Analysis
-
max time kernel
178s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe
-
Size
486KB
-
MD5
ed122ca602c7a6138f88503f335fa50b
-
SHA1
cfde210d79cf7326b2a1caffeee586b9757f83f9
-
SHA256
8ae59e082d3f0fb40570033ecdd3c04f1495770c21a385d178791ddaa35763df
-
SHA512
238661b5df27f152c63a436efc4e4978d6d9b1f4f564af0c054c9032cc6e91dd592f2afe5c15617592cf354c3fb3084e676a861a49a56cc542bafe8a83ae95ca
-
SSDEEP
12288:/U5rCOTeiD6JvNuZ/ibBodTMs/FO6XUhSu5hNZ:/UQOJD6hNuZqVs1u5hN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1284 7CBD.tmp 2592 8690.tmp 3904 8CAB.tmp 2064 8E51.tmp 4692 90A2.tmp 1904 9296.tmp 4020 9546.tmp 4500 97F5.tmp 3868 995D.tmp 5020 9AC4.tmp 1820 9B9F.tmp 2428 9C4B.tmp 3800 9DA2.tmp 4740 9E5E.tmp 4328 9F29.tmp 3068 A0EE.tmp 4844 A275.tmp 2068 A35F.tmp 2300 AC68.tmp 4100 AEF8.tmp 3044 B1E6.tmp 4516 B292.tmp 3912 B34D.tmp 4724 B428.tmp 4720 B66A.tmp 4604 B9E5.tmp 388 BAA0.tmp 2156 BBF8.tmp 5036 BCB4.tmp 4248 BED6.tmp 836 C1A5.tmp 2768 C222.tmp 952 C3F7.tmp 4840 C5FB.tmp 1836 C668.tmp 2144 C6D5.tmp 4216 C7CF.tmp 1840 C9C3.tmp 1508 CA40.tmp 4084 CAAE.tmp 208 CC34.tmp 904 CD6D.tmp 1416 CE96.tmp 808 D0C8.tmp 1636 D29D.tmp 3760 D4A1.tmp 4656 D627.tmp 1932 D6B4.tmp 1808 D83A.tmp 1032 D963.tmp 1708 D9E0.tmp 1072 DB57.tmp 4328 DBE4.tmp 4612 DE16.tmp 3256 DE93.tmp 4372 E068.tmp 3728 E1D0.tmp 2068 E3B4.tmp 3272 E450.tmp 4596 E4BE.tmp 4444 E5F6.tmp 3044 E692.tmp 3472 E78C.tmp 2728 E809.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1284 3232 2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe 92 PID 3232 wrote to memory of 1284 3232 2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe 92 PID 3232 wrote to memory of 1284 3232 2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe 92 PID 1284 wrote to memory of 2592 1284 7CBD.tmp 94 PID 1284 wrote to memory of 2592 1284 7CBD.tmp 94 PID 1284 wrote to memory of 2592 1284 7CBD.tmp 94 PID 2592 wrote to memory of 3904 2592 8690.tmp 95 PID 2592 wrote to memory of 3904 2592 8690.tmp 95 PID 2592 wrote to memory of 3904 2592 8690.tmp 95 PID 3904 wrote to memory of 2064 3904 8CAB.tmp 96 PID 3904 wrote to memory of 2064 3904 8CAB.tmp 96 PID 3904 wrote to memory of 2064 3904 8CAB.tmp 96 PID 2064 wrote to memory of 4692 2064 8E51.tmp 97 PID 2064 wrote to memory of 4692 2064 8E51.tmp 97 PID 2064 wrote to memory of 4692 2064 8E51.tmp 97 PID 4692 wrote to memory of 1904 4692 90A2.tmp 98 PID 4692 wrote to memory of 1904 4692 90A2.tmp 98 PID 4692 wrote to memory of 1904 4692 90A2.tmp 98 PID 1904 wrote to memory of 4020 1904 9296.tmp 99 PID 1904 wrote to memory of 4020 1904 9296.tmp 99 PID 1904 wrote to memory of 4020 1904 9296.tmp 99 PID 4020 wrote to memory of 4500 4020 9546.tmp 100 PID 4020 wrote to memory of 4500 4020 9546.tmp 100 PID 4020 wrote to memory of 4500 4020 9546.tmp 100 PID 4500 wrote to memory of 3868 4500 97F5.tmp 101 PID 4500 wrote to memory of 3868 4500 97F5.tmp 101 PID 4500 wrote to memory of 3868 4500 97F5.tmp 101 PID 3868 wrote to memory of 5020 3868 995D.tmp 102 PID 3868 wrote to memory of 5020 3868 995D.tmp 102 PID 3868 wrote to memory of 5020 3868 995D.tmp 102 PID 5020 wrote to memory of 1820 5020 9AC4.tmp 103 PID 5020 wrote to memory of 1820 5020 9AC4.tmp 103 PID 5020 wrote to memory of 1820 5020 9AC4.tmp 103 PID 1820 wrote to memory of 2428 1820 9B9F.tmp 104 PID 1820 wrote to memory of 2428 1820 9B9F.tmp 104 PID 1820 wrote to memory of 2428 1820 9B9F.tmp 104 PID 2428 wrote to memory of 3800 2428 9C4B.tmp 105 PID 2428 wrote to memory of 3800 2428 9C4B.tmp 105 PID 2428 wrote to memory of 3800 2428 9C4B.tmp 105 PID 3800 wrote to memory of 4740 3800 9DA2.tmp 106 PID 3800 wrote to memory of 4740 3800 9DA2.tmp 106 PID 3800 wrote to memory of 4740 3800 9DA2.tmp 106 PID 4740 wrote to memory of 4328 4740 9E5E.tmp 107 PID 4740 wrote to memory of 4328 4740 9E5E.tmp 107 PID 4740 wrote to memory of 4328 4740 9E5E.tmp 107 PID 4328 wrote to memory of 3068 4328 9F29.tmp 108 PID 4328 wrote to memory of 3068 4328 9F29.tmp 108 PID 4328 wrote to memory of 3068 4328 9F29.tmp 108 PID 3068 wrote to memory of 4844 3068 A0EE.tmp 109 PID 3068 wrote to memory of 4844 3068 A0EE.tmp 109 PID 3068 wrote to memory of 4844 3068 A0EE.tmp 109 PID 4844 wrote to memory of 2068 4844 A275.tmp 110 PID 4844 wrote to memory of 2068 4844 A275.tmp 110 PID 4844 wrote to memory of 2068 4844 A275.tmp 110 PID 2068 wrote to memory of 2300 2068 A35F.tmp 111 PID 2068 wrote to memory of 2300 2068 A35F.tmp 111 PID 2068 wrote to memory of 2300 2068 A35F.tmp 111 PID 2300 wrote to memory of 4100 2300 AC68.tmp 112 PID 2300 wrote to memory of 4100 2300 AC68.tmp 112 PID 2300 wrote to memory of 4100 2300 AC68.tmp 112 PID 4100 wrote to memory of 3044 4100 AEF8.tmp 113 PID 4100 wrote to memory of 3044 4100 AEF8.tmp 113 PID 4100 wrote to memory of 3044 4100 AEF8.tmp 113 PID 3044 wrote to memory of 4516 3044 B1E6.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_ed122ca602c7a6138f88503f335fa50b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\7CBD.tmp"C:\Users\Admin\AppData\Local\Temp\7CBD.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\8690.tmp"C:\Users\Admin\AppData\Local\Temp\8690.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\8E51.tmp"C:\Users\Admin\AppData\Local\Temp\8E51.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\90A2.tmp"C:\Users\Admin\AppData\Local\Temp\90A2.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\9296.tmp"C:\Users\Admin\AppData\Local\Temp\9296.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\9546.tmp"C:\Users\Admin\AppData\Local\Temp\9546.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\97F5.tmp"C:\Users\Admin\AppData\Local\Temp\97F5.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\995D.tmp"C:\Users\Admin\AppData\Local\Temp\995D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\9B9F.tmp"C:\Users\Admin\AppData\Local\Temp\9B9F.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\9DA2.tmp"C:\Users\Admin\AppData\Local\Temp\9DA2.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\9E5E.tmp"C:\Users\Admin\AppData\Local\Temp\9E5E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\9F29.tmp"C:\Users\Admin\AppData\Local\Temp\9F29.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\A0EE.tmp"C:\Users\Admin\AppData\Local\Temp\A0EE.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\A275.tmp"C:\Users\Admin\AppData\Local\Temp\A275.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\A35F.tmp"C:\Users\Admin\AppData\Local\Temp\A35F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\AC68.tmp"C:\Users\Admin\AppData\Local\Temp\AC68.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\AEF8.tmp"C:\Users\Admin\AppData\Local\Temp\AEF8.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\B1E6.tmp"C:\Users\Admin\AppData\Local\Temp\B1E6.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\B292.tmp"C:\Users\Admin\AppData\Local\Temp\B292.tmp"23⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\B34D.tmp"C:\Users\Admin\AppData\Local\Temp\B34D.tmp"24⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\B428.tmp"C:\Users\Admin\AppData\Local\Temp\B428.tmp"25⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\B66A.tmp"C:\Users\Admin\AppData\Local\Temp\B66A.tmp"26⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\B9E5.tmp"C:\Users\Admin\AppData\Local\Temp\B9E5.tmp"27⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\BAA0.tmp"C:\Users\Admin\AppData\Local\Temp\BAA0.tmp"28⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\BBF8.tmp"C:\Users\Admin\AppData\Local\Temp\BBF8.tmp"29⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\BCB4.tmp"C:\Users\Admin\AppData\Local\Temp\BCB4.tmp"30⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\BED6.tmp"C:\Users\Admin\AppData\Local\Temp\BED6.tmp"31⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\C1A5.tmp"C:\Users\Admin\AppData\Local\Temp\C1A5.tmp"32⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\C222.tmp"C:\Users\Admin\AppData\Local\Temp\C222.tmp"33⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\C3F7.tmp"C:\Users\Admin\AppData\Local\Temp\C3F7.tmp"34⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\C5FB.tmp"C:\Users\Admin\AppData\Local\Temp\C5FB.tmp"35⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\C668.tmp"C:\Users\Admin\AppData\Local\Temp\C668.tmp"36⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\C6D5.tmp"C:\Users\Admin\AppData\Local\Temp\C6D5.tmp"37⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\C7CF.tmp"C:\Users\Admin\AppData\Local\Temp\C7CF.tmp"38⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\C9C3.tmp"C:\Users\Admin\AppData\Local\Temp\C9C3.tmp"39⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\CA40.tmp"C:\Users\Admin\AppData\Local\Temp\CA40.tmp"40⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\CAAE.tmp"C:\Users\Admin\AppData\Local\Temp\CAAE.tmp"41⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\CC34.tmp"C:\Users\Admin\AppData\Local\Temp\CC34.tmp"42⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\CD6D.tmp"C:\Users\Admin\AppData\Local\Temp\CD6D.tmp"43⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\CE96.tmp"C:\Users\Admin\AppData\Local\Temp\CE96.tmp"44⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\D0C8.tmp"C:\Users\Admin\AppData\Local\Temp\D0C8.tmp"45⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\D29D.tmp"C:\Users\Admin\AppData\Local\Temp\D29D.tmp"46⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\D4A1.tmp"C:\Users\Admin\AppData\Local\Temp\D4A1.tmp"47⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\D627.tmp"C:\Users\Admin\AppData\Local\Temp\D627.tmp"48⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\D6B4.tmp"C:\Users\Admin\AppData\Local\Temp\D6B4.tmp"49⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\D83A.tmp"C:\Users\Admin\AppData\Local\Temp\D83A.tmp"50⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\D963.tmp"C:\Users\Admin\AppData\Local\Temp\D963.tmp"51⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\D9E0.tmp"C:\Users\Admin\AppData\Local\Temp\D9E0.tmp"52⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\DB57.tmp"C:\Users\Admin\AppData\Local\Temp\DB57.tmp"53⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\DBE4.tmp"C:\Users\Admin\AppData\Local\Temp\DBE4.tmp"54⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\DE16.tmp"C:\Users\Admin\AppData\Local\Temp\DE16.tmp"55⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\DE93.tmp"C:\Users\Admin\AppData\Local\Temp\DE93.tmp"56⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\E068.tmp"C:\Users\Admin\AppData\Local\Temp\E068.tmp"57⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\E1D0.tmp"C:\Users\Admin\AppData\Local\Temp\E1D0.tmp"58⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\E3B4.tmp"C:\Users\Admin\AppData\Local\Temp\E3B4.tmp"59⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\E450.tmp"C:\Users\Admin\AppData\Local\Temp\E450.tmp"60⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\E4BE.tmp"C:\Users\Admin\AppData\Local\Temp\E4BE.tmp"61⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\E5F6.tmp"C:\Users\Admin\AppData\Local\Temp\E5F6.tmp"62⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\E692.tmp"C:\Users\Admin\AppData\Local\Temp\E692.tmp"63⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\E78C.tmp"C:\Users\Admin\AppData\Local\Temp\E78C.tmp"64⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\E809.tmp"C:\Users\Admin\AppData\Local\Temp\E809.tmp"65⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\E932.tmp"C:\Users\Admin\AppData\Local\Temp\E932.tmp"66⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\EA0D.tmp"C:\Users\Admin\AppData\Local\Temp\EA0D.tmp"67⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\EAB9.tmp"C:\Users\Admin\AppData\Local\Temp\EAB9.tmp"68⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\EB26.tmp"C:\Users\Admin\AppData\Local\Temp\EB26.tmp"69⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\ED2A.tmp"C:\Users\Admin\AppData\Local\Temp\ED2A.tmp"70⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\ED97.tmp"C:\Users\Admin\AppData\Local\Temp\ED97.tmp"71⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\EE14.tmp"C:\Users\Admin\AppData\Local\Temp\EE14.tmp"72⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"73⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\F131.tmp"C:\Users\Admin\AppData\Local\Temp\F131.tmp"74⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\F1BE.tmp"C:\Users\Admin\AppData\Local\Temp\F1BE.tmp"75⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\F23B.tmp"C:\Users\Admin\AppData\Local\Temp\F23B.tmp"76⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\F392.tmp"C:\Users\Admin\AppData\Local\Temp\F392.tmp"77⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\F400.tmp"C:\Users\Admin\AppData\Local\Temp\F400.tmp"78⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\F6A0.tmp"C:\Users\Admin\AppData\Local\Temp\F6A0.tmp"79⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\F73C.tmp"C:\Users\Admin\AppData\Local\Temp\F73C.tmp"80⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\F884.tmp"C:\Users\Admin\AppData\Local\Temp\F884.tmp"81⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\F911.tmp"C:\Users\Admin\AppData\Local\Temp\F911.tmp"82⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\F99D.tmp"C:\Users\Admin\AppData\Local\Temp\F99D.tmp"83⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\FB72.tmp"C:\Users\Admin\AppData\Local\Temp\FB72.tmp"84⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\1FA.tmp"C:\Users\Admin\AppData\Local\Temp\1FA.tmp"85⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\277.tmp"C:\Users\Admin\AppData\Local\Temp\277.tmp"86⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\381.tmp"C:\Users\Admin\AppData\Local\Temp\381.tmp"87⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\536.tmp"C:\Users\Admin\AppData\Local\Temp\536.tmp"88⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\9DA.tmp"C:\Users\Admin\AppData\Local\Temp\9DA.tmp"89⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\A66.tmp"C:\Users\Admin\AppData\Local\Temp\A66.tmp"90⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\E8D.tmp"C:\Users\Admin\AppData\Local\Temp\E8D.tmp"91⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\FC5.tmp"C:\Users\Admin\AppData\Local\Temp\FC5.tmp"92⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\1033.tmp"C:\Users\Admin\AppData\Local\Temp\1033.tmp"93⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\10CF.tmp"C:\Users\Admin\AppData\Local\Temp\10CF.tmp"94⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\12B3.tmp"C:\Users\Admin\AppData\Local\Temp\12B3.tmp"95⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\167C.tmp"C:\Users\Admin\AppData\Local\Temp\167C.tmp"96⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\1786.tmp"C:\Users\Admin\AppData\Local\Temp\1786.tmp"97⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\1812.tmp"C:\Users\Admin\AppData\Local\Temp\1812.tmp"98⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\188F.tmp"C:\Users\Admin\AppData\Local\Temp\188F.tmp"99⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\1A54.tmp"C:\Users\Admin\AppData\Local\Temp\1A54.tmp"100⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\1AC2.tmp"C:\Users\Admin\AppData\Local\Temp\1AC2.tmp"101⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\1D62.tmp"C:\Users\Admin\AppData\Local\Temp\1D62.tmp"102⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\1DEE.tmp"C:\Users\Admin\AppData\Local\Temp\1DEE.tmp"103⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\1E7B.tmp"C:\Users\Admin\AppData\Local\Temp\1E7B.tmp"104⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\1F17.tmp"C:\Users\Admin\AppData\Local\Temp\1F17.tmp"105⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2001.tmp"C:\Users\Admin\AppData\Local\Temp\2001.tmp"106⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\209E.tmp"C:\Users\Admin\AppData\Local\Temp\209E.tmp"107⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\2224.tmp"C:\Users\Admin\AppData\Local\Temp\2224.tmp"108⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\22C1.tmp"C:\Users\Admin\AppData\Local\Temp\22C1.tmp"109⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\23CA.tmp"C:\Users\Admin\AppData\Local\Temp\23CA.tmp"110⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2438.tmp"C:\Users\Admin\AppData\Local\Temp\2438.tmp"111⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\24A5.tmp"C:\Users\Admin\AppData\Local\Temp\24A5.tmp"112⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2512.tmp"C:\Users\Admin\AppData\Local\Temp\2512.tmp"113⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\25FD.tmp"C:\Users\Admin\AppData\Local\Temp\25FD.tmp"114⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\2929.tmp"C:\Users\Admin\AppData\Local\Temp\2929.tmp"115⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\29C5.tmp"C:\Users\Admin\AppData\Local\Temp\29C5.tmp"116⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\2B0E.tmp"C:\Users\Admin\AppData\Local\Temp\2B0E.tmp"117⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\2B9A.tmp"C:\Users\Admin\AppData\Local\Temp\2B9A.tmp"118⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2C27.tmp"C:\Users\Admin\AppData\Local\Temp\2C27.tmp"119⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\2CA4.tmp"C:\Users\Admin\AppData\Local\Temp\2CA4.tmp"120⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\2E2A.tmp"C:\Users\Admin\AppData\Local\Temp\2E2A.tmp"121⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\308C.tmp"C:\Users\Admin\AppData\Local\Temp\308C.tmp"122⤵PID:3212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-