Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 12:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe
-
Size
486KB
-
MD5
c38910a0ffa1de4a590a8b776cc98a99
-
SHA1
c3b7a2c0c80fb13f6cefce1cfa5cf0fedb53133f
-
SHA256
5609d26de4460e928468d41c65d9cb39c30b3c65617b5c3a1d8ce3326fb934c1
-
SHA512
28987285707d4a0a7699fa2d8c8fd5c492fad93e4aaaa201dabed7b5b2be68a30764f8f3b04b7cdf880fa037365164e48b2309950aca765a09612daf959c0855
-
SSDEEP
12288:UU5rCOTeiDpKYOQEtgd2YBvrwrm0zP0bM6NZ:UUQOJDpKY++2YBzwa0zPSN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3344 1047.tmp 1516 1279.tmp 2588 147D.tmp 1376 15C5.tmp 4804 16BF.tmp 4124 17C9.tmp 4108 18D2.tmp 4704 199E.tmp 432 1A88.tmp 4900 1BA1.tmp 936 1C7C.tmp 3320 1DA5.tmp 716 1ECE.tmp 2524 2006.tmp 2932 20D1.tmp 1812 219C.tmp 684 2296.tmp 1692 23B0.tmp 2432 245C.tmp 2056 2536.tmp 1752 2611.tmp 4668 26FB.tmp 400 28EF.tmp 996 298C.tmp 1616 2A86.tmp 2212 2B60.tmp 3896 2BFD.tmp 3816 2CF7.tmp 2828 2DC2.tmp 3964 2E4E.tmp 3984 2F1A.tmp 3844 2FD5.tmp 2820 30B0.tmp 4788 31C9.tmp 3936 3275.tmp 4800 3330.tmp 4600 33EC.tmp 1632 3488.tmp 1512 3534.tmp 3128 35D0.tmp 2484 365D.tmp 4044 36DA.tmp 2532 3767.tmp 3048 37F3.tmp 4268 388F.tmp 3556 392C.tmp 2744 39C8.tmp 2600 3A64.tmp 4056 3AF1.tmp 4116 3B6E.tmp 1356 3C1A.tmp 4704 3CA6.tmp 1392 3D43.tmp 4472 3DC0.tmp 448 3E3D.tmp 5104 3ED9.tmp 2960 3F65.tmp 640 4011.tmp 3160 407F.tmp 2524 40FC.tmp 4676 4198.tmp 1868 4225.tmp 1732 4292.tmp 1684 432E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3344 1596 2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe 92 PID 1596 wrote to memory of 3344 1596 2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe 92 PID 1596 wrote to memory of 3344 1596 2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe 92 PID 3344 wrote to memory of 1516 3344 1047.tmp 93 PID 3344 wrote to memory of 1516 3344 1047.tmp 93 PID 3344 wrote to memory of 1516 3344 1047.tmp 93 PID 1516 wrote to memory of 2588 1516 1279.tmp 94 PID 1516 wrote to memory of 2588 1516 1279.tmp 94 PID 1516 wrote to memory of 2588 1516 1279.tmp 94 PID 2588 wrote to memory of 1376 2588 147D.tmp 95 PID 2588 wrote to memory of 1376 2588 147D.tmp 95 PID 2588 wrote to memory of 1376 2588 147D.tmp 95 PID 1376 wrote to memory of 4804 1376 15C5.tmp 96 PID 1376 wrote to memory of 4804 1376 15C5.tmp 96 PID 1376 wrote to memory of 4804 1376 15C5.tmp 96 PID 4804 wrote to memory of 4124 4804 16BF.tmp 97 PID 4804 wrote to memory of 4124 4804 16BF.tmp 97 PID 4804 wrote to memory of 4124 4804 16BF.tmp 97 PID 4124 wrote to memory of 4108 4124 17C9.tmp 98 PID 4124 wrote to memory of 4108 4124 17C9.tmp 98 PID 4124 wrote to memory of 4108 4124 17C9.tmp 98 PID 4108 wrote to memory of 4704 4108 18D2.tmp 99 PID 4108 wrote to memory of 4704 4108 18D2.tmp 99 PID 4108 wrote to memory of 4704 4108 18D2.tmp 99 PID 4704 wrote to memory of 432 4704 199E.tmp 100 PID 4704 wrote to memory of 432 4704 199E.tmp 100 PID 4704 wrote to memory of 432 4704 199E.tmp 100 PID 432 wrote to memory of 4900 432 1A88.tmp 101 PID 432 wrote to memory of 4900 432 1A88.tmp 101 PID 432 wrote to memory of 4900 432 1A88.tmp 101 PID 4900 wrote to memory of 936 4900 1BA1.tmp 102 PID 4900 wrote to memory of 936 4900 1BA1.tmp 102 PID 4900 wrote to memory of 936 4900 1BA1.tmp 102 PID 936 wrote to memory of 3320 936 1C7C.tmp 103 PID 936 wrote to memory of 3320 936 1C7C.tmp 103 PID 936 wrote to memory of 3320 936 1C7C.tmp 103 PID 3320 wrote to memory of 716 3320 1DA5.tmp 104 PID 3320 wrote to memory of 716 3320 1DA5.tmp 104 PID 3320 wrote to memory of 716 3320 1DA5.tmp 104 PID 716 wrote to memory of 2524 716 1ECE.tmp 105 PID 716 wrote to memory of 2524 716 1ECE.tmp 105 PID 716 wrote to memory of 2524 716 1ECE.tmp 105 PID 2524 wrote to memory of 2932 2524 2006.tmp 106 PID 2524 wrote to memory of 2932 2524 2006.tmp 106 PID 2524 wrote to memory of 2932 2524 2006.tmp 106 PID 2932 wrote to memory of 1812 2932 20D1.tmp 107 PID 2932 wrote to memory of 1812 2932 20D1.tmp 107 PID 2932 wrote to memory of 1812 2932 20D1.tmp 107 PID 1812 wrote to memory of 684 1812 219C.tmp 108 PID 1812 wrote to memory of 684 1812 219C.tmp 108 PID 1812 wrote to memory of 684 1812 219C.tmp 108 PID 684 wrote to memory of 1692 684 2296.tmp 109 PID 684 wrote to memory of 1692 684 2296.tmp 109 PID 684 wrote to memory of 1692 684 2296.tmp 109 PID 1692 wrote to memory of 2432 1692 23B0.tmp 110 PID 1692 wrote to memory of 2432 1692 23B0.tmp 110 PID 1692 wrote to memory of 2432 1692 23B0.tmp 110 PID 2432 wrote to memory of 2056 2432 245C.tmp 111 PID 2432 wrote to memory of 2056 2432 245C.tmp 111 PID 2432 wrote to memory of 2056 2432 245C.tmp 111 PID 2056 wrote to memory of 1752 2056 2536.tmp 112 PID 2056 wrote to memory of 1752 2056 2536.tmp 112 PID 2056 wrote to memory of 1752 2056 2536.tmp 112 PID 1752 wrote to memory of 4668 1752 2611.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-16_c38910a0ffa1de4a590a8b776cc98a99_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\1047.tmp"C:\Users\Admin\AppData\Local\Temp\1047.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\1279.tmp"C:\Users\Admin\AppData\Local\Temp\1279.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\16BF.tmp"C:\Users\Admin\AppData\Local\Temp\16BF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\17C9.tmp"C:\Users\Admin\AppData\Local\Temp\17C9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\1A88.tmp"C:\Users\Admin\AppData\Local\Temp\1A88.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\1BA1.tmp"C:\Users\Admin\AppData\Local\Temp\1BA1.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\2006.tmp"C:\Users\Admin\AppData\Local\Temp\2006.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\23B0.tmp"C:\Users\Admin\AppData\Local\Temp\23B0.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\245C.tmp"C:\Users\Admin\AppData\Local\Temp\245C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\2611.tmp"C:\Users\Admin\AppData\Local\Temp\2611.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\26FB.tmp"C:\Users\Admin\AppData\Local\Temp\26FB.tmp"23⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"24⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"25⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\2A86.tmp"C:\Users\Admin\AppData\Local\Temp\2A86.tmp"26⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\2B60.tmp"C:\Users\Admin\AppData\Local\Temp\2B60.tmp"27⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"28⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"29⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"30⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"31⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"32⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"33⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"34⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"35⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"36⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"37⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"38⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"39⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"40⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"41⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"42⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"43⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"44⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"45⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\388F.tmp"C:\Users\Admin\AppData\Local\Temp\388F.tmp"46⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"47⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\39C8.tmp"C:\Users\Admin\AppData\Local\Temp\39C8.tmp"48⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"49⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"50⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"51⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"52⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"53⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"54⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"55⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"C:\Users\Admin\AppData\Local\Temp\3E3D.tmp"56⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"57⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"58⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"59⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"60⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"61⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\4198.tmp"C:\Users\Admin\AppData\Local\Temp\4198.tmp"62⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\4225.tmp"C:\Users\Admin\AppData\Local\Temp\4225.tmp"63⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\4292.tmp"C:\Users\Admin\AppData\Local\Temp\4292.tmp"64⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"65⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"66⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"67⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\44A5.tmp"C:\Users\Admin\AppData\Local\Temp\44A5.tmp"68⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"69⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\45ED.tmp"C:\Users\Admin\AppData\Local\Temp\45ED.tmp"70⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\465B.tmp"C:\Users\Admin\AppData\Local\Temp\465B.tmp"71⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"72⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"73⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"74⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\48EB.tmp"C:\Users\Admin\AppData\Local\Temp\48EB.tmp"75⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"76⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"77⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"78⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"79⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"80⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\4C27.tmp"C:\Users\Admin\AppData\Local\Temp\4C27.tmp"81⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"82⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\4D40.tmp"C:\Users\Admin\AppData\Local\Temp\4D40.tmp"83⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\4DDD.tmp"C:\Users\Admin\AppData\Local\Temp\4DDD.tmp"84⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\4E79.tmp"C:\Users\Admin\AppData\Local\Temp\4E79.tmp"85⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"86⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"87⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\501F.tmp"C:\Users\Admin\AppData\Local\Temp\501F.tmp"88⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\509C.tmp"C:\Users\Admin\AppData\Local\Temp\509C.tmp"89⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"90⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"91⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\529F.tmp"C:\Users\Admin\AppData\Local\Temp\529F.tmp"92⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\535B.tmp"C:\Users\Admin\AppData\Local\Temp\535B.tmp"93⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\53E7.tmp"C:\Users\Admin\AppData\Local\Temp\53E7.tmp"94⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"95⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"96⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\55AD.tmp"C:\Users\Admin\AppData\Local\Temp\55AD.tmp"97⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\562A.tmp"C:\Users\Admin\AppData\Local\Temp\562A.tmp"98⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"99⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\5733.tmp"C:\Users\Admin\AppData\Local\Temp\5733.tmp"100⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\57DF.tmp"C:\Users\Admin\AppData\Local\Temp\57DF.tmp"101⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"102⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\5918.tmp"C:\Users\Admin\AppData\Local\Temp\5918.tmp"103⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\5995.tmp"C:\Users\Admin\AppData\Local\Temp\5995.tmp"104⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\5A21.tmp"C:\Users\Admin\AppData\Local\Temp\5A21.tmp"105⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"106⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"107⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\5C06.tmp"C:\Users\Admin\AppData\Local\Temp\5C06.tmp"108⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"109⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"110⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"111⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\5E19.tmp"C:\Users\Admin\AppData\Local\Temp\5E19.tmp"112⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"113⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\5F22.tmp"C:\Users\Admin\AppData\Local\Temp\5F22.tmp"114⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"115⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\603C.tmp"C:\Users\Admin\AppData\Local\Temp\603C.tmp"116⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\60C8.tmp"C:\Users\Admin\AppData\Local\Temp\60C8.tmp"117⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"118⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"119⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\626E.tmp"C:\Users\Admin\AppData\Local\Temp\626E.tmp"120⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"121⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"122⤵PID:2088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-