Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 06:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe
-
Size
486KB
-
MD5
f8c3fa85d71a9bf0bef7d4966f8bf486
-
SHA1
a099511eb9c2bb766bf943aa465bf250d98d72e4
-
SHA256
21db650c44fc6acc3b3d5aa6680bca57ab935ef7df71d3879f278cca8ff2ddf8
-
SHA512
f2606715b73c3ab6ccb5f3acdb3a092b319fb9e6ffca6a397083be3731388ba9a5474cdb4eb7b01d2c22b861f791dc736d3572c25eff1402b92b2c7c531b7928
-
SSDEEP
12288:/U5rCOTeiDJbvEu7highPsn25Y/MHMNZ:/UQOJDlvEuNAn25Y0sN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 988 D49.tmp 2032 149C.tmp 4024 16FE.tmp 216 17C9.tmp 1168 1875.tmp 4080 1901.tmp 1300 199E.tmp 2296 1B82.tmp 2028 1E03.tmp 2556 2229.tmp 4564 2342.tmp 4064 246B.tmp 3288 2621.tmp 208 2844.tmp 2232 296C.tmp 1944 2AE3.tmp 680 2BED.tmp 1796 2EAC.tmp 3748 3042.tmp 5024 3217.tmp 4324 32E2.tmp 4792 34C7.tmp 2276 3573.tmp 1100 36F9.tmp 1784 38AF.tmp 5040 3A64.tmp 4192 3B20.tmp 828 3D33.tmp 2664 4011.tmp 4116 42F0.tmp 3108 43CA.tmp 3336 4551.tmp 3964 461C.tmp 2704 4810.tmp 748 490A.tmp 4348 4987.tmp 2028 4A04.tmp 1372 4A91.tmp 940 4B0E.tmp 2648 4BF8.tmp 3664 4D40.tmp 1752 4E5A.tmp 2064 4FD1.tmp 2584 5222.tmp 4368 529F.tmp 1720 5455.tmp 4860 54E1.tmp 3052 561A.tmp 3396 5A40.tmp 4200 5BE6.tmp 4832 5E96.tmp 4328 6210.tmp 2376 627E.tmp 5024 62EB.tmp 3668 6618.tmp 2004 67CD.tmp 2728 685A.tmp 4736 68D7.tmp 1336 6B57.tmp 2360 6BC5.tmp 3532 6C32.tmp 3264 6CA0.tmp 3612 6D0D.tmp 4952 6E17.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 988 4604 2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe 91 PID 4604 wrote to memory of 988 4604 2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe 91 PID 4604 wrote to memory of 988 4604 2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe 91 PID 988 wrote to memory of 2032 988 D49.tmp 92 PID 988 wrote to memory of 2032 988 D49.tmp 92 PID 988 wrote to memory of 2032 988 D49.tmp 92 PID 2032 wrote to memory of 4024 2032 149C.tmp 93 PID 2032 wrote to memory of 4024 2032 149C.tmp 93 PID 2032 wrote to memory of 4024 2032 149C.tmp 93 PID 4024 wrote to memory of 216 4024 16FE.tmp 94 PID 4024 wrote to memory of 216 4024 16FE.tmp 94 PID 4024 wrote to memory of 216 4024 16FE.tmp 94 PID 216 wrote to memory of 1168 216 17C9.tmp 95 PID 216 wrote to memory of 1168 216 17C9.tmp 95 PID 216 wrote to memory of 1168 216 17C9.tmp 95 PID 1168 wrote to memory of 4080 1168 1875.tmp 96 PID 1168 wrote to memory of 4080 1168 1875.tmp 96 PID 1168 wrote to memory of 4080 1168 1875.tmp 96 PID 4080 wrote to memory of 1300 4080 1901.tmp 97 PID 4080 wrote to memory of 1300 4080 1901.tmp 97 PID 4080 wrote to memory of 1300 4080 1901.tmp 97 PID 1300 wrote to memory of 2296 1300 199E.tmp 98 PID 1300 wrote to memory of 2296 1300 199E.tmp 98 PID 1300 wrote to memory of 2296 1300 199E.tmp 98 PID 2296 wrote to memory of 2028 2296 1B82.tmp 100 PID 2296 wrote to memory of 2028 2296 1B82.tmp 100 PID 2296 wrote to memory of 2028 2296 1B82.tmp 100 PID 2028 wrote to memory of 2556 2028 1E03.tmp 101 PID 2028 wrote to memory of 2556 2028 1E03.tmp 101 PID 2028 wrote to memory of 2556 2028 1E03.tmp 101 PID 2556 wrote to memory of 4564 2556 2229.tmp 102 PID 2556 wrote to memory of 4564 2556 2229.tmp 102 PID 2556 wrote to memory of 4564 2556 2229.tmp 102 PID 4564 wrote to memory of 4064 4564 2342.tmp 103 PID 4564 wrote to memory of 4064 4564 2342.tmp 103 PID 4564 wrote to memory of 4064 4564 2342.tmp 103 PID 4064 wrote to memory of 3288 4064 246B.tmp 105 PID 4064 wrote to memory of 3288 4064 246B.tmp 105 PID 4064 wrote to memory of 3288 4064 246B.tmp 105 PID 3288 wrote to memory of 208 3288 2621.tmp 106 PID 3288 wrote to memory of 208 3288 2621.tmp 106 PID 3288 wrote to memory of 208 3288 2621.tmp 106 PID 208 wrote to memory of 2232 208 2844.tmp 107 PID 208 wrote to memory of 2232 208 2844.tmp 107 PID 208 wrote to memory of 2232 208 2844.tmp 107 PID 2232 wrote to memory of 1944 2232 296C.tmp 108 PID 2232 wrote to memory of 1944 2232 296C.tmp 108 PID 2232 wrote to memory of 1944 2232 296C.tmp 108 PID 1944 wrote to memory of 680 1944 2AE3.tmp 110 PID 1944 wrote to memory of 680 1944 2AE3.tmp 110 PID 1944 wrote to memory of 680 1944 2AE3.tmp 110 PID 680 wrote to memory of 1796 680 2BED.tmp 112 PID 680 wrote to memory of 1796 680 2BED.tmp 112 PID 680 wrote to memory of 1796 680 2BED.tmp 112 PID 1796 wrote to memory of 3748 1796 2EAC.tmp 113 PID 1796 wrote to memory of 3748 1796 2EAC.tmp 113 PID 1796 wrote to memory of 3748 1796 2EAC.tmp 113 PID 3748 wrote to memory of 5024 3748 3042.tmp 114 PID 3748 wrote to memory of 5024 3748 3042.tmp 114 PID 3748 wrote to memory of 5024 3748 3042.tmp 114 PID 5024 wrote to memory of 4324 5024 3217.tmp 115 PID 5024 wrote to memory of 4324 5024 3217.tmp 115 PID 5024 wrote to memory of 4324 5024 3217.tmp 115 PID 4324 wrote to memory of 4792 4324 32E2.tmp 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_f8c3fa85d71a9bf0bef7d4966f8bf486_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\149C.tmp"C:\Users\Admin\AppData\Local\Temp\149C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\17C9.tmp"C:\Users\Admin\AppData\Local\Temp\17C9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\1901.tmp"C:\Users\Admin\AppData\Local\Temp\1901.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\1B82.tmp"C:\Users\Admin\AppData\Local\Temp\1B82.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\2229.tmp"C:\Users\Admin\AppData\Local\Temp\2229.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\2342.tmp"C:\Users\Admin\AppData\Local\Temp\2342.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"23⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\3573.tmp"C:\Users\Admin\AppData\Local\Temp\3573.tmp"24⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"25⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"26⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"27⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"28⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"29⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"30⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\42F0.tmp"C:\Users\Admin\AppData\Local\Temp\42F0.tmp"31⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\43CA.tmp"C:\Users\Admin\AppData\Local\Temp\43CA.tmp"32⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"33⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"34⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\4810.tmp"C:\Users\Admin\AppData\Local\Temp\4810.tmp"35⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"36⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"37⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"38⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"39⤵
- Executes dropped EXE
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"40⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\4BF8.tmp"C:\Users\Admin\AppData\Local\Temp\4BF8.tmp"41⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\4D40.tmp"C:\Users\Admin\AppData\Local\Temp\4D40.tmp"42⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"43⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"44⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"45⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\529F.tmp"C:\Users\Admin\AppData\Local\Temp\529F.tmp"46⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"47⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\54E1.tmp"C:\Users\Admin\AppData\Local\Temp\54E1.tmp"48⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\561A.tmp"C:\Users\Admin\AppData\Local\Temp\561A.tmp"49⤵
- Executes dropped EXE
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"50⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"51⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"52⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"53⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\627E.tmp"C:\Users\Admin\AppData\Local\Temp\627E.tmp"54⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\62EB.tmp"C:\Users\Admin\AppData\Local\Temp\62EB.tmp"55⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\6618.tmp"C:\Users\Admin\AppData\Local\Temp\6618.tmp"56⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\67CD.tmp"C:\Users\Admin\AppData\Local\Temp\67CD.tmp"57⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\685A.tmp"C:\Users\Admin\AppData\Local\Temp\685A.tmp"58⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\68D7.tmp"C:\Users\Admin\AppData\Local\Temp\68D7.tmp"59⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\6B57.tmp"C:\Users\Admin\AppData\Local\Temp\6B57.tmp"60⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\6BC5.tmp"C:\Users\Admin\AppData\Local\Temp\6BC5.tmp"61⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\6C32.tmp"C:\Users\Admin\AppData\Local\Temp\6C32.tmp"62⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"63⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\6D0D.tmp"C:\Users\Admin\AppData\Local\Temp\6D0D.tmp"64⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\6E17.tmp"C:\Users\Admin\AppData\Local\Temp\6E17.tmp"65⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\6E84.tmp"C:\Users\Admin\AppData\Local\Temp\6E84.tmp"66⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\6F7E.tmp"C:\Users\Admin\AppData\Local\Temp\6F7E.tmp"67⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"68⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\7097.tmp"C:\Users\Admin\AppData\Local\Temp\7097.tmp"69⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\7105.tmp"C:\Users\Admin\AppData\Local\Temp\7105.tmp"70⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\7450.tmp"C:\Users\Admin\AppData\Local\Temp\7450.tmp"71⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\7654.tmp"C:\Users\Admin\AppData\Local\Temp\7654.tmp"72⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\76C1.tmp"C:\Users\Admin\AppData\Local\Temp\76C1.tmp"73⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\779C.tmp"C:\Users\Admin\AppData\Local\Temp\779C.tmp"74⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\7809.tmp"C:\Users\Admin\AppData\Local\Temp\7809.tmp"75⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\7877.tmp"C:\Users\Admin\AppData\Local\Temp\7877.tmp"76⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\78F4.tmp"C:\Users\Admin\AppData\Local\Temp\78F4.tmp"77⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\7971.tmp"C:\Users\Admin\AppData\Local\Temp\7971.tmp"78⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\7B55.tmp"C:\Users\Admin\AppData\Local\Temp\7B55.tmp"79⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"80⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\7C40.tmp"C:\Users\Admin\AppData\Local\Temp\7C40.tmp"81⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"82⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"83⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\7E05.tmp"C:\Users\Admin\AppData\Local\Temp\7E05.tmp"84⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\7E82.tmp"C:\Users\Admin\AppData\Local\Temp\7E82.tmp"85⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\7EEF.tmp"C:\Users\Admin\AppData\Local\Temp\7EEF.tmp"86⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\8102.tmp"C:\Users\Admin\AppData\Local\Temp\8102.tmp"87⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\8306.tmp"C:\Users\Admin\AppData\Local\Temp\8306.tmp"88⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\8632.tmp"C:\Users\Admin\AppData\Local\Temp\8632.tmp"89⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\87C9.tmp"C:\Users\Admin\AppData\Local\Temp\87C9.tmp"90⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\88A3.tmp"C:\Users\Admin\AppData\Local\Temp\88A3.tmp"91⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\8920.tmp"C:\Users\Admin\AppData\Local\Temp\8920.tmp"92⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\898E.tmp"C:\Users\Admin\AppData\Local\Temp\898E.tmp"93⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"94⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"95⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"96⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\8DF3.tmp"C:\Users\Admin\AppData\Local\Temp\8DF3.tmp"97⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\8E70.tmp"C:\Users\Admin\AppData\Local\Temp\8E70.tmp"98⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\8EED.tmp"C:\Users\Admin\AppData\Local\Temp\8EED.tmp"99⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\9054.tmp"C:\Users\Admin\AppData\Local\Temp\9054.tmp"100⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\911F.tmp"C:\Users\Admin\AppData\Local\Temp\911F.tmp"101⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\918D.tmp"C:\Users\Admin\AppData\Local\Temp\918D.tmp"102⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\91FA.tmp"C:\Users\Admin\AppData\Local\Temp\91FA.tmp"103⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\9267.tmp"C:\Users\Admin\AppData\Local\Temp\9267.tmp"104⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\9371.tmp"C:\Users\Admin\AppData\Local\Temp\9371.tmp"105⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\948A.tmp"C:\Users\Admin\AppData\Local\Temp\948A.tmp"106⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\9507.tmp"C:\Users\Admin\AppData\Local\Temp\9507.tmp"107⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\9565.tmp"C:\Users\Admin\AppData\Local\Temp\9565.tmp"108⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\95D2.tmp"C:\Users\Admin\AppData\Local\Temp\95D2.tmp"109⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\969E.tmp"C:\Users\Admin\AppData\Local\Temp\969E.tmp"110⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\973A.tmp"C:\Users\Admin\AppData\Local\Temp\973A.tmp"111⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\994D.tmp"C:\Users\Admin\AppData\Local\Temp\994D.tmp"112⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\99E9.tmp"C:\Users\Admin\AppData\Local\Temp\99E9.tmp"113⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\9B41.tmp"C:\Users\Admin\AppData\Local\Temp\9B41.tmp"114⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"115⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\9ECB.tmp"C:\Users\Admin\AppData\Local\Temp\9ECB.tmp"116⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\9F39.tmp"C:\Users\Admin\AppData\Local\Temp\9F39.tmp"117⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\A311.tmp"C:\Users\Admin\AppData\Local\Temp\A311.tmp"118⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\A39E.tmp"C:\Users\Admin\AppData\Local\Temp\A39E.tmp"119⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"120⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\A469.tmp"C:\Users\Admin\AppData\Local\Temp\A469.tmp"121⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\A505.tmp"C:\Users\Admin\AppData\Local\Temp\A505.tmp"122⤵PID:3680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-