Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 17:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-12_81786620d3203f903af810d96564370a_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-12_81786620d3203f903af810d96564370a_mafia.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-06-12_81786620d3203f903af810d96564370a_mafia.exe
-
Size
529KB
-
MD5
81786620d3203f903af810d96564370a
-
SHA1
4802153d4325fe3b1ce1b12242440f42f8b7f57a
-
SHA256
9c87b75b5fba8f0ffade78522f0d9e966c17f2469778fffab5c77819dbad3391
-
SHA512
d2a29aa0747f668aab04f9fad0999537bb408e07013519e88ac0add0d3b598251456b5386c66936513419df8eb752192c7d4249bfc427bf97c8736f17323a63b
-
SSDEEP
6144:oorf3lPvovsgZnqG2C7mOTeiL/DLcv6n0+IqC2eFctGBn2pfJc/eqtqm0qSdUYZY:NU5rCOTeijaxFQG1KevJbmeTZwlH4Hp
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2744 48A2.tmp 1572 48FF.tmp 2816 498C.tmp 4496 49F9.tmp 2948 4A76.tmp 2096 4AE4.tmp 2904 4B51.tmp 3652 4BCE.tmp 744 4C3B.tmp 2864 4CA9.tmp 3036 4D26.tmp 5048 4DA3.tmp 2980 4E01.tmp 3792 4E6E.tmp 3608 4ECC.tmp 1504 4F49.tmp 392 4FC6.tmp 2268 5023.tmp 2228 50A0.tmp 1512 50EF.tmp 4692 515C.tmp 5108 51AA.tmp 1548 5208.tmp 3896 5256.tmp 4388 52D3.tmp 3384 5340.tmp 4920 53AE.tmp 4908 541B.tmp 808 5498.tmp 2680 54D7.tmp 4224 5534.tmp 2180 55A2.tmp 1980 561F.tmp 3244 567C.tmp 3536 56CB.tmp 2876 5719.tmp 4236 5767.tmp 952 57B5.tmp 1612 5803.tmp 3696 5851.tmp 2068 58AF.tmp 3052 58FD.tmp 2536 594B.tmp 4536 5999.tmp 2644 59E7.tmp 544 5A36.tmp 4728 5A84.tmp 3704 5AE1.tmp 716 5B30.tmp 5112 5B7E.tmp 1760 5BCC.tmp 1952 5C1A.tmp 4724 5C68.tmp 2100 5CB6.tmp 1832 5D04.tmp 4160 5D52.tmp 2288 5DA1.tmp 4652 5DEF.tmp 1652 5E4C.tmp 2136 5E9B.tmp 1480 5ED9.tmp 1856 5F27.tmp 2328 5F75.tmp 3476 5FB4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2744 4932 2024-06-12_81786620d3203f903af810d96564370a_mafia.exe 81 PID 4932 wrote to memory of 2744 4932 2024-06-12_81786620d3203f903af810d96564370a_mafia.exe 81 PID 4932 wrote to memory of 2744 4932 2024-06-12_81786620d3203f903af810d96564370a_mafia.exe 81 PID 2744 wrote to memory of 1572 2744 48A2.tmp 82 PID 2744 wrote to memory of 1572 2744 48A2.tmp 82 PID 2744 wrote to memory of 1572 2744 48A2.tmp 82 PID 1572 wrote to memory of 2816 1572 48FF.tmp 83 PID 1572 wrote to memory of 2816 1572 48FF.tmp 83 PID 1572 wrote to memory of 2816 1572 48FF.tmp 83 PID 2816 wrote to memory of 4496 2816 498C.tmp 84 PID 2816 wrote to memory of 4496 2816 498C.tmp 84 PID 2816 wrote to memory of 4496 2816 498C.tmp 84 PID 4496 wrote to memory of 2948 4496 49F9.tmp 85 PID 4496 wrote to memory of 2948 4496 49F9.tmp 85 PID 4496 wrote to memory of 2948 4496 49F9.tmp 85 PID 2948 wrote to memory of 2096 2948 4A76.tmp 86 PID 2948 wrote to memory of 2096 2948 4A76.tmp 86 PID 2948 wrote to memory of 2096 2948 4A76.tmp 86 PID 2096 wrote to memory of 2904 2096 4AE4.tmp 87 PID 2096 wrote to memory of 2904 2096 4AE4.tmp 87 PID 2096 wrote to memory of 2904 2096 4AE4.tmp 87 PID 2904 wrote to memory of 3652 2904 4B51.tmp 88 PID 2904 wrote to memory of 3652 2904 4B51.tmp 88 PID 2904 wrote to memory of 3652 2904 4B51.tmp 88 PID 3652 wrote to memory of 744 3652 4BCE.tmp 89 PID 3652 wrote to memory of 744 3652 4BCE.tmp 89 PID 3652 wrote to memory of 744 3652 4BCE.tmp 89 PID 744 wrote to memory of 2864 744 4C3B.tmp 90 PID 744 wrote to memory of 2864 744 4C3B.tmp 90 PID 744 wrote to memory of 2864 744 4C3B.tmp 90 PID 2864 wrote to memory of 3036 2864 4CA9.tmp 91 PID 2864 wrote to memory of 3036 2864 4CA9.tmp 91 PID 2864 wrote to memory of 3036 2864 4CA9.tmp 91 PID 3036 wrote to memory of 5048 3036 4D26.tmp 92 PID 3036 wrote to memory of 5048 3036 4D26.tmp 92 PID 3036 wrote to memory of 5048 3036 4D26.tmp 92 PID 5048 wrote to memory of 2980 5048 4DA3.tmp 93 PID 5048 wrote to memory of 2980 5048 4DA3.tmp 93 PID 5048 wrote to memory of 2980 5048 4DA3.tmp 93 PID 2980 wrote to memory of 3792 2980 4E01.tmp 94 PID 2980 wrote to memory of 3792 2980 4E01.tmp 94 PID 2980 wrote to memory of 3792 2980 4E01.tmp 94 PID 3792 wrote to memory of 3608 3792 4E6E.tmp 95 PID 3792 wrote to memory of 3608 3792 4E6E.tmp 95 PID 3792 wrote to memory of 3608 3792 4E6E.tmp 95 PID 3608 wrote to memory of 1504 3608 4ECC.tmp 96 PID 3608 wrote to memory of 1504 3608 4ECC.tmp 96 PID 3608 wrote to memory of 1504 3608 4ECC.tmp 96 PID 1504 wrote to memory of 392 1504 4F49.tmp 97 PID 1504 wrote to memory of 392 1504 4F49.tmp 97 PID 1504 wrote to memory of 392 1504 4F49.tmp 97 PID 392 wrote to memory of 2268 392 4FC6.tmp 98 PID 392 wrote to memory of 2268 392 4FC6.tmp 98 PID 392 wrote to memory of 2268 392 4FC6.tmp 98 PID 2268 wrote to memory of 2228 2268 5023.tmp 99 PID 2268 wrote to memory of 2228 2268 5023.tmp 99 PID 2268 wrote to memory of 2228 2268 5023.tmp 99 PID 2228 wrote to memory of 1512 2228 50A0.tmp 100 PID 2228 wrote to memory of 1512 2228 50A0.tmp 100 PID 2228 wrote to memory of 1512 2228 50A0.tmp 100 PID 1512 wrote to memory of 4692 1512 50EF.tmp 101 PID 1512 wrote to memory of 4692 1512 50EF.tmp 101 PID 1512 wrote to memory of 4692 1512 50EF.tmp 101 PID 4692 wrote to memory of 5108 4692 515C.tmp 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-12_81786620d3203f903af810d96564370a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-12_81786620d3203f903af810d96564370a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\48A2.tmp"C:\Users\Admin\AppData\Local\Temp\48A2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\48FF.tmp"C:\Users\Admin\AppData\Local\Temp\48FF.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\498C.tmp"C:\Users\Admin\AppData\Local\Temp\498C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\49F9.tmp"C:\Users\Admin\AppData\Local\Temp\49F9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\4A76.tmp"C:\Users\Admin\AppData\Local\Temp\4A76.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\4B51.tmp"C:\Users\Admin\AppData\Local\Temp\4B51.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\4BCE.tmp"C:\Users\Admin\AppData\Local\Temp\4BCE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"C:\Users\Admin\AppData\Local\Temp\4CA9.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\4D26.tmp"C:\Users\Admin\AppData\Local\Temp\4D26.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\4DA3.tmp"C:\Users\Admin\AppData\Local\Temp\4DA3.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\4E01.tmp"C:\Users\Admin\AppData\Local\Temp\4E01.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"C:\Users\Admin\AppData\Local\Temp\4E6E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\4F49.tmp"C:\Users\Admin\AppData\Local\Temp\4F49.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\4FC6.tmp"C:\Users\Admin\AppData\Local\Temp\4FC6.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\50EF.tmp"C:\Users\Admin\AppData\Local\Temp\50EF.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\515C.tmp"C:\Users\Admin\AppData\Local\Temp\515C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\51AA.tmp"C:\Users\Admin\AppData\Local\Temp\51AA.tmp"23⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\5208.tmp"C:\Users\Admin\AppData\Local\Temp\5208.tmp"24⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\5256.tmp"C:\Users\Admin\AppData\Local\Temp\5256.tmp"25⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\52D3.tmp"C:\Users\Admin\AppData\Local\Temp\52D3.tmp"26⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\5340.tmp"C:\Users\Admin\AppData\Local\Temp\5340.tmp"27⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\53AE.tmp"C:\Users\Admin\AppData\Local\Temp\53AE.tmp"28⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\541B.tmp"C:\Users\Admin\AppData\Local\Temp\541B.tmp"29⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\5498.tmp"C:\Users\Admin\AppData\Local\Temp\5498.tmp"30⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\54D7.tmp"C:\Users\Admin\AppData\Local\Temp\54D7.tmp"31⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\5534.tmp"C:\Users\Admin\AppData\Local\Temp\5534.tmp"32⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\55A2.tmp"C:\Users\Admin\AppData\Local\Temp\55A2.tmp"33⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\561F.tmp"C:\Users\Admin\AppData\Local\Temp\561F.tmp"34⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\567C.tmp"C:\Users\Admin\AppData\Local\Temp\567C.tmp"35⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\56CB.tmp"C:\Users\Admin\AppData\Local\Temp\56CB.tmp"36⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\5719.tmp"C:\Users\Admin\AppData\Local\Temp\5719.tmp"37⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\5767.tmp"C:\Users\Admin\AppData\Local\Temp\5767.tmp"38⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\57B5.tmp"C:\Users\Admin\AppData\Local\Temp\57B5.tmp"39⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\5803.tmp"C:\Users\Admin\AppData\Local\Temp\5803.tmp"40⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"41⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"42⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"43⤵
- Executes dropped EXE
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\594B.tmp"C:\Users\Admin\AppData\Local\Temp\594B.tmp"44⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"45⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"46⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\5A36.tmp"C:\Users\Admin\AppData\Local\Temp\5A36.tmp"47⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"48⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"49⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\5B30.tmp"C:\Users\Admin\AppData\Local\Temp\5B30.tmp"50⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"51⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"52⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"C:\Users\Admin\AppData\Local\Temp\5C1A.tmp"53⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\5C68.tmp"C:\Users\Admin\AppData\Local\Temp\5C68.tmp"54⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"C:\Users\Admin\AppData\Local\Temp\5CB6.tmp"55⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\5D04.tmp"C:\Users\Admin\AppData\Local\Temp\5D04.tmp"56⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\5D52.tmp"C:\Users\Admin\AppData\Local\Temp\5D52.tmp"57⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\5DA1.tmp"C:\Users\Admin\AppData\Local\Temp\5DA1.tmp"58⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"59⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"60⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"61⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"C:\Users\Admin\AppData\Local\Temp\5ED9.tmp"62⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\5F27.tmp"C:\Users\Admin\AppData\Local\Temp\5F27.tmp"63⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\5F75.tmp"C:\Users\Admin\AppData\Local\Temp\5F75.tmp"64⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\5FB4.tmp"C:\Users\Admin\AppData\Local\Temp\5FB4.tmp"65⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\6002.tmp"C:\Users\Admin\AppData\Local\Temp\6002.tmp"66⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6050.tmp"C:\Users\Admin\AppData\Local\Temp\6050.tmp"67⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\609E.tmp"C:\Users\Admin\AppData\Local\Temp\609E.tmp"68⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\60DD.tmp"C:\Users\Admin\AppData\Local\Temp\60DD.tmp"69⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\612B.tmp"C:\Users\Admin\AppData\Local\Temp\612B.tmp"70⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"71⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\61C7.tmp"C:\Users\Admin\AppData\Local\Temp\61C7.tmp"72⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"73⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"74⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"75⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\630F.tmp"C:\Users\Admin\AppData\Local\Temp\630F.tmp"76⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\635D.tmp"C:\Users\Admin\AppData\Local\Temp\635D.tmp"77⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\63AB.tmp"C:\Users\Admin\AppData\Local\Temp\63AB.tmp"78⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\63FA.tmp"C:\Users\Admin\AppData\Local\Temp\63FA.tmp"79⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\6448.tmp"C:\Users\Admin\AppData\Local\Temp\6448.tmp"80⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"81⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\64E4.tmp"C:\Users\Admin\AppData\Local\Temp\64E4.tmp"82⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\6532.tmp"C:\Users\Admin\AppData\Local\Temp\6532.tmp"83⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\6580.tmp"C:\Users\Admin\AppData\Local\Temp\6580.tmp"84⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\65DE.tmp"C:\Users\Admin\AppData\Local\Temp\65DE.tmp"85⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"86⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\667A.tmp"C:\Users\Admin\AppData\Local\Temp\667A.tmp"87⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\66C8.tmp"C:\Users\Admin\AppData\Local\Temp\66C8.tmp"88⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\6726.tmp"C:\Users\Admin\AppData\Local\Temp\6726.tmp"89⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"90⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\67C2.tmp"C:\Users\Admin\AppData\Local\Temp\67C2.tmp"91⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"92⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"93⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"94⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"95⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"96⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"97⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\69E5.tmp"C:\Users\Admin\AppData\Local\Temp\69E5.tmp"98⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"99⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"100⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"101⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"102⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"103⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"104⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"105⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"106⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\6C75.tmp"C:\Users\Admin\AppData\Local\Temp\6C75.tmp"107⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"108⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\6D12.tmp"C:\Users\Admin\AppData\Local\Temp\6D12.tmp"109⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\6D60.tmp"C:\Users\Admin\AppData\Local\Temp\6D60.tmp"110⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"111⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\6DFC.tmp"C:\Users\Admin\AppData\Local\Temp\6DFC.tmp"112⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"113⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"114⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"115⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\6F44.tmp"C:\Users\Admin\AppData\Local\Temp\6F44.tmp"116⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\6FA2.tmp"C:\Users\Admin\AppData\Local\Temp\6FA2.tmp"117⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\6FF0.tmp"C:\Users\Admin\AppData\Local\Temp\6FF0.tmp"118⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\703E.tmp"C:\Users\Admin\AppData\Local\Temp\703E.tmp"119⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\708C.tmp"C:\Users\Admin\AppData\Local\Temp\708C.tmp"120⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\70DA.tmp"C:\Users\Admin\AppData\Local\Temp\70DA.tmp"121⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"122⤵PID:4460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-