Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 06:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe
-
Size
536KB
-
MD5
9bf0edc035483190568b12ab0311c552
-
SHA1
f37984031e2fe2a39426503a27d4cea4320e3654
-
SHA256
d837bb1efc2ce1085030e5081120825624a821b52a4fefef52e0e95ae78ac97e
-
SHA512
7b99b7586a716599ff5a364625ab1cde0b748bd903cec57454e4872fb8d1d99c7f804353b53a0df0d02351880a1e7244c66ac50fbc1a8750eba7cade6e019a35
-
SSDEEP
12288:wU5rCOTeiUYMbubXALg0pU2TJ6QIZxVJ0ZT9:wUQOJUSEg0a7QIRJ0ZT9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5016 F04B.tmp 4512 F1E2.tmp 3276 F2EB.tmp 4128 F86A.tmp 1964 FA9C.tmp 220 FBB5.tmp 4084 FCEE.tmp 5116 FDE8.tmp 4424 FF11.tmp 2720 FFFB.tmp 772 E5.tmp 3220 1FF.tmp 1688 2CA.tmp 1240 3B4.tmp 1056 49F.tmp 1036 51C.tmp 1744 664.tmp 2980 78D.tmp 4012 896.tmp 2916 961.tmp 3624 A6B.tmp 4356 AF8.tmp 2876 B94.tmp 2204 CBD.tmp 1316 D88.tmp 4620 DE6.tmp 2672 EC0.tmp 3776 1008.tmp 4324 1076.tmp 4480 11ED.tmp 4080 12B8.tmp 3768 13C2.tmp 2960 144E.tmp 4648 1519.tmp 3488 15A6.tmp 1232 1671.tmp 3860 171D.tmp 220 17B9.tmp 3172 1855.tmp 4804 18F2.tmp 1484 19CC.tmp 4424 1B34.tmp 3964 1C0F.tmp 3500 1CF9.tmp 1004 1DB4.tmp 2704 1E8F.tmp 2856 1F2B.tmp 2084 2035.tmp 2716 20E1.tmp 4592 217D.tmp 1744 2219.tmp 2568 22D5.tmp 4604 2371.tmp 1096 249A.tmp 3780 2536.tmp 4800 2601.tmp 1088 266F.tmp 3840 274A.tmp 2876 27D6.tmp 3356 2853.tmp 2496 28FF.tmp 3896 296C.tmp 2928 29E9.tmp 2592 2A57.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 5016 4480 2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe 92 PID 4480 wrote to memory of 5016 4480 2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe 92 PID 4480 wrote to memory of 5016 4480 2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe 92 PID 5016 wrote to memory of 4512 5016 F04B.tmp 93 PID 5016 wrote to memory of 4512 5016 F04B.tmp 93 PID 5016 wrote to memory of 4512 5016 F04B.tmp 93 PID 4512 wrote to memory of 3276 4512 F1E2.tmp 94 PID 4512 wrote to memory of 3276 4512 F1E2.tmp 94 PID 4512 wrote to memory of 3276 4512 F1E2.tmp 94 PID 3276 wrote to memory of 4128 3276 F2EB.tmp 95 PID 3276 wrote to memory of 4128 3276 F2EB.tmp 95 PID 3276 wrote to memory of 4128 3276 F2EB.tmp 95 PID 4128 wrote to memory of 1964 4128 F86A.tmp 96 PID 4128 wrote to memory of 1964 4128 F86A.tmp 96 PID 4128 wrote to memory of 1964 4128 F86A.tmp 96 PID 1964 wrote to memory of 220 1964 FA9C.tmp 97 PID 1964 wrote to memory of 220 1964 FA9C.tmp 97 PID 1964 wrote to memory of 220 1964 FA9C.tmp 97 PID 220 wrote to memory of 4084 220 FBB5.tmp 98 PID 220 wrote to memory of 4084 220 FBB5.tmp 98 PID 220 wrote to memory of 4084 220 FBB5.tmp 98 PID 4084 wrote to memory of 5116 4084 FCEE.tmp 99 PID 4084 wrote to memory of 5116 4084 FCEE.tmp 99 PID 4084 wrote to memory of 5116 4084 FCEE.tmp 99 PID 5116 wrote to memory of 4424 5116 FDE8.tmp 100 PID 5116 wrote to memory of 4424 5116 FDE8.tmp 100 PID 5116 wrote to memory of 4424 5116 FDE8.tmp 100 PID 4424 wrote to memory of 2720 4424 FF11.tmp 101 PID 4424 wrote to memory of 2720 4424 FF11.tmp 101 PID 4424 wrote to memory of 2720 4424 FF11.tmp 101 PID 2720 wrote to memory of 772 2720 FFFB.tmp 102 PID 2720 wrote to memory of 772 2720 FFFB.tmp 102 PID 2720 wrote to memory of 772 2720 FFFB.tmp 102 PID 772 wrote to memory of 3220 772 E5.tmp 103 PID 772 wrote to memory of 3220 772 E5.tmp 103 PID 772 wrote to memory of 3220 772 E5.tmp 103 PID 3220 wrote to memory of 1688 3220 1FF.tmp 104 PID 3220 wrote to memory of 1688 3220 1FF.tmp 104 PID 3220 wrote to memory of 1688 3220 1FF.tmp 104 PID 1688 wrote to memory of 1240 1688 2CA.tmp 105 PID 1688 wrote to memory of 1240 1688 2CA.tmp 105 PID 1688 wrote to memory of 1240 1688 2CA.tmp 105 PID 1240 wrote to memory of 1056 1240 3B4.tmp 106 PID 1240 wrote to memory of 1056 1240 3B4.tmp 106 PID 1240 wrote to memory of 1056 1240 3B4.tmp 106 PID 1056 wrote to memory of 1036 1056 49F.tmp 107 PID 1056 wrote to memory of 1036 1056 49F.tmp 107 PID 1056 wrote to memory of 1036 1056 49F.tmp 107 PID 1036 wrote to memory of 1744 1036 51C.tmp 108 PID 1036 wrote to memory of 1744 1036 51C.tmp 108 PID 1036 wrote to memory of 1744 1036 51C.tmp 108 PID 1744 wrote to memory of 2980 1744 664.tmp 109 PID 1744 wrote to memory of 2980 1744 664.tmp 109 PID 1744 wrote to memory of 2980 1744 664.tmp 109 PID 2980 wrote to memory of 4012 2980 78D.tmp 110 PID 2980 wrote to memory of 4012 2980 78D.tmp 110 PID 2980 wrote to memory of 4012 2980 78D.tmp 110 PID 4012 wrote to memory of 2916 4012 896.tmp 111 PID 4012 wrote to memory of 2916 4012 896.tmp 111 PID 4012 wrote to memory of 2916 4012 896.tmp 111 PID 2916 wrote to memory of 3624 2916 961.tmp 112 PID 2916 wrote to memory of 3624 2916 961.tmp 112 PID 2916 wrote to memory of 3624 2916 961.tmp 112 PID 3624 wrote to memory of 4356 3624 A6B.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-02_9bf0edc035483190568b12ab0311c552_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\FF11.tmp"C:\Users\Admin\AppData\Local\Temp\FF11.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\E5.tmp"C:\Users\Admin\AppData\Local\Temp\E5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\2CA.tmp"C:\Users\Admin\AppData\Local\Temp\2CA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3B4.tmp"C:\Users\Admin\AppData\Local\Temp\3B4.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\78D.tmp"C:\Users\Admin\AppData\Local\Temp\78D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\A6B.tmp"C:\Users\Admin\AppData\Local\Temp\A6B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"23⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"24⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"25⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\D88.tmp"C:\Users\Admin\AppData\Local\Temp\D88.tmp"26⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"27⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"28⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"29⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\1076.tmp"C:\Users\Admin\AppData\Local\Temp\1076.tmp"30⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"31⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\12B8.tmp"C:\Users\Admin\AppData\Local\Temp\12B8.tmp"32⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"33⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\144E.tmp"C:\Users\Admin\AppData\Local\Temp\144E.tmp"34⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"35⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"36⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"37⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"38⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"39⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\1855.tmp"C:\Users\Admin\AppData\Local\Temp\1855.tmp"40⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"41⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"42⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\1B34.tmp"C:\Users\Admin\AppData\Local\Temp\1B34.tmp"43⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"44⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"45⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"46⤵
- Executes dropped EXE
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"47⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"48⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"49⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"50⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"51⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\2219.tmp"C:\Users\Admin\AppData\Local\Temp\2219.tmp"52⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"53⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\2371.tmp"C:\Users\Admin\AppData\Local\Temp\2371.tmp"54⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"55⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"56⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\2601.tmp"C:\Users\Admin\AppData\Local\Temp\2601.tmp"57⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\266F.tmp"C:\Users\Admin\AppData\Local\Temp\266F.tmp"58⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"59⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\27D6.tmp"C:\Users\Admin\AppData\Local\Temp\27D6.tmp"60⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\2853.tmp"C:\Users\Admin\AppData\Local\Temp\2853.tmp"61⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\28FF.tmp"C:\Users\Admin\AppData\Local\Temp\28FF.tmp"62⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"63⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"64⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"65⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"66⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"67⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"68⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"69⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"70⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"71⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\3071.tmp"C:\Users\Admin\AppData\Local\Temp\3071.tmp"72⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"73⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"74⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"75⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"76⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"77⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"78⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"79⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\363E.tmp"C:\Users\Admin\AppData\Local\Temp\363E.tmp"80⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"81⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\3757.tmp"C:\Users\Admin\AppData\Local\Temp\3757.tmp"82⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"83⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"84⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"85⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\394B.tmp"C:\Users\Admin\AppData\Local\Temp\394B.tmp"86⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\39C8.tmp"C:\Users\Admin\AppData\Local\Temp\39C8.tmp"87⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\3A35.tmp"C:\Users\Admin\AppData\Local\Temp\3A35.tmp"88⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"89⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"90⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"91⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"92⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"93⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"94⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"95⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"96⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"97⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"98⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\4159.tmp"C:\Users\Admin\AppData\Local\Temp\4159.tmp"99⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"100⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"101⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"102⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"103⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\43CA.tmp"C:\Users\Admin\AppData\Local\Temp\43CA.tmp"104⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\4457.tmp"C:\Users\Admin\AppData\Local\Temp\4457.tmp"105⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\44D4.tmp"C:\Users\Admin\AppData\Local\Temp\44D4.tmp"106⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"107⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"108⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"109⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"110⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"111⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\47E1.tmp"C:\Users\Admin\AppData\Local\Temp\47E1.tmp"112⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"113⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\48DB.tmp"C:\Users\Admin\AppData\Local\Temp\48DB.tmp"114⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"115⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"116⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\4A33.tmp"C:\Users\Admin\AppData\Local\Temp\4A33.tmp"117⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"118⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"119⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"120⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"121⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"122⤵PID:2876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-