Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 07:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe
-
Size
520KB
-
MD5
09e98e98da27cce31b0614c0dd213102
-
SHA1
29381b0154f4c1e192af14c5aaf684cd86d0d0fe
-
SHA256
57b95d1d64f979bbb103840561f3ca086b4f35077b7b07483d9795886fe09d5a
-
SHA512
d43498103d55ef1ad6a351f60b6c5e69ea00b63761a4765ce739541857ba49deaa2d8ed16873591a03b6bc739a4ee66f75bef623ba6c807df408d31bc17ef353
-
SSDEEP
6144:lLvd/XzCjUIF1UuXLyQjmOH+JjLCrj9yUTUVRAtt+RtNWMGZoFPpE8Vg/vBQVFQf:roRXOQjmOyyv9yU6I+TE8Vq63QwUlNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2876 3FF7.tmp 2680 40A3.tmp 2948 4110.tmp 4324 41AC.tmp 616 4229.tmp 800 4297.tmp 4596 42E5.tmp 1980 4352.tmp 4612 43C0.tmp 2040 443D.tmp 5020 44BA.tmp 4652 4517.tmp 2472 4585.tmp 4488 45E2.tmp 4940 4650.tmp 4100 469E.tmp 744 46FC.tmp 876 474A.tmp 1900 4798.tmp 3828 47E6.tmp 4908 4853.tmp 752 48A2.tmp 2720 48F0.tmp 4360 493E.tmp 4032 498C.tmp 208 49DA.tmp 5100 4A28.tmp 2000 4A96.tmp 4272 4B03.tmp 3120 4B51.tmp 3916 4BBE.tmp 4412 4C0D.tmp 1652 4C6A.tmp 4884 4CC8.tmp 1760 4D16.tmp 4852 4D74.tmp 3504 4DC2.tmp 3696 4E3F.tmp 4076 4E9D.tmp 3920 4EFB.tmp 4052 4F58.tmp 1916 4FA6.tmp 1952 4FF5.tmp 4492 5043.tmp 2884 5091.tmp 4656 50DF.tmp 3972 512D.tmp 2296 517B.tmp 1168 51F8.tmp 2672 5246.tmp 2948 5294.tmp 1496 52E3.tmp 2340 5331.tmp 4460 53EC.tmp 4876 54A8.tmp 3876 5525.tmp 800 55A2.tmp 968 562E.tmp 1048 56AB.tmp 1852 5728.tmp 3248 5786.tmp 5000 57F3.tmp 3448 5861.tmp 1700 58AF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2876 2904 2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe 81 PID 2904 wrote to memory of 2876 2904 2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe 81 PID 2904 wrote to memory of 2876 2904 2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe 81 PID 2876 wrote to memory of 2680 2876 3FF7.tmp 83 PID 2876 wrote to memory of 2680 2876 3FF7.tmp 83 PID 2876 wrote to memory of 2680 2876 3FF7.tmp 83 PID 2680 wrote to memory of 2948 2680 40A3.tmp 85 PID 2680 wrote to memory of 2948 2680 40A3.tmp 85 PID 2680 wrote to memory of 2948 2680 40A3.tmp 85 PID 2948 wrote to memory of 4324 2948 4110.tmp 86 PID 2948 wrote to memory of 4324 2948 4110.tmp 86 PID 2948 wrote to memory of 4324 2948 4110.tmp 86 PID 4324 wrote to memory of 616 4324 41AC.tmp 88 PID 4324 wrote to memory of 616 4324 41AC.tmp 88 PID 4324 wrote to memory of 616 4324 41AC.tmp 88 PID 616 wrote to memory of 800 616 4229.tmp 89 PID 616 wrote to memory of 800 616 4229.tmp 89 PID 616 wrote to memory of 800 616 4229.tmp 89 PID 800 wrote to memory of 4596 800 4297.tmp 90 PID 800 wrote to memory of 4596 800 4297.tmp 90 PID 800 wrote to memory of 4596 800 4297.tmp 90 PID 4596 wrote to memory of 1980 4596 42E5.tmp 91 PID 4596 wrote to memory of 1980 4596 42E5.tmp 91 PID 4596 wrote to memory of 1980 4596 42E5.tmp 91 PID 1980 wrote to memory of 4612 1980 4352.tmp 92 PID 1980 wrote to memory of 4612 1980 4352.tmp 92 PID 1980 wrote to memory of 4612 1980 4352.tmp 92 PID 4612 wrote to memory of 2040 4612 43C0.tmp 93 PID 4612 wrote to memory of 2040 4612 43C0.tmp 93 PID 4612 wrote to memory of 2040 4612 43C0.tmp 93 PID 2040 wrote to memory of 5020 2040 443D.tmp 94 PID 2040 wrote to memory of 5020 2040 443D.tmp 94 PID 2040 wrote to memory of 5020 2040 443D.tmp 94 PID 5020 wrote to memory of 4652 5020 44BA.tmp 95 PID 5020 wrote to memory of 4652 5020 44BA.tmp 95 PID 5020 wrote to memory of 4652 5020 44BA.tmp 95 PID 4652 wrote to memory of 2472 4652 4517.tmp 96 PID 4652 wrote to memory of 2472 4652 4517.tmp 96 PID 4652 wrote to memory of 2472 4652 4517.tmp 96 PID 2472 wrote to memory of 4488 2472 4585.tmp 97 PID 2472 wrote to memory of 4488 2472 4585.tmp 97 PID 2472 wrote to memory of 4488 2472 4585.tmp 97 PID 4488 wrote to memory of 4940 4488 45E2.tmp 98 PID 4488 wrote to memory of 4940 4488 45E2.tmp 98 PID 4488 wrote to memory of 4940 4488 45E2.tmp 98 PID 4940 wrote to memory of 4100 4940 4650.tmp 99 PID 4940 wrote to memory of 4100 4940 4650.tmp 99 PID 4940 wrote to memory of 4100 4940 4650.tmp 99 PID 4100 wrote to memory of 744 4100 469E.tmp 100 PID 4100 wrote to memory of 744 4100 469E.tmp 100 PID 4100 wrote to memory of 744 4100 469E.tmp 100 PID 744 wrote to memory of 876 744 46FC.tmp 101 PID 744 wrote to memory of 876 744 46FC.tmp 101 PID 744 wrote to memory of 876 744 46FC.tmp 101 PID 876 wrote to memory of 1900 876 474A.tmp 102 PID 876 wrote to memory of 1900 876 474A.tmp 102 PID 876 wrote to memory of 1900 876 474A.tmp 102 PID 1900 wrote to memory of 3828 1900 4798.tmp 103 PID 1900 wrote to memory of 3828 1900 4798.tmp 103 PID 1900 wrote to memory of 3828 1900 4798.tmp 103 PID 3828 wrote to memory of 4908 3828 47E6.tmp 104 PID 3828 wrote to memory of 4908 3828 47E6.tmp 104 PID 3828 wrote to memory of 4908 3828 47E6.tmp 104 PID 4908 wrote to memory of 752 4908 4853.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-05_09e98e98da27cce31b0614c0dd213102_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3FF7.tmp"C:\Users\Admin\AppData\Local\Temp\3FF7.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\40A3.tmp"C:\Users\Admin\AppData\Local\Temp\40A3.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\4110.tmp"C:\Users\Admin\AppData\Local\Temp\4110.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\41AC.tmp"C:\Users\Admin\AppData\Local\Temp\41AC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\4229.tmp"C:\Users\Admin\AppData\Local\Temp\4229.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\4297.tmp"C:\Users\Admin\AppData\Local\Temp\4297.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\42E5.tmp"C:\Users\Admin\AppData\Local\Temp\42E5.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\4352.tmp"C:\Users\Admin\AppData\Local\Temp\4352.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\43C0.tmp"C:\Users\Admin\AppData\Local\Temp\43C0.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\443D.tmp"C:\Users\Admin\AppData\Local\Temp\443D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\44BA.tmp"C:\Users\Admin\AppData\Local\Temp\44BA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\4517.tmp"C:\Users\Admin\AppData\Local\Temp\4517.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\4585.tmp"C:\Users\Admin\AppData\Local\Temp\4585.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\45E2.tmp"C:\Users\Admin\AppData\Local\Temp\45E2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\4650.tmp"C:\Users\Admin\AppData\Local\Temp\4650.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\469E.tmp"C:\Users\Admin\AppData\Local\Temp\469E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\46FC.tmp"C:\Users\Admin\AppData\Local\Temp\46FC.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\474A.tmp"C:\Users\Admin\AppData\Local\Temp\474A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\4798.tmp"C:\Users\Admin\AppData\Local\Temp\4798.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\47E6.tmp"C:\Users\Admin\AppData\Local\Temp\47E6.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\4853.tmp"C:\Users\Admin\AppData\Local\Temp\4853.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\48A2.tmp"C:\Users\Admin\AppData\Local\Temp\48A2.tmp"23⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\48F0.tmp"C:\Users\Admin\AppData\Local\Temp\48F0.tmp"24⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\493E.tmp"C:\Users\Admin\AppData\Local\Temp\493E.tmp"25⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\498C.tmp"C:\Users\Admin\AppData\Local\Temp\498C.tmp"26⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\49DA.tmp"C:\Users\Admin\AppData\Local\Temp\49DA.tmp"27⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\4A28.tmp"C:\Users\Admin\AppData\Local\Temp\4A28.tmp"28⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\4A96.tmp"C:\Users\Admin\AppData\Local\Temp\4A96.tmp"29⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\4B03.tmp"C:\Users\Admin\AppData\Local\Temp\4B03.tmp"30⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\4B51.tmp"C:\Users\Admin\AppData\Local\Temp\4B51.tmp"31⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"C:\Users\Admin\AppData\Local\Temp\4BBE.tmp"32⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"C:\Users\Admin\AppData\Local\Temp\4C0D.tmp"33⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"34⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\4CC8.tmp"C:\Users\Admin\AppData\Local\Temp\4CC8.tmp"35⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\4D16.tmp"C:\Users\Admin\AppData\Local\Temp\4D16.tmp"36⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\4D74.tmp"C:\Users\Admin\AppData\Local\Temp\4D74.tmp"37⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\4DC2.tmp"C:\Users\Admin\AppData\Local\Temp\4DC2.tmp"38⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"39⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"40⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"41⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"42⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"43⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"44⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\5043.tmp"C:\Users\Admin\AppData\Local\Temp\5043.tmp"45⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\5091.tmp"C:\Users\Admin\AppData\Local\Temp\5091.tmp"46⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\50DF.tmp"C:\Users\Admin\AppData\Local\Temp\50DF.tmp"47⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\512D.tmp"C:\Users\Admin\AppData\Local\Temp\512D.tmp"48⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\517B.tmp"C:\Users\Admin\AppData\Local\Temp\517B.tmp"49⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"50⤵
- Executes dropped EXE
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\5246.tmp"C:\Users\Admin\AppData\Local\Temp\5246.tmp"51⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\5294.tmp"C:\Users\Admin\AppData\Local\Temp\5294.tmp"52⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"53⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\5331.tmp"C:\Users\Admin\AppData\Local\Temp\5331.tmp"54⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"55⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\54A8.tmp"C:\Users\Admin\AppData\Local\Temp\54A8.tmp"56⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\5525.tmp"C:\Users\Admin\AppData\Local\Temp\5525.tmp"57⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\55A2.tmp"C:\Users\Admin\AppData\Local\Temp\55A2.tmp"58⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\562E.tmp"C:\Users\Admin\AppData\Local\Temp\562E.tmp"59⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\56AB.tmp"C:\Users\Admin\AppData\Local\Temp\56AB.tmp"60⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\5728.tmp"C:\Users\Admin\AppData\Local\Temp\5728.tmp"61⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\5786.tmp"C:\Users\Admin\AppData\Local\Temp\5786.tmp"62⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"63⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\5861.tmp"C:\Users\Admin\AppData\Local\Temp\5861.tmp"64⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"65⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"66⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"67⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\59F7.tmp"C:\Users\Admin\AppData\Local\Temp\59F7.tmp"68⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\5A55.tmp"C:\Users\Admin\AppData\Local\Temp\5A55.tmp"69⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"70⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\5B01.tmp"C:\Users\Admin\AppData\Local\Temp\5B01.tmp"71⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"72⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\5BBC.tmp"C:\Users\Admin\AppData\Local\Temp\5BBC.tmp"73⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"74⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp"75⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"76⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\5D33.tmp"C:\Users\Admin\AppData\Local\Temp\5D33.tmp"77⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\5D91.tmp"C:\Users\Admin\AppData\Local\Temp\5D91.tmp"78⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"79⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"80⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"81⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"82⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"83⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\5F95.tmp"C:\Users\Admin\AppData\Local\Temp\5F95.tmp"84⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\6002.tmp"C:\Users\Admin\AppData\Local\Temp\6002.tmp"85⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\6060.tmp"C:\Users\Admin\AppData\Local\Temp\6060.tmp"86⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\60AE.tmp"C:\Users\Admin\AppData\Local\Temp\60AE.tmp"87⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\610C.tmp"C:\Users\Admin\AppData\Local\Temp\610C.tmp"88⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\615A.tmp"C:\Users\Admin\AppData\Local\Temp\615A.tmp"89⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"90⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\6215.tmp"C:\Users\Admin\AppData\Local\Temp\6215.tmp"91⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"92⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\62E0.tmp"C:\Users\Admin\AppData\Local\Temp\62E0.tmp"93⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"94⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\639C.tmp"C:\Users\Admin\AppData\Local\Temp\639C.tmp"95⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\63FA.tmp"C:\Users\Admin\AppData\Local\Temp\63FA.tmp"96⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\6448.tmp"C:\Users\Admin\AppData\Local\Temp\6448.tmp"97⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\64A5.tmp"C:\Users\Admin\AppData\Local\Temp\64A5.tmp"98⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"99⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\6561.tmp"C:\Users\Admin\AppData\Local\Temp\6561.tmp"100⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\65BF.tmp"C:\Users\Admin\AppData\Local\Temp\65BF.tmp"101⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\661C.tmp"C:\Users\Admin\AppData\Local\Temp\661C.tmp"102⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\668A.tmp"C:\Users\Admin\AppData\Local\Temp\668A.tmp"103⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\66D8.tmp"C:\Users\Admin\AppData\Local\Temp\66D8.tmp"104⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"105⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\6784.tmp"C:\Users\Admin\AppData\Local\Temp\6784.tmp"106⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\67D2.tmp"C:\Users\Admin\AppData\Local\Temp\67D2.tmp"107⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\6820.tmp"C:\Users\Admin\AppData\Local\Temp\6820.tmp"108⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\687E.tmp"C:\Users\Admin\AppData\Local\Temp\687E.tmp"109⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\68DC.tmp"C:\Users\Admin\AppData\Local\Temp\68DC.tmp"110⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\692A.tmp"C:\Users\Admin\AppData\Local\Temp\692A.tmp"111⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\6978.tmp"C:\Users\Admin\AppData\Local\Temp\6978.tmp"112⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\69D6.tmp"C:\Users\Admin\AppData\Local\Temp\69D6.tmp"113⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"114⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"115⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"116⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"117⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"118⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"119⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\6C27.tmp"C:\Users\Admin\AppData\Local\Temp\6C27.tmp"120⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\6C85.tmp"C:\Users\Admin\AppData\Local\Temp\6C85.tmp"121⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"122⤵PID:2924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-