.tmp 106 PID 2336 wrote to memory of 5116 2336 1F6A.tmp 107 PID 2336 wrote to memory of 5116 2336 1F6A.tmp 107 PID 2336 wrote to memory of 5116 2336 1F6A.tmp 107 PID 5116 wrote to memory of 788 5116 2045.tmp 108 PID 5116 wrote to memory of 788 5116 2045.tmp 108 PID 5116 wrote to memory of 788 5116 2045.tmp 108 PID 788 wrote to memory of 1900 788 20E1.tmp 109 PID 788 wrote to memory of 1900 788 20E1.tmp 109 PID 788 wrote to memory of 1900 788 20E1.tmp 109 PID 1900 wrote to memory of 4008 1900 21EB.tmp 110 PID 1900 wrote to memory of 4008 1900 21EB.tmp 110 PID 1900 wrote to memory of 4008 1900 21EB.tmp 110 PID 4008 wrote to memory of 1556 4008 22E5.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_08db09855429aad7ab2311950a37b901_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\50C.tmp"C:\Users\Admin\AppData\Local\Temp\50C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\683.tmp"C:\Users\Admin\AppData\Local\Temp\683.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\F4D.tmp"C:\Users\Admin\AppData\Local\Temp\F4D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\15B6.tmp"C:\Users\Admin\AppData\Local\Temp\15B6.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\1817.tmp"C:\Users\Admin\AppData\Local\Temp\1817.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\1E51.tmp"C:\Users\Admin\AppData\Local\Temp\1E51.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\2045.tmp"C:\Users\Admin\AppData\Local\Temp\2045.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\21EB.tmp"C:\Users\Admin\AppData\Local\Temp\21EB.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"23⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\248A.tmp"C:\Users\Admin\AppData\Local\Temp\248A.tmp"24⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"25⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\2611.tmp"C:\Users\Admin\AppData\Local\Temp\2611.tmp"26⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\269E.tmp"C:\Users\Admin\AppData\Local\Temp\269E.tmp"27⤵
- Executes dropped EXE
PID:976 -
C:\Users\Admin\AppData\Local\Temp\27C7.tmp"C:\Users\Admin\AppData\Local\Temp\27C7.tmp"28⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"29⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"30⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"31⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"32⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\2B80.tmp"C:\Users\Admin\AppData\Local\Temp\2B80.tmp"33⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"34⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"35⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"36⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"37⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"38⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"39⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"40⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"41⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"42⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"43⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"44⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\36BB.tmp"C:\Users\Admin\AppData\Local\Temp\36BB.tmp"45⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"46⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"47⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\388F.tmp"C:\Users\Admin\AppData\Local\Temp\388F.tmp"48⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"49⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"50⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3A74.tmp"C:\Users\Admin\AppData\Local\Temp\3A74.tmp"51⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"52⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"53⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"54⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"55⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"56⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"57⤵
- Executes dropped EXE
PID:692 -
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"58⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\3F27.tmp"C:\Users\Admin\AppData\Local\Temp\3F27.tmp"59⤵
- Executes dropped EXE
PID:496 -
C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"60⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\4040.tmp"C:\Users\Admin\AppData\Local\Temp\4040.tmp"61⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\40BD.tmp"C:\Users\Admin\AppData\Local\Temp\40BD.tmp"62⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"63⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp"64⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"65⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\437C.tmp"C:\Users\Admin\AppData\Local\Temp\437C.tmp"66⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"67⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"68⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"69⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"70⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\46C8.tmp"C:\Users\Admin\AppData\Local\Temp\46C8.tmp"71⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\4745.tmp"C:\Users\Admin\AppData\Local\Temp\4745.tmp"72⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"73⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"74⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"75⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"76⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\4A14.tmp"C:\Users\Admin\AppData\Local\Temp\4A14.tmp"77⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"78⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"79⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"80⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\4D02.tmp"C:\Users\Admin\AppData\Local\Temp\4D02.tmp"81⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\4F63.tmp"C:\Users\Admin\AppData\Local\Temp\4F63.tmp"82⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\500F.tmp"C:\Users\Admin\AppData\Local\Temp\500F.tmp"83⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\50BB.tmp"C:\Users\Admin\AppData\Local\Temp\50BB.tmp"84⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\5167.tmp"C:\Users\Admin\AppData\Local\Temp\5167.tmp"85⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\51F3.tmp"C:\Users\Admin\AppData\Local\Temp\51F3.tmp"86⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"87⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\537A.tmp"C:\Users\Admin\AppData\Local\Temp\537A.tmp"88⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"89⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"90⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\5530.tmp"C:\Users\Admin\AppData\Local\Temp\5530.tmp"91⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\55BC.tmp"C:\Users\Admin\AppData\Local\Temp\55BC.tmp"92⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"93⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\56C6.tmp"C:\Users\Admin\AppData\Local\Temp\56C6.tmp"94⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\5762.tmp"C:\Users\Admin\AppData\Local\Temp\5762.tmp"95⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\580E.tmp"C:\Users\Admin\AppData\Local\Temp\580E.tmp"96⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\589B.tmp"C:\Users\Admin\AppData\Local\Temp\589B.tmp"97⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"98⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"99⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"100⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"101⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"102⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"103⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"104⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\5E77.tmp"C:\Users\Admin\AppData\Local\Temp\5E77.tmp"105⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\5F32.tmp"C:\Users\Admin\AppData\Local\Temp\5F32.tmp"106⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"107⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\602C.tmp"C:\Users\Admin\AppData\Local\Temp\602C.tmp"108⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\60A9.tmp"C:\Users\Admin\AppData\Local\Temp\60A9.tmp"109⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\6126.tmp"C:\Users\Admin\AppData\Local\Temp\6126.tmp"110⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\61C2.tmp"C:\Users\Admin\AppData\Local\Temp\61C2.tmp"111⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\626E.tmp"C:\Users\Admin\AppData\Local\Temp\626E.tmp"112⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\6339.tmp"C:\Users\Admin\AppData\Local\Temp\6339.tmp"113⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\63C6.tmp"C:\Users\Admin\AppData\Local\Temp\63C6.tmp"114⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"115⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"116⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\65D9.tmp"C:\Users\Admin\AppData\Local\Temp\65D9.tmp"117⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"118⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\6712.tmp"C:\Users\Admin\AppData\Local\Temp\6712.tmp"119⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"120⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"121⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\6992.tmp"C:\Users\Admin\AppData\Local\Temp\6992.tmp"122⤵PID:3976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-