Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 20:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe
-
Size
520KB
-
MD5
ce00f7429d7d9753d9f86011967486b9
-
SHA1
aaa18775a62a1027936ca01dcbcb6721e729e963
-
SHA256
460730e2565735c45609d0ce3e4d7210dccd6b8fd94f1ef7153a77bfe1610f11
-
SHA512
636cbb6a8d8e6027bdb23c27d157caf46a9c7ee51b88b1f69cff0411a094273ee6a8b4bccd89e282266d7f69f2299dfaa70b7d276fb9acc30ef0866ee111c95e
-
SSDEEP
12288:roRXOQjmOysZ5FiB57z5ZD8OiMXn+sGNZ:rogQ9yAIxtni0mN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4580 26FB.tmp 5092 2A57.tmp 464 2BAF.tmp 4744 2CE7.tmp 4168 2DA3.tmp 2684 2ECB.tmp 4632 2F77.tmp 5088 3208.tmp 4324 3302.tmp 220 33DC.tmp 3204 34A7.tmp 840 3582.tmp 1012 360F.tmp 1388 3767.tmp 4856 3851.tmp 2264 38FD.tmp 4944 39C8.tmp 3900 3B5E.tmp 2936 3C87.tmp 2132 3D52.tmp 4884 3E5C.tmp 2564 3F37.tmp 2396 4011.tmp 3200 411B.tmp 4588 4215.tmp 4948 431F.tmp 3992 4409.tmp 4172 45AF.tmp 2228 46C8.tmp 1068 47C2.tmp 2196 487E.tmp 1628 4AB0.tmp 2088 4BBA.tmp 2160 4C66.tmp 3332 4D11.tmp 4480 4E2B.tmp 3780 4EC7.tmp 4696 4F82.tmp 4424 502E.tmp 1932 50BB.tmp 5072 5138.tmp 404 51C5.tmp 416 529F.tmp 4088 534B.tmp 1220 53D8.tmp 1812 5474.tmp 1768 55AD.tmp 3812 5678.tmp 2000 58D9.tmp 4452 5975.tmp 3724 5A12.tmp 5088 5AFC.tmp 4324 5B79.tmp 5052 5C15.tmp 4020 5CA2.tmp 1436 5D7D.tmp 3944 5E09.tmp 1012 5EA5.tmp 1388 5F13.tmp 1236 5FAF.tmp 3068 60D8.tmp 2676 6155.tmp 2264 61E2.tmp 1852 624F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4580 4504 2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe 91 PID 4504 wrote to memory of 4580 4504 2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe 91 PID 4504 wrote to memory of 4580 4504 2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe 91 PID 4580 wrote to memory of 5092 4580 26FB.tmp 92 PID 4580 wrote to memory of 5092 4580 26FB.tmp 92 PID 4580 wrote to memory of 5092 4580 26FB.tmp 92 PID 5092 wrote to memory of 464 5092 2A57.tmp 93 PID 5092 wrote to memory of 464 5092 2A57.tmp 93 PID 5092 wrote to memory of 464 5092 2A57.tmp 93 PID 464 wrote to memory of 4744 464 2BAF.tmp 94 PID 464 wrote to memory of 4744 464 2BAF.tmp 94 PID 464 wrote to memory of 4744 464 2BAF.tmp 94 PID 4744 wrote to memory of 4168 4744 2CE7.tmp 95 PID 4744 wrote to memory of 4168 4744 2CE7.tmp 95 PID 4744 wrote to memory of 4168 4744 2CE7.tmp 95 PID 4168 wrote to memory of 2684 4168 2DA3.tmp 96 PID 4168 wrote to memory of 2684 4168 2DA3.tmp 96 PID 4168 wrote to memory of 2684 4168 2DA3.tmp 96 PID 2684 wrote to memory of 4632 2684 2ECB.tmp 97 PID 2684 wrote to memory of 4632 2684 2ECB.tmp 97 PID 2684 wrote to memory of 4632 2684 2ECB.tmp 97 PID 4632 wrote to memory of 5088 4632 2F77.tmp 98 PID 4632 wrote to memory of 5088 4632 2F77.tmp 98 PID 4632 wrote to memory of 5088 4632 2F77.tmp 98 PID 5088 wrote to memory of 4324 5088 3208.tmp 99 PID 5088 wrote to memory of 4324 5088 3208.tmp 99 PID 5088 wrote to memory of 4324 5088 3208.tmp 99 PID 4324 wrote to memory of 220 4324 3302.tmp 100 PID 4324 wrote to memory of 220 4324 3302.tmp 100 PID 4324 wrote to memory of 220 4324 3302.tmp 100 PID 220 wrote to memory of 3204 220 33DC.tmp 101 PID 220 wrote to memory of 3204 220 33DC.tmp 101 PID 220 wrote to memory of 3204 220 33DC.tmp 101 PID 3204 wrote to memory of 840 3204 34A7.tmp 102 PID 3204 wrote to memory of 840 3204 34A7.tmp 102 PID 3204 wrote to memory of 840 3204 34A7.tmp 102 PID 840 wrote to memory of 1012 840 3582.tmp 103 PID 840 wrote to memory of 1012 840 3582.tmp 103 PID 840 wrote to memory of 1012 840 3582.tmp 103 PID 1012 wrote to memory of 1388 1012 360F.tmp 104 PID 1012 wrote to memory of 1388 1012 360F.tmp 104 PID 1012 wrote to memory of 1388 1012 360F.tmp 104 PID 1388 wrote to memory of 4856 1388 3767.tmp 105 PID 1388 wrote to memory of 4856 1388 3767.tmp 105 PID 1388 wrote to memory of 4856 1388 3767.tmp 105 PID 4856 wrote to memory of 2264 4856 3851.tmp 106 PID 4856 wrote to memory of 2264 4856 3851.tmp 106 PID 4856 wrote to memory of 2264 4856 3851.tmp 106 PID 2264 wrote to memory of 4944 2264 38FD.tmp 107 PID 2264 wrote to memory of 4944 2264 38FD.tmp 107 PID 2264 wrote to memory of 4944 2264 38FD.tmp 107 PID 4944 wrote to memory of 3900 4944 39C8.tmp 108 PID 4944 wrote to memory of 3900 4944 39C8.tmp 108 PID 4944 wrote to memory of 3900 4944 39C8.tmp 108 PID 3900 wrote to memory of 2936 3900 3B5E.tmp 109 PID 3900 wrote to memory of 2936 3900 3B5E.tmp 109 PID 3900 wrote to memory of 2936 3900 3B5E.tmp 109 PID 2936 wrote to memory of 2132 2936 3C87.tmp 110 PID 2936 wrote to memory of 2132 2936 3C87.tmp 110 PID 2936 wrote to memory of 2132 2936 3C87.tmp 110 PID 2132 wrote to memory of 4884 2132 3D52.tmp 111 PID 2132 wrote to memory of 4884 2132 3D52.tmp 111 PID 2132 wrote to memory of 4884 2132 3D52.tmp 111 PID 4884 wrote to memory of 2564 4884 3E5C.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-01_ce00f7429d7d9753d9f86011967486b9_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\26FB.tmp"C:\Users\Admin\AppData\Local\Temp\26FB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\360F.tmp"C:\Users\Admin\AppData\Local\Temp\360F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\39C8.tmp"C:\Users\Admin\AppData\Local\Temp\39C8.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3F37.tmp"C:\Users\Admin\AppData\Local\Temp\3F37.tmp"23⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"24⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"25⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\4215.tmp"C:\Users\Admin\AppData\Local\Temp\4215.tmp"26⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"27⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\4409.tmp"C:\Users\Admin\AppData\Local\Temp\4409.tmp"28⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\45AF.tmp"C:\Users\Admin\AppData\Local\Temp\45AF.tmp"29⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\46C8.tmp"C:\Users\Admin\AppData\Local\Temp\46C8.tmp"30⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"31⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"32⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"33⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\4BBA.tmp"C:\Users\Admin\AppData\Local\Temp\4BBA.tmp"34⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"35⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"36⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"37⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"38⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"39⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"40⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\50BB.tmp"C:\Users\Admin\AppData\Local\Temp\50BB.tmp"41⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\5138.tmp"C:\Users\Admin\AppData\Local\Temp\5138.tmp"42⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\51C5.tmp"C:\Users\Admin\AppData\Local\Temp\51C5.tmp"43⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\529F.tmp"C:\Users\Admin\AppData\Local\Temp\529F.tmp"44⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"45⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"46⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\5474.tmp"C:\Users\Admin\AppData\Local\Temp\5474.tmp"47⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\55AD.tmp"C:\Users\Admin\AppData\Local\Temp\55AD.tmp"48⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\5678.tmp"C:\Users\Admin\AppData\Local\Temp\5678.tmp"49⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"50⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"51⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp"52⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"53⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"54⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\5C15.tmp"C:\Users\Admin\AppData\Local\Temp\5C15.tmp"55⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"56⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"57⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\5E09.tmp"C:\Users\Admin\AppData\Local\Temp\5E09.tmp"58⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\5EA5.tmp"C:\Users\Admin\AppData\Local\Temp\5EA5.tmp"59⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\5F13.tmp"C:\Users\Admin\AppData\Local\Temp\5F13.tmp"60⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"61⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"62⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\6155.tmp"C:\Users\Admin\AppData\Local\Temp\6155.tmp"63⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\61E2.tmp"C:\Users\Admin\AppData\Local\Temp\61E2.tmp"64⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\624F.tmp"C:\Users\Admin\AppData\Local\Temp\624F.tmp"65⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"66⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\6397.tmp"C:\Users\Admin\AppData\Local\Temp\6397.tmp"67⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6414.tmp"C:\Users\Admin\AppData\Local\Temp\6414.tmp"68⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"69⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\657B.tmp"C:\Users\Admin\AppData\Local\Temp\657B.tmp"70⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\6608.tmp"C:\Users\Admin\AppData\Local\Temp\6608.tmp"71⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\6695.tmp"C:\Users\Admin\AppData\Local\Temp\6695.tmp"72⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\6741.tmp"C:\Users\Admin\AppData\Local\Temp\6741.tmp"73⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\67BE.tmp"C:\Users\Admin\AppData\Local\Temp\67BE.tmp"74⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"75⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\68F6.tmp"C:\Users\Admin\AppData\Local\Temp\68F6.tmp"76⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\69A2.tmp"C:\Users\Admin\AppData\Local\Temp\69A2.tmp"77⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\6A4E.tmp"C:\Users\Admin\AppData\Local\Temp\6A4E.tmp"78⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"79⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\6B86.tmp"C:\Users\Admin\AppData\Local\Temp\6B86.tmp"80⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\6C32.tmp"C:\Users\Admin\AppData\Local\Temp\6C32.tmp"81⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp"C:\Users\Admin\AppData\Local\Temp\6CBF.tmp"82⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"83⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\6E26.tmp"C:\Users\Admin\AppData\Local\Temp\6E26.tmp"84⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"85⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"86⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"87⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\70C6.tmp"C:\Users\Admin\AppData\Local\Temp\70C6.tmp"88⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"89⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\71EF.tmp"C:\Users\Admin\AppData\Local\Temp\71EF.tmp"90⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\72AA.tmp"C:\Users\Admin\AppData\Local\Temp\72AA.tmp"91⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"92⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"93⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\7450.tmp"C:\Users\Admin\AppData\Local\Temp\7450.tmp"94⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\74BE.tmp"C:\Users\Admin\AppData\Local\Temp\74BE.tmp"95⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\753B.tmp"C:\Users\Admin\AppData\Local\Temp\753B.tmp"96⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\75B8.tmp"C:\Users\Admin\AppData\Local\Temp\75B8.tmp"97⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\7644.tmp"C:\Users\Admin\AppData\Local\Temp\7644.tmp"98⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\7700.tmp"C:\Users\Admin\AppData\Local\Temp\7700.tmp"99⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\779C.tmp"C:\Users\Admin\AppData\Local\Temp\779C.tmp"100⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\7819.tmp"C:\Users\Admin\AppData\Local\Temp\7819.tmp"101⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"102⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\7961.tmp"C:\Users\Admin\AppData\Local\Temp\7961.tmp"103⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"104⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"105⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\7B46.tmp"C:\Users\Admin\AppData\Local\Temp\7B46.tmp"106⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"107⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\7CBD.tmp"C:\Users\Admin\AppData\Local\Temp\7CBD.tmp"108⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\7D68.tmp"C:\Users\Admin\AppData\Local\Temp\7D68.tmp"109⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"110⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\7E72.tmp"C:\Users\Admin\AppData\Local\Temp\7E72.tmp"111⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\7F1E.tmp"C:\Users\Admin\AppData\Local\Temp\7F1E.tmp"112⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\7FBA.tmp"C:\Users\Admin\AppData\Local\Temp\7FBA.tmp"113⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\8037.tmp"C:\Users\Admin\AppData\Local\Temp\8037.tmp"114⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\80E3.tmp"C:\Users\Admin\AppData\Local\Temp\80E3.tmp"115⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\817F.tmp"C:\Users\Admin\AppData\Local\Temp\817F.tmp"116⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\824A.tmp"C:\Users\Admin\AppData\Local\Temp\824A.tmp"117⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\82C7.tmp"C:\Users\Admin\AppData\Local\Temp\82C7.tmp"118⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\8383.tmp"C:\Users\Admin\AppData\Local\Temp\8383.tmp"119⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\844E.tmp"C:\Users\Admin\AppData\Local\Temp\844E.tmp"120⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\84DB.tmp"C:\Users\Admin\AppData\Local\Temp\84DB.tmp"121⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\8587.tmp"C:\Users\Admin\AppData\Local\Temp\8587.tmp"122⤵PID:4820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-