Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe
-
Size
765KB
-
MD5
9c7539e332e2e80e003a78910e17e54f
-
SHA1
c6a2bd18db7463f2e161be5a07b2e529edea1b31
-
SHA256
18ad451d87b9627a0659f30d5bd6f996cf71730b0217ef122022f1792ce60351
-
SHA512
c84bc997c0aa74197acb95399ded8578d168d8aac299f1729bab940238820fbdcd0b9b294a683a3c531b110618a94a50787845089f0e7759f2a502bdcccc1fd8
-
SSDEEP
12288:ZU5rCOTeiDhgk27Om3gpWlgTPDb3ZF5rn5rLOa54U5w5A:ZUQOJDGkKUH3vh5Oa+UOS
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1076 6230.tmp 660 684A.tmp 3564 6963.tmp 952 6C23.tmp 796 6EE2.tmp 4888 7105.tmp 456 7395.tmp 4956 74FC.tmp 1540 779C.tmp 1012 7990.tmp 3708 7AA9.tmp 4300 7D0B.tmp 2776 7E91.tmp 4716 80F3.tmp 4544 820C.tmp 1196 841F.tmp 2284 84FA.tmp 928 87E8.tmp 4568 88F2.tmp 2988 8A69.tmp 3120 8B63.tmp 4580 8C1E.tmp 5024 8E9F.tmp 4036 8F89.tmp 3228 92F4.tmp 1188 943C.tmp 3324 9555.tmp 1700 9AC4.tmp 1948 9D54.tmp 2444 9E6E.tmp 3940 A071.tmp 2220 A13C.tmp 2068 A246.tmp 2320 A3FB.tmp 3500 A505.tmp 3680 A5E0.tmp 4988 A67C.tmp 3096 A91C.tmp 212 A9B8.tmp 852 AA64.tmp 3780 AB00.tmp 2096 ACE5.tmp 1540 AD91.tmp 2556 AE1D.tmp 3320 AEF8.tmp 4180 B011.tmp 880 B1B7.tmp 2132 B2A1.tmp 4716 B33E.tmp 1828 B3DA.tmp 1260 B4E4.tmp 1584 B5AF.tmp 2284 B62C.tmp 2300 B6B8.tmp 4872 B726.tmp 892 B793.tmp 4012 B8BC.tmp 3244 BA23.tmp 2696 BADF.tmp 3120 BB8B.tmp 536 BC27.tmp 4188 BD31.tmp 4728 BEC7.tmp 4948 BF73.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1076 3280 2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe 94 PID 3280 wrote to memory of 1076 3280 2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe 94 PID 3280 wrote to memory of 1076 3280 2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe 94 PID 1076 wrote to memory of 660 1076 6230.tmp 95 PID 1076 wrote to memory of 660 1076 6230.tmp 95 PID 1076 wrote to memory of 660 1076 6230.tmp 95 PID 660 wrote to memory of 3564 660 684A.tmp 97 PID 660 wrote to memory of 3564 660 684A.tmp 97 PID 660 wrote to memory of 3564 660 684A.tmp 97 PID 3564 wrote to memory of 952 3564 6963.tmp 98 PID 3564 wrote to memory of 952 3564 6963.tmp 98 PID 3564 wrote to memory of 952 3564 6963.tmp 98 PID 952 wrote to memory of 796 952 6C23.tmp 99 PID 952 wrote to memory of 796 952 6C23.tmp 99 PID 952 wrote to memory of 796 952 6C23.tmp 99 PID 796 wrote to memory of 4888 796 6EE2.tmp 100 PID 796 wrote to memory of 4888 796 6EE2.tmp 100 PID 796 wrote to memory of 4888 796 6EE2.tmp 100 PID 4888 wrote to memory of 456 4888 7105.tmp 101 PID 4888 wrote to memory of 456 4888 7105.tmp 101 PID 4888 wrote to memory of 456 4888 7105.tmp 101 PID 456 wrote to memory of 4956 456 7395.tmp 102 PID 456 wrote to memory of 4956 456 7395.tmp 102 PID 456 wrote to memory of 4956 456 7395.tmp 102 PID 4956 wrote to memory of 1540 4956 74FC.tmp 103 PID 4956 wrote to memory of 1540 4956 74FC.tmp 103 PID 4956 wrote to memory of 1540 4956 74FC.tmp 103 PID 1540 wrote to memory of 1012 1540 779C.tmp 104 PID 1540 wrote to memory of 1012 1540 779C.tmp 104 PID 1540 wrote to memory of 1012 1540 779C.tmp 104 PID 1012 wrote to memory of 3708 1012 7990.tmp 105 PID 1012 wrote to memory of 3708 1012 7990.tmp 105 PID 1012 wrote to memory of 3708 1012 7990.tmp 105 PID 3708 wrote to memory of 4300 3708 7AA9.tmp 106 PID 3708 wrote to memory of 4300 3708 7AA9.tmp 106 PID 3708 wrote to memory of 4300 3708 7AA9.tmp 106 PID 4300 wrote to memory of 2776 4300 7D0B.tmp 107 PID 4300 wrote to memory of 2776 4300 7D0B.tmp 107 PID 4300 wrote to memory of 2776 4300 7D0B.tmp 107 PID 2776 wrote to memory of 4716 2776 7E91.tmp 108 PID 2776 wrote to memory of 4716 2776 7E91.tmp 108 PID 2776 wrote to memory of 4716 2776 7E91.tmp 108 PID 4716 wrote to memory of 4544 4716 80F3.tmp 109 PID 4716 wrote to memory of 4544 4716 80F3.tmp 109 PID 4716 wrote to memory of 4544 4716 80F3.tmp 109 PID 4544 wrote to memory of 1196 4544 820C.tmp 110 PID 4544 wrote to memory of 1196 4544 820C.tmp 110 PID 4544 wrote to memory of 1196 4544 820C.tmp 110 PID 1196 wrote to memory of 2284 1196 841F.tmp 111 PID 1196 wrote to memory of 2284 1196 841F.tmp 111 PID 1196 wrote to memory of 2284 1196 841F.tmp 111 PID 2284 wrote to memory of 928 2284 84FA.tmp 112 PID 2284 wrote to memory of 928 2284 84FA.tmp 112 PID 2284 wrote to memory of 928 2284 84FA.tmp 112 PID 928 wrote to memory of 4568 928 87E8.tmp 114 PID 928 wrote to memory of 4568 928 87E8.tmp 114 PID 928 wrote to memory of 4568 928 87E8.tmp 114 PID 4568 wrote to memory of 2988 4568 88F2.tmp 115 PID 4568 wrote to memory of 2988 4568 88F2.tmp 115 PID 4568 wrote to memory of 2988 4568 88F2.tmp 115 PID 2988 wrote to memory of 3120 2988 8A69.tmp 116 PID 2988 wrote to memory of 3120 2988 8A69.tmp 116 PID 2988 wrote to memory of 3120 2988 8A69.tmp 116 PID 3120 wrote to memory of 4580 3120 8B63.tmp 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_9c7539e332e2e80e003a78910e17e54f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\684A.tmp"C:\Users\Admin\AppData\Local\Temp\684A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\6963.tmp"C:\Users\Admin\AppData\Local\Temp\6963.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\6C23.tmp"C:\Users\Admin\AppData\Local\Temp\6C23.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\7105.tmp"C:\Users\Admin\AppData\Local\Temp\7105.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\74FC.tmp"C:\Users\Admin\AppData\Local\Temp\74FC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\779C.tmp"C:\Users\Admin\AppData\Local\Temp\779C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\7990.tmp"C:\Users\Admin\AppData\Local\Temp\7990.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\7E91.tmp"C:\Users\Admin\AppData\Local\Temp\7E91.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\80F3.tmp"C:\Users\Admin\AppData\Local\Temp\80F3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\820C.tmp"C:\Users\Admin\AppData\Local\Temp\820C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\84FA.tmp"C:\Users\Admin\AppData\Local\Temp\84FA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\87E8.tmp"C:\Users\Admin\AppData\Local\Temp\87E8.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\88F2.tmp"C:\Users\Admin\AppData\Local\Temp\88F2.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\8A69.tmp"C:\Users\Admin\AppData\Local\Temp\8A69.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\8B63.tmp"C:\Users\Admin\AppData\Local\Temp\8B63.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\8C1E.tmp"C:\Users\Admin\AppData\Local\Temp\8C1E.tmp"23⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\8E9F.tmp"C:\Users\Admin\AppData\Local\Temp\8E9F.tmp"24⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\8F89.tmp"C:\Users\Admin\AppData\Local\Temp\8F89.tmp"25⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\92F4.tmp"C:\Users\Admin\AppData\Local\Temp\92F4.tmp"26⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\943C.tmp"C:\Users\Admin\AppData\Local\Temp\943C.tmp"27⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\9555.tmp"C:\Users\Admin\AppData\Local\Temp\9555.tmp"28⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"29⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\9D54.tmp"C:\Users\Admin\AppData\Local\Temp\9D54.tmp"30⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\9E6E.tmp"C:\Users\Admin\AppData\Local\Temp\9E6E.tmp"31⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\A071.tmp"C:\Users\Admin\AppData\Local\Temp\A071.tmp"32⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\A13C.tmp"C:\Users\Admin\AppData\Local\Temp\A13C.tmp"33⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\A246.tmp"C:\Users\Admin\AppData\Local\Temp\A246.tmp"34⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"35⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\A505.tmp"C:\Users\Admin\AppData\Local\Temp\A505.tmp"36⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"37⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\A67C.tmp"C:\Users\Admin\AppData\Local\Temp\A67C.tmp"38⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\A91C.tmp"C:\Users\Admin\AppData\Local\Temp\A91C.tmp"39⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\A9B8.tmp"C:\Users\Admin\AppData\Local\Temp\A9B8.tmp"40⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\AA64.tmp"C:\Users\Admin\AppData\Local\Temp\AA64.tmp"41⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\AB00.tmp"C:\Users\Admin\AppData\Local\Temp\AB00.tmp"42⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"43⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\AD91.tmp"C:\Users\Admin\AppData\Local\Temp\AD91.tmp"44⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\AE1D.tmp"C:\Users\Admin\AppData\Local\Temp\AE1D.tmp"45⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\AEF8.tmp"C:\Users\Admin\AppData\Local\Temp\AEF8.tmp"46⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\B011.tmp"C:\Users\Admin\AppData\Local\Temp\B011.tmp"47⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\B1B7.tmp"C:\Users\Admin\AppData\Local\Temp\B1B7.tmp"48⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"49⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\B33E.tmp"C:\Users\Admin\AppData\Local\Temp\B33E.tmp"50⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\B3DA.tmp"C:\Users\Admin\AppData\Local\Temp\B3DA.tmp"51⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\B4E4.tmp"C:\Users\Admin\AppData\Local\Temp\B4E4.tmp"52⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\B5AF.tmp"C:\Users\Admin\AppData\Local\Temp\B5AF.tmp"53⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\B62C.tmp"C:\Users\Admin\AppData\Local\Temp\B62C.tmp"54⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\B6B8.tmp"C:\Users\Admin\AppData\Local\Temp\B6B8.tmp"55⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\B726.tmp"C:\Users\Admin\AppData\Local\Temp\B726.tmp"56⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\B793.tmp"C:\Users\Admin\AppData\Local\Temp\B793.tmp"57⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"58⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\BA23.tmp"C:\Users\Admin\AppData\Local\Temp\BA23.tmp"59⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\BADF.tmp"C:\Users\Admin\AppData\Local\Temp\BADF.tmp"60⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\BB8B.tmp"C:\Users\Admin\AppData\Local\Temp\BB8B.tmp"61⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\BC27.tmp"C:\Users\Admin\AppData\Local\Temp\BC27.tmp"62⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\BD31.tmp"C:\Users\Admin\AppData\Local\Temp\BD31.tmp"63⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\BEC7.tmp"C:\Users\Admin\AppData\Local\Temp\BEC7.tmp"64⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\BF73.tmp"C:\Users\Admin\AppData\Local\Temp\BF73.tmp"65⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\BFE0.tmp"C:\Users\Admin\AppData\Local\Temp\BFE0.tmp"66⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\C147.tmp"C:\Users\Admin\AppData\Local\Temp\C147.tmp"67⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\C1D4.tmp"C:\Users\Admin\AppData\Local\Temp\C1D4.tmp"68⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\C261.tmp"C:\Users\Admin\AppData\Local\Temp\C261.tmp"69⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\C32C.tmp"C:\Users\Admin\AppData\Local\Temp\C32C.tmp"70⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\C3B8.tmp"C:\Users\Admin\AppData\Local\Temp\C3B8.tmp"71⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\C60A.tmp"C:\Users\Admin\AppData\Local\Temp\C60A.tmp"72⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\C733.tmp"C:\Users\Admin\AppData\Local\Temp\C733.tmp"73⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\C7EF.tmp"C:\Users\Admin\AppData\Local\Temp\C7EF.tmp"74⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\CA02.tmp"C:\Users\Admin\AppData\Local\Temp\CA02.tmp"75⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\CA8E.tmp"C:\Users\Admin\AppData\Local\Temp\CA8E.tmp"76⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\CB4A.tmp"C:\Users\Admin\AppData\Local\Temp\CB4A.tmp"77⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\CC92.tmp"C:\Users\Admin\AppData\Local\Temp\CC92.tmp"78⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\CD3E.tmp"C:\Users\Admin\AppData\Local\Temp\CD3E.tmp"79⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\CDF9.tmp"C:\Users\Admin\AppData\Local\Temp\CDF9.tmp"80⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\CF61.tmp"C:\Users\Admin\AppData\Local\Temp\CF61.tmp"81⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\CFDE.tmp"C:\Users\Admin\AppData\Local\Temp\CFDE.tmp"82⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\D155.tmp"C:\Users\Admin\AppData\Local\Temp\D155.tmp"83⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\D1F1.tmp"C:\Users\Admin\AppData\Local\Temp\D1F1.tmp"84⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\D2AD.tmp"C:\Users\Admin\AppData\Local\Temp\D2AD.tmp"85⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\D349.tmp"C:\Users\Admin\AppData\Local\Temp\D349.tmp"86⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\D443.tmp"C:\Users\Admin\AppData\Local\Temp\D443.tmp"87⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"88⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\D55C.tmp"C:\Users\Admin\AppData\Local\Temp\D55C.tmp"89⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\D740.tmp"C:\Users\Admin\AppData\Local\Temp\D740.tmp"90⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\D7CD.tmp"C:\Users\Admin\AppData\Local\Temp\D7CD.tmp"91⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\D869.tmp"C:\Users\Admin\AppData\Local\Temp\D869.tmp"92⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\D9D1.tmp"C:\Users\Admin\AppData\Local\Temp\D9D1.tmp"93⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\DA6D.tmp"C:\Users\Admin\AppData\Local\Temp\DA6D.tmp"94⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\DBE4.tmp"C:\Users\Admin\AppData\Local\Temp\DBE4.tmp"95⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\DC90.tmp"C:\Users\Admin\AppData\Local\Temp\DC90.tmp"96⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\DD2C.tmp"C:\Users\Admin\AppData\Local\Temp\DD2C.tmp"97⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\DE74.tmp"C:\Users\Admin\AppData\Local\Temp\DE74.tmp"98⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\DF01.tmp"C:\Users\Admin\AppData\Local\Temp\DF01.tmp"99⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\DF8D.tmp"C:\Users\Admin\AppData\Local\Temp\DF8D.tmp"100⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\E01A.tmp"C:\Users\Admin\AppData\Local\Temp\E01A.tmp"101⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\E087.tmp"C:\Users\Admin\AppData\Local\Temp\E087.tmp"102⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\E124.tmp"C:\Users\Admin\AppData\Local\Temp\E124.tmp"103⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\E1C0.tmp"C:\Users\Admin\AppData\Local\Temp\E1C0.tmp"104⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\E48F.tmp"C:\Users\Admin\AppData\Local\Temp\E48F.tmp"105⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\E51B.tmp"C:\Users\Admin\AppData\Local\Temp\E51B.tmp"106⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\E615.tmp"C:\Users\Admin\AppData\Local\Temp\E615.tmp"107⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\E692.tmp"C:\Users\Admin\AppData\Local\Temp\E692.tmp"108⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\E76D.tmp"C:\Users\Admin\AppData\Local\Temp\E76D.tmp"109⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\E7DA.tmp"C:\Users\Admin\AppData\Local\Temp\E7DA.tmp"110⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\E857.tmp"C:\Users\Admin\AppData\Local\Temp\E857.tmp"111⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\EA2C.tmp"C:\Users\Admin\AppData\Local\Temp\EA2C.tmp"112⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\EA9A.tmp"C:\Users\Admin\AppData\Local\Temp\EA9A.tmp"113⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\EBE2.tmp"C:\Users\Admin\AppData\Local\Temp\EBE2.tmp"114⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\ED1A.tmp"C:\Users\Admin\AppData\Local\Temp\ED1A.tmp"115⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\EDB6.tmp"C:\Users\Admin\AppData\Local\Temp\EDB6.tmp"116⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\EE62.tmp"C:\Users\Admin\AppData\Local\Temp\EE62.tmp"117⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\F047.tmp"C:\Users\Admin\AppData\Local\Temp\F047.tmp"118⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\F0E3.tmp"C:\Users\Admin\AppData\Local\Temp\F0E3.tmp"119⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\F23B.tmp"C:\Users\Admin\AppData\Local\Temp\F23B.tmp"120⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\F306.tmp"C:\Users\Admin\AppData\Local\Temp\F306.tmp"121⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\F3B2.tmp"C:\Users\Admin\AppData\Local\Temp\F3B2.tmp"122⤵PID:3952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-