Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 07:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe
-
Size
520KB
-
MD5
12b584fdf40a062c95220465c2692af6
-
SHA1
f7042cd9c6a77da562a7b93249c8816737abeaf9
-
SHA256
fe22dde7f8d01be6e80b5c6cf31156060b6f6543737f4a0a0437f0f028af0285
-
SHA512
39f06a2b24ef6e94417bbba3b93897816706f8787d817c9a577da02eae066639f038b25c84b508f5f81119fd85819dba10c1c0004464436eece84db1d08a018f
-
SSDEEP
12288:roRXOQjmOyGhzxXb80n+TMHd+gy7zipjNZ:rogQ9yaVBn+i9supjN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5020 5544.tmp 2932 55F0.tmp 636 568C.tmp 3896 5709.tmp 4128 57B5.tmp 4204 5832.tmp 2040 589F.tmp 4636 58FD.tmp 4968 595B.tmp 1912 59B9.tmp 3096 5A36.tmp 3048 5AB3.tmp 3816 5B10.tmp 4092 5B6E.tmp 4188 5BCC.tmp 4848 5C39.tmp 1144 5C97.tmp 4924 5D04.tmp 752 5D62.tmp 4316 5DCF.tmp 1112 5E3D.tmp 4396 5EAA.tmp 212 5F18.tmp 2884 5F85.tmp 3544 5FF2.tmp 3948 6060.tmp 4532 60BD.tmp 800 613A.tmp 4012 6198.tmp 3592 6225.tmp 652 6283.tmp 1460 631F.tmp 904 639C.tmp 4464 63FA.tmp 1836 6448.tmp 316 6496.tmp 4612 64E4.tmp 4720 6532.tmp 4280 6590.tmp 3628 65DE.tmp 4624 662C.tmp 1004 667A.tmp 4896 66C8.tmp 1900 6726.tmp 2272 6774.tmp 412 67D2.tmp 2200 6830.tmp 1456 689D.tmp 1544 68FB.tmp 3632 6959.tmp 448 69B6.tmp 3816 6A14.tmp 4092 6A72.tmp 2660 6AD0.tmp 4996 6B2D.tmp 4216 6B8B.tmp 1772 6BE9.tmp 4920 6C47.tmp 1996 6CA4.tmp 752 6D02.tmp 1612 6D50.tmp 372 6DAE.tmp 3076 6E0C.tmp 2088 6E69.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 5020 4736 2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe 83 PID 4736 wrote to memory of 5020 4736 2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe 83 PID 4736 wrote to memory of 5020 4736 2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe 83 PID 5020 wrote to memory of 2932 5020 5544.tmp 84 PID 5020 wrote to memory of 2932 5020 5544.tmp 84 PID 5020 wrote to memory of 2932 5020 5544.tmp 84 PID 2932 wrote to memory of 636 2932 55F0.tmp 85 PID 2932 wrote to memory of 636 2932 55F0.tmp 85 PID 2932 wrote to memory of 636 2932 55F0.tmp 85 PID 636 wrote to memory of 3896 636 568C.tmp 86 PID 636 wrote to memory of 3896 636 568C.tmp 86 PID 636 wrote to memory of 3896 636 568C.tmp 86 PID 3896 wrote to memory of 4128 3896 5709.tmp 87 PID 3896 wrote to memory of 4128 3896 5709.tmp 87 PID 3896 wrote to memory of 4128 3896 5709.tmp 87 PID 4128 wrote to memory of 4204 4128 57B5.tmp 89 PID 4128 wrote to memory of 4204 4128 57B5.tmp 89 PID 4128 wrote to memory of 4204 4128 57B5.tmp 89 PID 4204 wrote to memory of 2040 4204 5832.tmp 90 PID 4204 wrote to memory of 2040 4204 5832.tmp 90 PID 4204 wrote to memory of 2040 4204 5832.tmp 90 PID 2040 wrote to memory of 4636 2040 589F.tmp 92 PID 2040 wrote to memory of 4636 2040 589F.tmp 92 PID 2040 wrote to memory of 4636 2040 589F.tmp 92 PID 4636 wrote to memory of 4968 4636 58FD.tmp 94 PID 4636 wrote to memory of 4968 4636 58FD.tmp 94 PID 4636 wrote to memory of 4968 4636 58FD.tmp 94 PID 4968 wrote to memory of 1912 4968 595B.tmp 95 PID 4968 wrote to memory of 1912 4968 595B.tmp 95 PID 4968 wrote to memory of 1912 4968 595B.tmp 95 PID 1912 wrote to memory of 3096 1912 59B9.tmp 96 PID 1912 wrote to memory of 3096 1912 59B9.tmp 96 PID 1912 wrote to memory of 3096 1912 59B9.tmp 96 PID 3096 wrote to memory of 3048 3096 5A36.tmp 97 PID 3096 wrote to memory of 3048 3096 5A36.tmp 97 PID 3096 wrote to memory of 3048 3096 5A36.tmp 97 PID 3048 wrote to memory of 3816 3048 5AB3.tmp 98 PID 3048 wrote to memory of 3816 3048 5AB3.tmp 98 PID 3048 wrote to memory of 3816 3048 5AB3.tmp 98 PID 3816 wrote to memory of 4092 3816 5B10.tmp 99 PID 3816 wrote to memory of 4092 3816 5B10.tmp 99 PID 3816 wrote to memory of 4092 3816 5B10.tmp 99 PID 4092 wrote to memory of 4188 4092 5B6E.tmp 100 PID 4092 wrote to memory of 4188 4092 5B6E.tmp 100 PID 4092 wrote to memory of 4188 4092 5B6E.tmp 100 PID 4188 wrote to memory of 4848 4188 5BCC.tmp 101 PID 4188 wrote to memory of 4848 4188 5BCC.tmp 101 PID 4188 wrote to memory of 4848 4188 5BCC.tmp 101 PID 4848 wrote to memory of 1144 4848 5C39.tmp 102 PID 4848 wrote to memory of 1144 4848 5C39.tmp 102 PID 4848 wrote to memory of 1144 4848 5C39.tmp 102 PID 1144 wrote to memory of 4924 1144 5C97.tmp 103 PID 1144 wrote to memory of 4924 1144 5C97.tmp 103 PID 1144 wrote to memory of 4924 1144 5C97.tmp 103 PID 4924 wrote to memory of 752 4924 5D04.tmp 106 PID 4924 wrote to memory of 752 4924 5D04.tmp 106 PID 4924 wrote to memory of 752 4924 5D04.tmp 106 PID 752 wrote to memory of 4316 752 5D62.tmp 107 PID 752 wrote to memory of 4316 752 5D62.tmp 107 PID 752 wrote to memory of 4316 752 5D62.tmp 107 PID 4316 wrote to memory of 1112 4316 5DCF.tmp 108 PID 4316 wrote to memory of 1112 4316 5DCF.tmp 108 PID 4316 wrote to memory of 1112 4316 5DCF.tmp 108 PID 1112 wrote to memory of 4396 1112 5E3D.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-02_12b584fdf40a062c95220465c2692af6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\5544.tmp"C:\Users\Admin\AppData\Local\Temp\5544.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\5832.tmp"C:\Users\Admin\AppData\Local\Temp\5832.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\589F.tmp"C:\Users\Admin\AppData\Local\Temp\589F.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\595B.tmp"C:\Users\Admin\AppData\Local\Temp\595B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\59B9.tmp"C:\Users\Admin\AppData\Local\Temp\59B9.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\5B10.tmp"C:\Users\Admin\AppData\Local\Temp\5B10.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"C:\Users\Admin\AppData\Local\Temp\5B6E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\5D04.tmp"C:\Users\Admin\AppData\Local\Temp\5D04.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\5D62.tmp"C:\Users\Admin\AppData\Local\Temp\5D62.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"C:\Users\Admin\AppData\Local\Temp\5DCF.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"C:\Users\Admin\AppData\Local\Temp\5E3D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"23⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\5F18.tmp"C:\Users\Admin\AppData\Local\Temp\5F18.tmp"24⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"25⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"26⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\6060.tmp"C:\Users\Admin\AppData\Local\Temp\6060.tmp"27⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"28⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\613A.tmp"C:\Users\Admin\AppData\Local\Temp\613A.tmp"29⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\6198.tmp"C:\Users\Admin\AppData\Local\Temp\6198.tmp"30⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"31⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"32⤵
- Executes dropped EXE
PID:652 -
C:\Users\Admin\AppData\Local\Temp\631F.tmp"C:\Users\Admin\AppData\Local\Temp\631F.tmp"33⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\639C.tmp"C:\Users\Admin\AppData\Local\Temp\639C.tmp"34⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\63FA.tmp"C:\Users\Admin\AppData\Local\Temp\63FA.tmp"35⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\6448.tmp"C:\Users\Admin\AppData\Local\Temp\6448.tmp"36⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"37⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\64E4.tmp"C:\Users\Admin\AppData\Local\Temp\64E4.tmp"38⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\6532.tmp"C:\Users\Admin\AppData\Local\Temp\6532.tmp"39⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\6590.tmp"C:\Users\Admin\AppData\Local\Temp\6590.tmp"40⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\65DE.tmp"C:\Users\Admin\AppData\Local\Temp\65DE.tmp"41⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"42⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\667A.tmp"C:\Users\Admin\AppData\Local\Temp\667A.tmp"43⤵
- Executes dropped EXE
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\66C8.tmp"C:\Users\Admin\AppData\Local\Temp\66C8.tmp"44⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\6726.tmp"C:\Users\Admin\AppData\Local\Temp\6726.tmp"45⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"46⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\67D2.tmp"C:\Users\Admin\AppData\Local\Temp\67D2.tmp"47⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\6830.tmp"C:\Users\Admin\AppData\Local\Temp\6830.tmp"48⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\689D.tmp"C:\Users\Admin\AppData\Local\Temp\689D.tmp"49⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"50⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\6959.tmp"C:\Users\Admin\AppData\Local\Temp\6959.tmp"51⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\69B6.tmp"C:\Users\Admin\AppData\Local\Temp\69B6.tmp"52⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\6A14.tmp"C:\Users\Admin\AppData\Local\Temp\6A14.tmp"53⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"54⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"55⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"56⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"57⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"58⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\6C47.tmp"C:\Users\Admin\AppData\Local\Temp\6C47.tmp"59⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"60⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\6D02.tmp"C:\Users\Admin\AppData\Local\Temp\6D02.tmp"61⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"62⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"63⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"64⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\6E69.tmp"C:\Users\Admin\AppData\Local\Temp\6E69.tmp"65⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"66⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\6F15.tmp"C:\Users\Admin\AppData\Local\Temp\6F15.tmp"67⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"68⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"69⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\702F.tmp"C:\Users\Admin\AppData\Local\Temp\702F.tmp"70⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\708C.tmp"C:\Users\Admin\AppData\Local\Temp\708C.tmp"71⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\70EA.tmp"C:\Users\Admin\AppData\Local\Temp\70EA.tmp"72⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\7148.tmp"C:\Users\Admin\AppData\Local\Temp\7148.tmp"73⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\71A6.tmp"C:\Users\Admin\AppData\Local\Temp\71A6.tmp"74⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\7203.tmp"C:\Users\Admin\AppData\Local\Temp\7203.tmp"75⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"76⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\72BF.tmp"C:\Users\Admin\AppData\Local\Temp\72BF.tmp"77⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\731D.tmp"C:\Users\Admin\AppData\Local\Temp\731D.tmp"78⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\737A.tmp"C:\Users\Admin\AppData\Local\Temp\737A.tmp"79⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\73D8.tmp"C:\Users\Admin\AppData\Local\Temp\73D8.tmp"80⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\7426.tmp"C:\Users\Admin\AppData\Local\Temp\7426.tmp"81⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"82⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"83⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"84⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"85⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\75FB.tmp"C:\Users\Admin\AppData\Local\Temp\75FB.tmp"86⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\7659.tmp"C:\Users\Admin\AppData\Local\Temp\7659.tmp"87⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\76A7.tmp"C:\Users\Admin\AppData\Local\Temp\76A7.tmp"88⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\7705.tmp"C:\Users\Admin\AppData\Local\Temp\7705.tmp"89⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\7762.tmp"C:\Users\Admin\AppData\Local\Temp\7762.tmp"90⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"91⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"92⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"93⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\78D9.tmp"C:\Users\Admin\AppData\Local\Temp\78D9.tmp"94⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\7937.tmp"C:\Users\Admin\AppData\Local\Temp\7937.tmp"95⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"96⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"97⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\7A31.tmp"C:\Users\Admin\AppData\Local\Temp\7A31.tmp"98⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"99⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"100⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"101⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"102⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"103⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\7C44.tmp"C:\Users\Admin\AppData\Local\Temp\7C44.tmp"104⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\7C92.tmp"C:\Users\Admin\AppData\Local\Temp\7C92.tmp"105⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"106⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"107⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"108⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"109⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\7E29.tmp"C:\Users\Admin\AppData\Local\Temp\7E29.tmp"110⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"111⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"112⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\7F13.tmp"C:\Users\Admin\AppData\Local\Temp\7F13.tmp"113⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\7F71.tmp"C:\Users\Admin\AppData\Local\Temp\7F71.tmp"114⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"115⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\800D.tmp"C:\Users\Admin\AppData\Local\Temp\800D.tmp"116⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\805B.tmp"C:\Users\Admin\AppData\Local\Temp\805B.tmp"117⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"118⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\8107.tmp"C:\Users\Admin\AppData\Local\Temp\8107.tmp"119⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"120⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"121⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\81F1.tmp"C:\Users\Admin\AppData\Local\Temp\81F1.tmp"122⤵PID:1380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-