Analysis
-
max time kernel
163s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe
-
Size
765KB
-
MD5
a8a3f7606931d1a6e923012d54d15d92
-
SHA1
c08a10d8c298c86f4e1ca1538bb72910a826bed4
-
SHA256
dfbe935fbfa50f9862e3eb7d5af48c6a9074e9f3ceb93ce3a4b9c6218ed402b8
-
SHA512
ce2721c0ed7535d7bf63784d71955902ef71455fd58c95d6745b63a9b5294903b61742216e64635ad6fa0daee15d860de7ee4254404039ba39e8cee19e669fae
-
SSDEEP
12288:ZU5rCOTeiDPA3POOvNay4ifL7R0VqowC8T3ZF5rn5rLOa54U5w5A:ZUQOJDPVQabW7Qc3vh5Oa+UOS
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4232 45DE.tmp 4808 4958.tmp 320 4ACF.tmp 8 4C75.tmp 5040 4F82.tmp 4612 5109.tmp 3040 5213.tmp 3856 52ED.tmp 2808 5493.tmp 4180 55FB.tmp 2476 56E5.tmp 4688 58C9.tmp 1636 5BA8.tmp 1856 5CB1.tmp 4964 5DAB.tmp 5096 5F13.tmp 4088 5FCE.tmp 3848 6193.tmp 4160 6414.tmp 2912 6A7D.tmp 2756 6B77.tmp 740 6D0D.tmp 4828 6E26.tmp 3408 6FFB.tmp 4940 7153.tmp 3220 72AA.tmp 2888 73C4.tmp 1976 77BB.tmp 4780 78C5.tmp 3952 79FD.tmp 4628 7C9D.tmp 1012 7DA7.tmp 4204 7F0E.tmp 4392 7FAB.tmp 260 823B.tmp 4768 8335.tmp 3464 83B2.tmp 1808 841F.tmp 4540 8604.tmp 3844 8681.tmp 400 871D.tmp 4752 88A3.tmp 3688 89DC.tmp 4180 8B91.tmp 3312 8DA5.tmp 3736 8E9F.tmp 1588 9333.tmp 2952 95E2.tmp 4716 966F.tmp 3988 96DC.tmp 1072 97F5.tmp 5096 9872.tmp 3680 98EF.tmp 2692 9D45.tmp 1120 9DC2.tmp 780 A013.tmp 856 A14C.tmp 1288 A1B9.tmp 1916 A275.tmp 1536 A2F2.tmp 2552 A37E.tmp 3428 A3EC.tmp 2480 A459.tmp 4104 A515.tmp -
Loads dropped DLL 1 IoCs
pid Process 3036 7B36.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4232 2060 2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe 90 PID 2060 wrote to memory of 4232 2060 2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe 90 PID 2060 wrote to memory of 4232 2060 2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe 90 PID 4232 wrote to memory of 4808 4232 45DE.tmp 91 PID 4232 wrote to memory of 4808 4232 45DE.tmp 91 PID 4232 wrote to memory of 4808 4232 45DE.tmp 91 PID 4808 wrote to memory of 320 4808 4958.tmp 92 PID 4808 wrote to memory of 320 4808 4958.tmp 92 PID 4808 wrote to memory of 320 4808 4958.tmp 92 PID 320 wrote to memory of 8 320 4ACF.tmp 93 PID 320 wrote to memory of 8 320 4ACF.tmp 93 PID 320 wrote to memory of 8 320 4ACF.tmp 93 PID 8 wrote to memory of 5040 8 4C75.tmp 94 PID 8 wrote to memory of 5040 8 4C75.tmp 94 PID 8 wrote to memory of 5040 8 4C75.tmp 94 PID 5040 wrote to memory of 4612 5040 4F82.tmp 95 PID 5040 wrote to memory of 4612 5040 4F82.tmp 95 PID 5040 wrote to memory of 4612 5040 4F82.tmp 95 PID 4612 wrote to memory of 3040 4612 5109.tmp 96 PID 4612 wrote to memory of 3040 4612 5109.tmp 96 PID 4612 wrote to memory of 3040 4612 5109.tmp 96 PID 3040 wrote to memory of 3856 3040 5213.tmp 97 PID 3040 wrote to memory of 3856 3040 5213.tmp 97 PID 3040 wrote to memory of 3856 3040 5213.tmp 97 PID 3856 wrote to memory of 2808 3856 52ED.tmp 98 PID 3856 wrote to memory of 2808 3856 52ED.tmp 98 PID 3856 wrote to memory of 2808 3856 52ED.tmp 98 PID 2808 wrote to memory of 4180 2808 5493.tmp 99 PID 2808 wrote to memory of 4180 2808 5493.tmp 99 PID 2808 wrote to memory of 4180 2808 5493.tmp 99 PID 4180 wrote to memory of 2476 4180 55FB.tmp 100 PID 4180 wrote to memory of 2476 4180 55FB.tmp 100 PID 4180 wrote to memory of 2476 4180 55FB.tmp 100 PID 2476 wrote to memory of 4688 2476 56E5.tmp 101 PID 2476 wrote to memory of 4688 2476 56E5.tmp 101 PID 2476 wrote to memory of 4688 2476 56E5.tmp 101 PID 4688 wrote to memory of 1636 4688 58C9.tmp 102 PID 4688 wrote to memory of 1636 4688 58C9.tmp 102 PID 4688 wrote to memory of 1636 4688 58C9.tmp 102 PID 1636 wrote to memory of 1856 1636 5BA8.tmp 103 PID 1636 wrote to memory of 1856 1636 5BA8.tmp 103 PID 1636 wrote to memory of 1856 1636 5BA8.tmp 103 PID 1856 wrote to memory of 4964 1856 5CB1.tmp 104 PID 1856 wrote to memory of 4964 1856 5CB1.tmp 104 PID 1856 wrote to memory of 4964 1856 5CB1.tmp 104 PID 4964 wrote to memory of 5096 4964 5DAB.tmp 105 PID 4964 wrote to memory of 5096 4964 5DAB.tmp 105 PID 4964 wrote to memory of 5096 4964 5DAB.tmp 105 PID 5096 wrote to memory of 4088 5096 5F13.tmp 106 PID 5096 wrote to memory of 4088 5096 5F13.tmp 106 PID 5096 wrote to memory of 4088 5096 5F13.tmp 106 PID 4088 wrote to memory of 3848 4088 5FCE.tmp 107 PID 4088 wrote to memory of 3848 4088 5FCE.tmp 107 PID 4088 wrote to memory of 3848 4088 5FCE.tmp 107 PID 3848 wrote to memory of 4160 3848 6193.tmp 108 PID 3848 wrote to memory of 4160 3848 6193.tmp 108 PID 3848 wrote to memory of 4160 3848 6193.tmp 108 PID 4160 wrote to memory of 2912 4160 6414.tmp 109 PID 4160 wrote to memory of 2912 4160 6414.tmp 109 PID 4160 wrote to memory of 2912 4160 6414.tmp 109 PID 2912 wrote to memory of 2756 2912 6A7D.tmp 110 PID 2912 wrote to memory of 2756 2912 6A7D.tmp 110 PID 2912 wrote to memory of 2756 2912 6A7D.tmp 110 PID 2756 wrote to memory of 740 2756 6B77.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_a8a3f7606931d1a6e923012d54d15d92_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\4C75.tmp"C:\Users\Admin\AppData\Local\Temp\4C75.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\5109.tmp"C:\Users\Admin\AppData\Local\Temp\5109.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\52ED.tmp"C:\Users\Admin\AppData\Local\Temp\52ED.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\5493.tmp"C:\Users\Admin\AppData\Local\Temp\5493.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\55FB.tmp"C:\Users\Admin\AppData\Local\Temp\55FB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\58C9.tmp"C:\Users\Admin\AppData\Local\Temp\58C9.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\5DAB.tmp"C:\Users\Admin\AppData\Local\Temp\5DAB.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\5F13.tmp"C:\Users\Admin\AppData\Local\Temp\5F13.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\6193.tmp"C:\Users\Admin\AppData\Local\Temp\6193.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\6414.tmp"C:\Users\Admin\AppData\Local\Temp\6414.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\6D0D.tmp"C:\Users\Admin\AppData\Local\Temp\6D0D.tmp"23⤵
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\Temp\6E26.tmp"C:\Users\Admin\AppData\Local\Temp\6E26.tmp"24⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"25⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\7153.tmp"C:\Users\Admin\AppData\Local\Temp\7153.tmp"26⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\72AA.tmp"C:\Users\Admin\AppData\Local\Temp\72AA.tmp"27⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"28⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\77BB.tmp"C:\Users\Admin\AppData\Local\Temp\77BB.tmp"29⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\78C5.tmp"C:\Users\Admin\AppData\Local\Temp\78C5.tmp"30⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"31⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\7B36.tmp"C:\Users\Admin\AppData\Local\Temp\7B36.tmp"32⤵
- Loads dropped DLL
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"33⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\7DA7.tmp"C:\Users\Admin\AppData\Local\Temp\7DA7.tmp"34⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"35⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"36⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\823B.tmp"C:\Users\Admin\AppData\Local\Temp\823B.tmp"37⤵
- Executes dropped EXE
PID:260 -
C:\Users\Admin\AppData\Local\Temp\8335.tmp"C:\Users\Admin\AppData\Local\Temp\8335.tmp"38⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\83B2.tmp"C:\Users\Admin\AppData\Local\Temp\83B2.tmp"39⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"40⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\8604.tmp"C:\Users\Admin\AppData\Local\Temp\8604.tmp"41⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\8681.tmp"C:\Users\Admin\AppData\Local\Temp\8681.tmp"42⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\871D.tmp"C:\Users\Admin\AppData\Local\Temp\871D.tmp"43⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\88A3.tmp"C:\Users\Admin\AppData\Local\Temp\88A3.tmp"44⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\89DC.tmp"C:\Users\Admin\AppData\Local\Temp\89DC.tmp"45⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\8B91.tmp"C:\Users\Admin\AppData\Local\Temp\8B91.tmp"46⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\8DA5.tmp"C:\Users\Admin\AppData\Local\Temp\8DA5.tmp"47⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\8E9F.tmp"C:\Users\Admin\AppData\Local\Temp\8E9F.tmp"48⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\9333.tmp"C:\Users\Admin\AppData\Local\Temp\9333.tmp"49⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\95E2.tmp"C:\Users\Admin\AppData\Local\Temp\95E2.tmp"50⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\966F.tmp"C:\Users\Admin\AppData\Local\Temp\966F.tmp"51⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\96DC.tmp"C:\Users\Admin\AppData\Local\Temp\96DC.tmp"52⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\97F5.tmp"C:\Users\Admin\AppData\Local\Temp\97F5.tmp"53⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\9872.tmp"C:\Users\Admin\AppData\Local\Temp\9872.tmp"54⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\98EF.tmp"C:\Users\Admin\AppData\Local\Temp\98EF.tmp"55⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\9D45.tmp"C:\Users\Admin\AppData\Local\Temp\9D45.tmp"56⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\9DC2.tmp"C:\Users\Admin\AppData\Local\Temp\9DC2.tmp"57⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\A013.tmp"C:\Users\Admin\AppData\Local\Temp\A013.tmp"58⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\A14C.tmp"C:\Users\Admin\AppData\Local\Temp\A14C.tmp"59⤵
- Executes dropped EXE
PID:856 -
C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"60⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\A275.tmp"C:\Users\Admin\AppData\Local\Temp\A275.tmp"61⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"62⤵
- Executes dropped EXE
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\A37E.tmp"C:\Users\Admin\AppData\Local\Temp\A37E.tmp"63⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\A3EC.tmp"C:\Users\Admin\AppData\Local\Temp\A3EC.tmp"64⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\A459.tmp"C:\Users\Admin\AppData\Local\Temp\A459.tmp"65⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\A515.tmp"C:\Users\Admin\AppData\Local\Temp\A515.tmp"66⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\A592.tmp"C:\Users\Admin\AppData\Local\Temp\A592.tmp"67⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\A7C4.tmp"C:\Users\Admin\AppData\Local\Temp\A7C4.tmp"68⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\A860.tmp"C:\Users\Admin\AppData\Local\Temp\A860.tmp"69⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\A91C.tmp"C:\Users\Admin\AppData\Local\Temp\A91C.tmp"70⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\A9C8.tmp"C:\Users\Admin\AppData\Local\Temp\A9C8.tmp"71⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\AA93.tmp"C:\Users\Admin\AppData\Local\Temp\AA93.tmp"72⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\AB20.tmp"C:\Users\Admin\AppData\Local\Temp\AB20.tmp"73⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\AC48.tmp"C:\Users\Admin\AppData\Local\Temp\AC48.tmp"74⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"75⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\ADCF.tmp"C:\Users\Admin\AppData\Local\Temp\ADCF.tmp"76⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\AE6B.tmp"C:\Users\Admin\AppData\Local\Temp\AE6B.tmp"77⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"78⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\B08E.tmp"C:\Users\Admin\AppData\Local\Temp\B08E.tmp"79⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\B10B.tmp"C:\Users\Admin\AppData\Local\Temp\B10B.tmp"80⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\B224.tmp"C:\Users\Admin\AppData\Local\Temp\B224.tmp"81⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"82⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\B32E.tmp"C:\Users\Admin\AppData\Local\Temp\B32E.tmp"83⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\B512.tmp"C:\Users\Admin\AppData\Local\Temp\B512.tmp"84⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\B5AF.tmp"C:\Users\Admin\AppData\Local\Temp\B5AF.tmp"85⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\B745.tmp"C:\Users\Admin\AppData\Local\Temp\B745.tmp"86⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\B90A.tmp"C:\Users\Admin\AppData\Local\Temp\B90A.tmp"87⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\B9A6.tmp"C:\Users\Admin\AppData\Local\Temp\B9A6.tmp"88⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\BA81.tmp"C:\Users\Admin\AppData\Local\Temp\BA81.tmp"89⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\BD5F.tmp"C:\Users\Admin\AppData\Local\Temp\BD5F.tmp"90⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\BE4A.tmp"C:\Users\Admin\AppData\Local\Temp\BE4A.tmp"91⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\BED6.tmp"C:\Users\Admin\AppData\Local\Temp\BED6.tmp"92⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\BF53.tmp"C:\Users\Admin\AppData\Local\Temp\BF53.tmp"93⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\C03E.tmp"C:\Users\Admin\AppData\Local\Temp\C03E.tmp"94⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\C0BB.tmp"C:\Users\Admin\AppData\Local\Temp\C0BB.tmp"95⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\C290.tmp"C:\Users\Admin\AppData\Local\Temp\C290.tmp"96⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\C2FD.tmp"C:\Users\Admin\AppData\Local\Temp\C2FD.tmp"97⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\C407.tmp"C:\Users\Admin\AppData\Local\Temp\C407.tmp"98⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\C474.tmp"C:\Users\Admin\AppData\Local\Temp\C474.tmp"99⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\C54F.tmp"C:\Users\Admin\AppData\Local\Temp\C54F.tmp"100⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\C5CC.tmp"C:\Users\Admin\AppData\Local\Temp\C5CC.tmp"101⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\C668.tmp"C:\Users\Admin\AppData\Local\Temp\C668.tmp"102⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\C772.tmp"C:\Users\Admin\AppData\Local\Temp\C772.tmp"103⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"104⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\CA11.tmp"C:\Users\Admin\AppData\Local\Temp\CA11.tmp"105⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\CAEC.tmp"C:\Users\Admin\AppData\Local\Temp\CAEC.tmp"106⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\CB5A.tmp"C:\Users\Admin\AppData\Local\Temp\CB5A.tmp"107⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\CBE6.tmp"C:\Users\Admin\AppData\Local\Temp\CBE6.tmp"108⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\CE19.tmp"C:\Users\Admin\AppData\Local\Temp\CE19.tmp"109⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\D4FE.tmp"C:\Users\Admin\AppData\Local\Temp\D4FE.tmp"110⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\D5E9.tmp"C:\Users\Admin\AppData\Local\Temp\D5E9.tmp"111⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\D666.tmp"C:\Users\Admin\AppData\Local\Temp\D666.tmp"112⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\D702.tmp"C:\Users\Admin\AppData\Local\Temp\D702.tmp"113⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\D85A.tmp"C:\Users\Admin\AppData\Local\Temp\D85A.tmp"114⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\D9F0.tmp"C:\Users\Admin\AppData\Local\Temp\D9F0.tmp"115⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\DA6D.tmp"C:\Users\Admin\AppData\Local\Temp\DA6D.tmp"116⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\DB09.tmp"C:\Users\Admin\AppData\Local\Temp\DB09.tmp"117⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\DBF4.tmp"C:\Users\Admin\AppData\Local\Temp\DBF4.tmp"118⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\DC71.tmp"C:\Users\Admin\AppData\Local\Temp\DC71.tmp"119⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\DD0D.tmp"C:\Users\Admin\AppData\Local\Temp\DD0D.tmp"120⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\DE16.tmp"C:\Users\Admin\AppData\Local\Temp\DE16.tmp"121⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\DE84.tmp"C:\Users\Admin\AppData\Local\Temp\DE84.tmp"122⤵PID:2356
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-