Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 12:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe
-
Size
488KB
-
MD5
8ad07bd81e4966cc2156fd21bbd1a7ad
-
SHA1
1197ff81f5437f6251486e2298b4509ac15ecdf1
-
SHA256
269459f39f5376fe06ec794e2441c3b5ed98bb080cf0cfc090be7f672389eb97
-
SHA512
3dfdf9aaadcaddcdec93f1bc3dbe835dcad124f8ed2c2c29252a87202437ae49eed9c4fcbeceb146c708856541f2efabe4f677315f2fc7b511a2888cd7c3cf69
-
SSDEEP
12288:/U5rCOTeiDfBPMYxybWH+bUV6IrbgU7Zf00L6efnHNZ:/UQOJDfBWaHKBUVfF2efnHN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4780 12A8.tmp 3480 13F0.tmp 1436 14BC.tmp 5116 1596.tmp 4156 1633.tmp 3824 16B0.tmp 4900 179A.tmp 208 1855.tmp 2656 1901.tmp 3820 19AD.tmp 5008 1A59.tmp 1376 1B05.tmp 3848 1BB1.tmp 4912 1C4D.tmp 1836 1CE9.tmp 848 1D86.tmp 2584 1E12.tmp 2924 1EAE.tmp 2216 1F1C.tmp 2420 2016.tmp 3544 2093.tmp 2096 212F.tmp 1052 21AC.tmp 3572 2219.tmp 1980 22C5.tmp 2508 23B0.tmp 2708 244C.tmp 2948 2507.tmp 4440 2594.tmp 1288 2611.tmp 1092 26EC.tmp 3104 2778.tmp 1736 2844.tmp 3576 28C1.tmp 2716 294D.tmp 4208 29F9.tmp 3908 2AB5.tmp 3140 2CA9.tmp 3264 2E5E.tmp 3880 3014.tmp 1188 318B.tmp 1916 32C3.tmp 448 339E.tmp 4228 3459.tmp 5036 3544.tmp 548 362E.tmp 4196 3718.tmp 1832 37C4.tmp 4900 38BE.tmp 228 3999.tmp 2928 3A64.tmp 5008 3B2F.tmp 500 3BBC.tmp 2652 3C68.tmp 3860 3D23.tmp 4976 3DC0.tmp 3112 3E4C.tmp 4104 3EF8.tmp 908 4021.tmp 3176 411B.tmp 2420 4225.tmp 3544 42C1.tmp 3956 439C.tmp 3444 4438.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4780 4284 2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe 90 PID 4284 wrote to memory of 4780 4284 2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe 90 PID 4284 wrote to memory of 4780 4284 2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe 90 PID 4780 wrote to memory of 3480 4780 12A8.tmp 91 PID 4780 wrote to memory of 3480 4780 12A8.tmp 91 PID 4780 wrote to memory of 3480 4780 12A8.tmp 91 PID 3480 wrote to memory of 1436 3480 13F0.tmp 92 PID 3480 wrote to memory of 1436 3480 13F0.tmp 92 PID 3480 wrote to memory of 1436 3480 13F0.tmp 92 PID 1436 wrote to memory of 5116 1436 14BC.tmp 93 PID 1436 wrote to memory of 5116 1436 14BC.tmp 93 PID 1436 wrote to memory of 5116 1436 14BC.tmp 93 PID 5116 wrote to memory of 4156 5116 1596.tmp 94 PID 5116 wrote to memory of 4156 5116 1596.tmp 94 PID 5116 wrote to memory of 4156 5116 1596.tmp 94 PID 4156 wrote to memory of 3824 4156 1633.tmp 95 PID 4156 wrote to memory of 3824 4156 1633.tmp 95 PID 4156 wrote to memory of 3824 4156 1633.tmp 95 PID 3824 wrote to memory of 4900 3824 16B0.tmp 96 PID 3824 wrote to memory of 4900 3824 16B0.tmp 96 PID 3824 wrote to memory of 4900 3824 16B0.tmp 96 PID 4900 wrote to memory of 208 4900 179A.tmp 97 PID 4900 wrote to memory of 208 4900 179A.tmp 97 PID 4900 wrote to memory of 208 4900 179A.tmp 97 PID 208 wrote to memory of 2656 208 1855.tmp 98 PID 208 wrote to memory of 2656 208 1855.tmp 98 PID 208 wrote to memory of 2656 208 1855.tmp 98 PID 2656 wrote to memory of 3820 2656 1901.tmp 99 PID 2656 wrote to memory of 3820 2656 1901.tmp 99 PID 2656 wrote to memory of 3820 2656 1901.tmp 99 PID 3820 wrote to memory of 5008 3820 19AD.tmp 100 PID 3820 wrote to memory of 5008 3820 19AD.tmp 100 PID 3820 wrote to memory of 5008 3820 19AD.tmp 100 PID 5008 wrote to memory of 1376 5008 1A59.tmp 101 PID 5008 wrote to memory of 1376 5008 1A59.tmp 101 PID 5008 wrote to memory of 1376 5008 1A59.tmp 101 PID 1376 wrote to memory of 3848 1376 1B05.tmp 102 PID 1376 wrote to memory of 3848 1376 1B05.tmp 102 PID 1376 wrote to memory of 3848 1376 1B05.tmp 102 PID 3848 wrote to memory of 4912 3848 1BB1.tmp 103 PID 3848 wrote to memory of 4912 3848 1BB1.tmp 103 PID 3848 wrote to memory of 4912 3848 1BB1.tmp 103 PID 4912 wrote to memory of 1836 4912 1C4D.tmp 104 PID 4912 wrote to memory of 1836 4912 1C4D.tmp 104 PID 4912 wrote to memory of 1836 4912 1C4D.tmp 104 PID 1836 wrote to memory of 848 1836 1CE9.tmp 105 PID 1836 wrote to memory of 848 1836 1CE9.tmp 105 PID 1836 wrote to memory of 848 1836 1CE9.tmp 105 PID 848 wrote to memory of 2584 848 1D86.tmp 106 PID 848 wrote to memory of 2584 848 1D86.tmp 106 PID 848 wrote to memory of 2584 848 1D86.tmp 106 PID 2584 wrote to memory of 2924 2584 1E12.tmp 107 PID 2584 wrote to memory of 2924 2584 1E12.tmp 107 PID 2584 wrote to memory of 2924 2584 1E12.tmp 107 PID 2924 wrote to memory of 2216 2924 1EAE.tmp 108 PID 2924 wrote to memory of 2216 2924 1EAE.tmp 108 PID 2924 wrote to memory of 2216 2924 1EAE.tmp 108 PID 2216 wrote to memory of 2420 2216 1F1C.tmp 109 PID 2216 wrote to memory of 2420 2216 1F1C.tmp 109 PID 2216 wrote to memory of 2420 2216 1F1C.tmp 109 PID 2420 wrote to memory of 3544 2420 2016.tmp 110 PID 2420 wrote to memory of 3544 2420 2016.tmp 110 PID 2420 wrote to memory of 3544 2420 2016.tmp 110 PID 3544 wrote to memory of 2096 3544 2093.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-13_8ad07bd81e4966cc2156fd21bbd1a7ad_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\14BC.tmp"C:\Users\Admin\AppData\Local\Temp\14BC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\1633.tmp"C:\Users\Admin\AppData\Local\Temp\1633.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\16B0.tmp"C:\Users\Admin\AppData\Local\Temp\16B0.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\1855.tmp"C:\Users\Admin\AppData\Local\Temp\1855.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\1901.tmp"C:\Users\Admin\AppData\Local\Temp\1901.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\19AD.tmp"C:\Users\Admin\AppData\Local\Temp\19AD.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\1A59.tmp"C:\Users\Admin\AppData\Local\Temp\1A59.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\1E12.tmp"C:\Users\Admin\AppData\Local\Temp\1E12.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\2016.tmp"C:\Users\Admin\AppData\Local\Temp\2016.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\212F.tmp"C:\Users\Admin\AppData\Local\Temp\212F.tmp"23⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\21AC.tmp"C:\Users\Admin\AppData\Local\Temp\21AC.tmp"24⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\2219.tmp"C:\Users\Admin\AppData\Local\Temp\2219.tmp"25⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"26⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\23B0.tmp"C:\Users\Admin\AppData\Local\Temp\23B0.tmp"27⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"28⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"29⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"30⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\2611.tmp"C:\Users\Admin\AppData\Local\Temp\2611.tmp"31⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\26EC.tmp"C:\Users\Admin\AppData\Local\Temp\26EC.tmp"32⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"33⤵
- Executes dropped EXE
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"34⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"35⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"36⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"37⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"38⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\2B80.tmp"C:\Users\Admin\AppData\Local\Temp\2B80.tmp"39⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"40⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"41⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\3014.tmp"C:\Users\Admin\AppData\Local\Temp\3014.tmp"42⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\318B.tmp"C:\Users\Admin\AppData\Local\Temp\318B.tmp"43⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"44⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"45⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"46⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"47⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\362E.tmp"C:\Users\Admin\AppData\Local\Temp\362E.tmp"48⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"49⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\37C4.tmp"C:\Users\Admin\AppData\Local\Temp\37C4.tmp"50⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\38BE.tmp"C:\Users\Admin\AppData\Local\Temp\38BE.tmp"51⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"52⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"53⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"54⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"55⤵
- Executes dropped EXE
PID:500 -
C:\Users\Admin\AppData\Local\Temp\3C68.tmp"C:\Users\Admin\AppData\Local\Temp\3C68.tmp"56⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"57⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"58⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"59⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"60⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"61⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"62⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\4225.tmp"C:\Users\Admin\AppData\Local\Temp\4225.tmp"63⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"64⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"65⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"66⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"67⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"68⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\46A9.tmp"C:\Users\Admin\AppData\Local\Temp\46A9.tmp"69⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"70⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"71⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\48EB.tmp"C:\Users\Admin\AppData\Local\Temp\48EB.tmp"72⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"73⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\4A52.tmp"C:\Users\Admin\AppData\Local\Temp\4A52.tmp"74⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"75⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"76⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"77⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\4E4A.tmp"C:\Users\Admin\AppData\Local\Temp\4E4A.tmp"78⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"79⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"80⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"81⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\50EA.tmp"C:\Users\Admin\AppData\Local\Temp\50EA.tmp"82⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\5196.tmp"C:\Users\Admin\AppData\Local\Temp\5196.tmp"83⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"84⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"85⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"86⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"87⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"88⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"89⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\55AD.tmp"C:\Users\Admin\AppData\Local\Temp\55AD.tmp"90⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"91⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"92⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"93⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\583D.tmp"C:\Users\Admin\AppData\Local\Temp\583D.tmp"94⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"95⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\5946.tmp"C:\Users\Admin\AppData\Local\Temp\5946.tmp"96⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"97⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\5A50.tmp"C:\Users\Admin\AppData\Local\Temp\5A50.tmp"98⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"99⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\5B89.tmp"C:\Users\Admin\AppData\Local\Temp\5B89.tmp"100⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\5C15.tmp"C:\Users\Admin\AppData\Local\Temp\5C15.tmp"101⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"102⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\5D2E.tmp"C:\Users\Admin\AppData\Local\Temp\5D2E.tmp"103⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"104⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\5E67.tmp"C:\Users\Admin\AppData\Local\Temp\5E67.tmp"105⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\5F13.tmp"C:\Users\Admin\AppData\Local\Temp\5F13.tmp"106⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"107⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\602C.tmp"C:\Users\Admin\AppData\Local\Temp\602C.tmp"108⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\60A9.tmp"C:\Users\Admin\AppData\Local\Temp\60A9.tmp"109⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\6126.tmp"C:\Users\Admin\AppData\Local\Temp\6126.tmp"110⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\61A3.tmp"C:\Users\Admin\AppData\Local\Temp\61A3.tmp"111⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\625F.tmp"C:\Users\Admin\AppData\Local\Temp\625F.tmp"112⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"113⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"114⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\6414.tmp"C:\Users\Admin\AppData\Local\Temp\6414.tmp"115⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\64D0.tmp"C:\Users\Admin\AppData\Local\Temp\64D0.tmp"116⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\658B.tmp"C:\Users\Admin\AppData\Local\Temp\658B.tmp"117⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\6608.tmp"C:\Users\Admin\AppData\Local\Temp\6608.tmp"118⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"119⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"120⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\679E.tmp"C:\Users\Admin\AppData\Local\Temp\679E.tmp"121⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"122⤵PID:1584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-