Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 13:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe
-
Size
527KB
-
MD5
09f5bfca5c014327a98ff06b6aa04317
-
SHA1
8c3abccb2d184977302129ccd846accfa77a54d8
-
SHA256
09499dcf660f4953cba8ba0a6eb4f6a24a36ffb04c0c34b102df3334ee5bdc33
-
SHA512
49877d26e9d1e9199ed7bdfc5449b8a49902c11d5a8ffd3cc50f10bba8511c6c1b0632342395115294a33211cc2eac0af9b053150e06026d77ad33f6ddad80cb
-
SSDEEP
12288:fU5rCOTeidktPxp440h1gNxZZlzmjCDZu:fUQOJdaXyimjCDo
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3336 2A76.tmp 2592 2BED.tmp 536 2D54.tmp 820 2E4E.tmp 2896 3081.tmp 4432 31F8.tmp 528 3321.tmp 3324 34B7.tmp 4356 365D.tmp 4204 37E4.tmp 2516 38DE.tmp 1396 396A.tmp 3544 39E7.tmp 2292 3B00.tmp 2120 3CF4.tmp 1392 3D91.tmp 3864 3E6B.tmp 1768 3F75.tmp 4212 405F.tmp 2364 4179.tmp 4992 4234.tmp 3588 439C.tmp 3452 4496.tmp 4580 4580.tmp 2484 464B.tmp 3768 4774.tmp 3392 4820.tmp 400 4997.tmp 3464 4A23.tmp 4248 4AFE.tmp 3084 4C56.tmp 4452 4D21.tmp 3148 4E1B.tmp 3912 4EE6.tmp 4716 4F73.tmp 4504 4FF0.tmp 2960 5109.tmp 3100 5196.tmp 4848 5222.tmp 4564 5399.tmp 1620 5484.tmp 2240 54F1.tmp 2252 556E.tmp 3336 5649.tmp 2592 56D5.tmp 2452 5752.tmp 2892 57DF.tmp 2172 588B.tmp 2896 5A8F.tmp 2248 5B0C.tmp 3496 5BB7.tmp 852 5C34.tmp 924 5CC1.tmp 1752 5D6D.tmp 3424 5E19.tmp 4752 5EB5.tmp 1200 5F51.tmp 5084 608A.tmp 4324 6116.tmp 1388 61B3.tmp 4584 6230.tmp 2460 6387.tmp 2120 63F5.tmp 1764 64D0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3336 3248 2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe 91 PID 3248 wrote to memory of 3336 3248 2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe 91 PID 3248 wrote to memory of 3336 3248 2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe 91 PID 3336 wrote to memory of 2592 3336 2A76.tmp 92 PID 3336 wrote to memory of 2592 3336 2A76.tmp 92 PID 3336 wrote to memory of 2592 3336 2A76.tmp 92 PID 2592 wrote to memory of 536 2592 2BED.tmp 93 PID 2592 wrote to memory of 536 2592 2BED.tmp 93 PID 2592 wrote to memory of 536 2592 2BED.tmp 93 PID 536 wrote to memory of 820 536 2D54.tmp 94 PID 536 wrote to memory of 820 536 2D54.tmp 94 PID 536 wrote to memory of 820 536 2D54.tmp 94 PID 820 wrote to memory of 2896 820 2E4E.tmp 95 PID 820 wrote to memory of 2896 820 2E4E.tmp 95 PID 820 wrote to memory of 2896 820 2E4E.tmp 95 PID 2896 wrote to memory of 4432 2896 3081.tmp 96 PID 2896 wrote to memory of 4432 2896 3081.tmp 96 PID 2896 wrote to memory of 4432 2896 3081.tmp 96 PID 4432 wrote to memory of 528 4432 31F8.tmp 97 PID 4432 wrote to memory of 528 4432 31F8.tmp 97 PID 4432 wrote to memory of 528 4432 31F8.tmp 97 PID 528 wrote to memory of 3324 528 3321.tmp 98 PID 528 wrote to memory of 3324 528 3321.tmp 98 PID 528 wrote to memory of 3324 528 3321.tmp 98 PID 3324 wrote to memory of 4356 3324 34B7.tmp 99 PID 3324 wrote to memory of 4356 3324 34B7.tmp 99 PID 3324 wrote to memory of 4356 3324 34B7.tmp 99 PID 4356 wrote to memory of 4204 4356 365D.tmp 100 PID 4356 wrote to memory of 4204 4356 365D.tmp 100 PID 4356 wrote to memory of 4204 4356 365D.tmp 100 PID 4204 wrote to memory of 2516 4204 37E4.tmp 101 PID 4204 wrote to memory of 2516 4204 37E4.tmp 101 PID 4204 wrote to memory of 2516 4204 37E4.tmp 101 PID 2516 wrote to memory of 1396 2516 38DE.tmp 102 PID 2516 wrote to memory of 1396 2516 38DE.tmp 102 PID 2516 wrote to memory of 1396 2516 38DE.tmp 102 PID 1396 wrote to memory of 3544 1396 396A.tmp 103 PID 1396 wrote to memory of 3544 1396 396A.tmp 103 PID 1396 wrote to memory of 3544 1396 396A.tmp 103 PID 3544 wrote to memory of 2292 3544 39E7.tmp 104 PID 3544 wrote to memory of 2292 3544 39E7.tmp 104 PID 3544 wrote to memory of 2292 3544 39E7.tmp 104 PID 2292 wrote to memory of 2120 2292 3B00.tmp 105 PID 2292 wrote to memory of 2120 2292 3B00.tmp 105 PID 2292 wrote to memory of 2120 2292 3B00.tmp 105 PID 2120 wrote to memory of 1392 2120 3CF4.tmp 106 PID 2120 wrote to memory of 1392 2120 3CF4.tmp 106 PID 2120 wrote to memory of 1392 2120 3CF4.tmp 106 PID 1392 wrote to memory of 3864 1392 3D91.tmp 107 PID 1392 wrote to memory of 3864 1392 3D91.tmp 107 PID 1392 wrote to memory of 3864 1392 3D91.tmp 107 PID 3864 wrote to memory of 1768 3864 3E6B.tmp 108 PID 3864 wrote to memory of 1768 3864 3E6B.tmp 108 PID 3864 wrote to memory of 1768 3864 3E6B.tmp 108 PID 1768 wrote to memory of 4212 1768 3F75.tmp 109 PID 1768 wrote to memory of 4212 1768 3F75.tmp 109 PID 1768 wrote to memory of 4212 1768 3F75.tmp 109 PID 4212 wrote to memory of 2364 4212 405F.tmp 110 PID 4212 wrote to memory of 2364 4212 405F.tmp 110 PID 4212 wrote to memory of 2364 4212 405F.tmp 110 PID 2364 wrote to memory of 4992 2364 4179.tmp 111 PID 2364 wrote to memory of 4992 2364 4179.tmp 111 PID 2364 wrote to memory of 4992 2364 4179.tmp 111 PID 4992 wrote to memory of 3588 4992 4234.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_09f5bfca5c014327a98ff06b6aa04317_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\2A76.tmp"C:\Users\Admin\AppData\Local\Temp\2A76.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\37E4.tmp"C:\Users\Admin\AppData\Local\Temp\37E4.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\396A.tmp"C:\Users\Admin\AppData\Local\Temp\396A.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\4179.tmp"C:\Users\Admin\AppData\Local\Temp\4179.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\4234.tmp"C:\Users\Admin\AppData\Local\Temp\4234.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"23⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\4496.tmp"C:\Users\Admin\AppData\Local\Temp\4496.tmp"24⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\4580.tmp"C:\Users\Admin\AppData\Local\Temp\4580.tmp"25⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\464B.tmp"C:\Users\Admin\AppData\Local\Temp\464B.tmp"26⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"27⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\4820.tmp"C:\Users\Admin\AppData\Local\Temp\4820.tmp"28⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\4997.tmp"C:\Users\Admin\AppData\Local\Temp\4997.tmp"29⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"30⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"31⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"32⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\4D21.tmp"C:\Users\Admin\AppData\Local\Temp\4D21.tmp"33⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"34⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"35⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\4F73.tmp"C:\Users\Admin\AppData\Local\Temp\4F73.tmp"36⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"37⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\5109.tmp"C:\Users\Admin\AppData\Local\Temp\5109.tmp"38⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\5196.tmp"C:\Users\Admin\AppData\Local\Temp\5196.tmp"39⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"40⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\5399.tmp"C:\Users\Admin\AppData\Local\Temp\5399.tmp"41⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"42⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\54F1.tmp"C:\Users\Admin\AppData\Local\Temp\54F1.tmp"43⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\556E.tmp"C:\Users\Admin\AppData\Local\Temp\556E.tmp"44⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"45⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"46⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\5752.tmp"C:\Users\Admin\AppData\Local\Temp\5752.tmp"47⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\57DF.tmp"C:\Users\Admin\AppData\Local\Temp\57DF.tmp"48⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\588B.tmp"C:\Users\Admin\AppData\Local\Temp\588B.tmp"49⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"50⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"51⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"52⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\5C34.tmp"C:\Users\Admin\AppData\Local\Temp\5C34.tmp"53⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"54⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"55⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\5E19.tmp"C:\Users\Admin\AppData\Local\Temp\5E19.tmp"56⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"57⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"58⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\608A.tmp"C:\Users\Admin\AppData\Local\Temp\608A.tmp"59⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"60⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"61⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"62⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"63⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"64⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\64D0.tmp"C:\Users\Admin\AppData\Local\Temp\64D0.tmp"65⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\655C.tmp"C:\Users\Admin\AppData\Local\Temp\655C.tmp"66⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"67⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\6656.tmp"C:\Users\Admin\AppData\Local\Temp\6656.tmp"68⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\6702.tmp"C:\Users\Admin\AppData\Local\Temp\6702.tmp"69⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\678F.tmp"C:\Users\Admin\AppData\Local\Temp\678F.tmp"70⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\67FC.tmp"C:\Users\Admin\AppData\Local\Temp\67FC.tmp"71⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\6869.tmp"C:\Users\Admin\AppData\Local\Temp\6869.tmp"72⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\68F6.tmp"C:\Users\Admin\AppData\Local\Temp\68F6.tmp"73⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"74⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"75⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"76⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"77⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"78⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\6C32.tmp"C:\Users\Admin\AppData\Local\Temp\6C32.tmp"79⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"80⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\6E45.tmp"C:\Users\Admin\AppData\Local\Temp\6E45.tmp"81⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"82⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"83⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\6FEB.tmp"C:\Users\Admin\AppData\Local\Temp\6FEB.tmp"84⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\7068.tmp"C:\Users\Admin\AppData\Local\Temp\7068.tmp"85⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\70D6.tmp"C:\Users\Admin\AppData\Local\Temp\70D6.tmp"86⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\7172.tmp"C:\Users\Admin\AppData\Local\Temp\7172.tmp"87⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"88⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\72BA.tmp"C:\Users\Admin\AppData\Local\Temp\72BA.tmp"89⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\7356.tmp"C:\Users\Admin\AppData\Local\Temp\7356.tmp"90⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\73D3.tmp"C:\Users\Admin\AppData\Local\Temp\73D3.tmp"91⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\747F.tmp"C:\Users\Admin\AppData\Local\Temp\747F.tmp"92⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"93⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\7598.tmp"C:\Users\Admin\AppData\Local\Temp\7598.tmp"94⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\7625.tmp"C:\Users\Admin\AppData\Local\Temp\7625.tmp"95⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\76E1.tmp"C:\Users\Admin\AppData\Local\Temp\76E1.tmp"96⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"97⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\77CB.tmp"C:\Users\Admin\AppData\Local\Temp\77CB.tmp"98⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\7848.tmp"C:\Users\Admin\AppData\Local\Temp\7848.tmp"99⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\78B5.tmp"C:\Users\Admin\AppData\Local\Temp\78B5.tmp"100⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\7932.tmp"C:\Users\Admin\AppData\Local\Temp\7932.tmp"101⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\79CF.tmp"C:\Users\Admin\AppData\Local\Temp\79CF.tmp"102⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\7A6B.tmp"C:\Users\Admin\AppData\Local\Temp\7A6B.tmp"103⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\7AE8.tmp"C:\Users\Admin\AppData\Local\Temp\7AE8.tmp"104⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\7B65.tmp"C:\Users\Admin\AppData\Local\Temp\7B65.tmp"105⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\7BD2.tmp"C:\Users\Admin\AppData\Local\Temp\7BD2.tmp"106⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"107⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"108⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\7D97.tmp"C:\Users\Admin\AppData\Local\Temp\7D97.tmp"109⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\7E43.tmp"C:\Users\Admin\AppData\Local\Temp\7E43.tmp"110⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"111⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\7F3D.tmp"C:\Users\Admin\AppData\Local\Temp\7F3D.tmp"112⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\7FD9.tmp"C:\Users\Admin\AppData\Local\Temp\7FD9.tmp"113⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\8047.tmp"C:\Users\Admin\AppData\Local\Temp\8047.tmp"114⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\80B4.tmp"C:\Users\Admin\AppData\Local\Temp\80B4.tmp"115⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\8122.tmp"C:\Users\Admin\AppData\Local\Temp\8122.tmp"116⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\81BE.tmp"C:\Users\Admin\AppData\Local\Temp\81BE.tmp"117⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\825A.tmp"C:\Users\Admin\AppData\Local\Temp\825A.tmp"118⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\82C7.tmp"C:\Users\Admin\AppData\Local\Temp\82C7.tmp"119⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\8354.tmp"C:\Users\Admin\AppData\Local\Temp\8354.tmp"120⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\8519.tmp"C:\Users\Admin\AppData\Local\Temp\8519.tmp"121⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\8596.tmp"C:\Users\Admin\AppData\Local\Temp\8596.tmp"122⤵PID:4632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-