Analysis
-
max time kernel
154s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe
-
Size
536KB
-
MD5
8a2a9d88fe5a8fc0217a6118b99722e1
-
SHA1
932754fd2bbfc3833a12ae3a87baa8c529e12978
-
SHA256
11cd1349e5d991715073397816fb48e6152b115a1b0a41dff165d16ca0c38f14
-
SHA512
66b989aedd594f91f21aa52b981058d8ec9666ffe5098f17e27846de0868558e81f8f52b75c50930083469e41f98ea8be4f761b14c1601951ede8f79f6b0cabf
-
SSDEEP
12288:wU5rCOTeiUULfrHbzKj8kTITcPt0q711/c+jW7IZxVJ0ZT9:wUQOJUWr7zLYITcWqh1LgIRJ0ZT9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3572 F414.tmp 3988 F51E.tmp 3248 9AF.tmp 2884 A3C.tmp 3140 F7DD.tmp 3740 F86A.tmp 2912 F8D7.tmp 2844 F9C1.tmp 3960 FA5E.tmp 4544 FB19.tmp 5004 FBB5.tmp 4904 FCBF.tmp 3452 FD4C.tmp 1432 FDC9.tmp 4132 FE65.tmp 5068 FF40.tmp 5012 FFEB.tmp 2344 59.tmp 1084 F5.tmp 2668 1C0.tmp 2572 24D.tmp 5048 2CA.tmp 3128 347.tmp 4824 460.tmp 2868 4BE.tmp 4328 52B.tmp 1600 599.tmp 4932 635.tmp 5088 6B2.tmp 3248 9AF.tmp 2884 A3C.tmp 368 B36.tmp 3124 BC3.tmp 3624 1170.tmp 3144 120C.tmp 5060 1393.tmp 2088 2FE5.tmp 1012 3A35.tmp 4116 4002.tmp 1856 405F.tmp 2744 40CD.tmp 4824 4958.tmp 2156 4A23.tmp 1828 535B.tmp 4980 54C2.tmp 4352 59C3.tmp 228 5A60.tmp 732 5ADD.tmp 3240 6165.tmp 3124 61D2.tmp 1596 625F.tmp 1976 62BC.tmp 3612 6339.tmp 4184 63A7.tmp 3192 6414.tmp 4540 6491.tmp 844 65AA.tmp 984 6618.tmp 5036 6BE4.tmp 3652 6C51.tmp 4744 6CBF.tmp 4988 7318.tmp 3648 7385.tmp 4116 7848.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3848 wrote to memory of 3572 3848 2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe 88 PID 3848 wrote to memory of 3572 3848 2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe 88 PID 3848 wrote to memory of 3572 3848 2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe 88 PID 3572 wrote to memory of 3988 3572 F414.tmp 90 PID 3572 wrote to memory of 3988 3572 F414.tmp 90 PID 3572 wrote to memory of 3988 3572 F414.tmp 90 PID 3988 wrote to memory of 3248 3988 F51E.tmp 115 PID 3988 wrote to memory of 3248 3988 F51E.tmp 115 PID 3988 wrote to memory of 3248 3988 F51E.tmp 115 PID 3248 wrote to memory of 2884 3248 9AF.tmp 112 PID 3248 wrote to memory of 2884 3248 9AF.tmp 112 PID 3248 wrote to memory of 2884 3248 9AF.tmp 112 PID 2884 wrote to memory of 3140 2884 A3C.tmp 95 PID 2884 wrote to memory of 3140 2884 A3C.tmp 95 PID 2884 wrote to memory of 3140 2884 A3C.tmp 95 PID 3140 wrote to memory of 3740 3140 F7DD.tmp 129 PID 3140 wrote to memory of 3740 3140 F7DD.tmp 129 PID 3140 wrote to memory of 3740 3140 F7DD.tmp 129 PID 3740 wrote to memory of 2912 3740 F86A.tmp 96 PID 3740 wrote to memory of 2912 3740 F86A.tmp 96 PID 3740 wrote to memory of 2912 3740 F86A.tmp 96 PID 2912 wrote to memory of 2844 2912 F8D7.tmp 97 PID 2912 wrote to memory of 2844 2912 F8D7.tmp 97 PID 2912 wrote to memory of 2844 2912 F8D7.tmp 97 PID 2844 wrote to memory of 3960 2844 F9C1.tmp 98 PID 2844 wrote to memory of 3960 2844 F9C1.tmp 98 PID 2844 wrote to memory of 3960 2844 F9C1.tmp 98 PID 3960 wrote to memory of 4544 3960 FA5E.tmp 128 PID 3960 wrote to memory of 4544 3960 FA5E.tmp 128 PID 3960 wrote to memory of 4544 3960 FA5E.tmp 128 PID 4544 wrote to memory of 5004 4544 FB19.tmp 99 PID 4544 wrote to memory of 5004 4544 FB19.tmp 99 PID 4544 wrote to memory of 5004 4544 FB19.tmp 99 PID 5004 wrote to memory of 4904 5004 FBB5.tmp 100 PID 5004 wrote to memory of 4904 5004 FBB5.tmp 100 PID 5004 wrote to memory of 4904 5004 FBB5.tmp 100 PID 4904 wrote to memory of 3452 4904 FCBF.tmp 127 PID 4904 wrote to memory of 3452 4904 FCBF.tmp 127 PID 4904 wrote to memory of 3452 4904 FCBF.tmp 127 PID 3452 wrote to memory of 1432 3452 FD4C.tmp 125 PID 3452 wrote to memory of 1432 3452 FD4C.tmp 125 PID 3452 wrote to memory of 1432 3452 FD4C.tmp 125 PID 1432 wrote to memory of 4132 1432 FDC9.tmp 101 PID 1432 wrote to memory of 4132 1432 FDC9.tmp 101 PID 1432 wrote to memory of 4132 1432 FDC9.tmp 101 PID 4132 wrote to memory of 5068 4132 FE65.tmp 102 PID 4132 wrote to memory of 5068 4132 FE65.tmp 102 PID 4132 wrote to memory of 5068 4132 FE65.tmp 102 PID 5068 wrote to memory of 5012 5068 FF40.tmp 123 PID 5068 wrote to memory of 5012 5068 FF40.tmp 123 PID 5068 wrote to memory of 5012 5068 FF40.tmp 123 PID 5012 wrote to memory of 2344 5012 FFEB.tmp 121 PID 5012 wrote to memory of 2344 5012 FFEB.tmp 121 PID 5012 wrote to memory of 2344 5012 FFEB.tmp 121 PID 2344 wrote to memory of 1084 2344 59.tmp 103 PID 2344 wrote to memory of 1084 2344 59.tmp 103 PID 2344 wrote to memory of 1084 2344 59.tmp 103 PID 1084 wrote to memory of 2668 1084 F5.tmp 120 PID 1084 wrote to memory of 2668 1084 F5.tmp 120 PID 1084 wrote to memory of 2668 1084 F5.tmp 120 PID 2668 wrote to memory of 2572 2668 1C0.tmp 118 PID 2668 wrote to memory of 2572 2668 1C0.tmp 118 PID 2668 wrote to memory of 2572 2668 1C0.tmp 118 PID 2572 wrote to memory of 5048 2572 24D.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_8a2a9d88fe5a8fc0217a6118b99722e1_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\F414.tmp"C:\Users\Admin\AppData\Local\Temp\F414.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\F51E.tmp"C:\Users\Admin\AppData\Local\Temp\F51E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"4⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"5⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A3C.tmp"C:\Users\Admin\AppData\Local\Temp\A3C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"6⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"7⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"8⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"9⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"10⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"11⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\3A35.tmp"C:\Users\Admin\AppData\Local\Temp\3A35.tmp"12⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"13⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"14⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\40CD.tmp"C:\Users\Admin\AppData\Local\Temp\40CD.tmp"15⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"16⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"17⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\535B.tmp"C:\Users\Admin\AppData\Local\Temp\535B.tmp"18⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\54C2.tmp"C:\Users\Admin\AppData\Local\Temp\54C2.tmp"19⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\59C3.tmp"C:\Users\Admin\AppData\Local\Temp\59C3.tmp"20⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\5A60.tmp"C:\Users\Admin\AppData\Local\Temp\5A60.tmp"21⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"22⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\6165.tmp"C:\Users\Admin\AppData\Local\Temp\6165.tmp"23⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"24⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\625F.tmp"C:\Users\Admin\AppData\Local\Temp\625F.tmp"25⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\62BC.tmp"C:\Users\Admin\AppData\Local\Temp\62BC.tmp"26⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\6339.tmp"C:\Users\Admin\AppData\Local\Temp\6339.tmp"27⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\63A7.tmp"C:\Users\Admin\AppData\Local\Temp\63A7.tmp"28⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\6414.tmp"C:\Users\Admin\AppData\Local\Temp\6414.tmp"29⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\6491.tmp"C:\Users\Admin\AppData\Local\Temp\6491.tmp"30⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\65AA.tmp"C:\Users\Admin\AppData\Local\Temp\65AA.tmp"31⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\6618.tmp"C:\Users\Admin\AppData\Local\Temp\6618.tmp"32⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"33⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\6C51.tmp"C:\Users\Admin\AppData\Local\Temp\6C51.tmp"34⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp"C:\Users\Admin\AppData\Local\Temp\6CBF.tmp"35⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\7318.tmp"C:\Users\Admin\AppData\Local\Temp\7318.tmp"36⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\7385.tmp"C:\Users\Admin\AppData\Local\Temp\7385.tmp"37⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\7848.tmp"C:\Users\Admin\AppData\Local\Temp\7848.tmp"38⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\7903.tmp"C:\Users\Admin\AppData\Local\Temp\7903.tmp"39⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\7990.tmp"C:\Users\Admin\AppData\Local\Temp\7990.tmp"40⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"41⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"42⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\7B65.tmp"C:\Users\Admin\AppData\Local\Temp\7B65.tmp"43⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\7C11.tmp"C:\Users\Admin\AppData\Local\Temp\7C11.tmp"44⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"45⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\7D1A.tmp"C:\Users\Admin\AppData\Local\Temp\7D1A.tmp"46⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"47⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\7E24.tmp"C:\Users\Admin\AppData\Local\Temp\7E24.tmp"48⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\823B.tmp"C:\Users\Admin\AppData\Local\Temp\823B.tmp"49⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\8344.tmp"C:\Users\Admin\AppData\Local\Temp\8344.tmp"50⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\83F0.tmp"C:\Users\Admin\AppData\Local\Temp\83F0.tmp"51⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"52⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\9304.tmp"C:\Users\Admin\AppData\Local\Temp\9304.tmp"53⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\9390.tmp"C:\Users\Admin\AppData\Local\Temp\9390.tmp"54⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\9517.tmp"C:\Users\Admin\AppData\Local\Temp\9517.tmp"55⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\9565.tmp"C:\Users\Admin\AppData\Local\Temp\9565.tmp"56⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\95D2.tmp"C:\Users\Admin\AppData\Local\Temp\95D2.tmp"57⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\967E.tmp"C:\Users\Admin\AppData\Local\Temp\967E.tmp"58⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\97D6.tmp"C:\Users\Admin\AppData\Local\Temp\97D6.tmp"59⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\994D.tmp"C:\Users\Admin\AppData\Local\Temp\994D.tmp"60⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\9A18.tmp"C:\Users\Admin\AppData\Local\Temp\9A18.tmp"61⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\9B80.tmp"C:\Users\Admin\AppData\Local\Temp\9B80.tmp"62⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"63⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\9D06.tmp"C:\Users\Admin\AppData\Local\Temp\9D06.tmp"64⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\9D83.tmp"C:\Users\Admin\AppData\Local\Temp\9D83.tmp"65⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"66⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\9E8D.tmp"C:\Users\Admin\AppData\Local\Temp\9E8D.tmp"67⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\9F19.tmp"C:\Users\Admin\AppData\Local\Temp\9F19.tmp"68⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\9F96.tmp"C:\Users\Admin\AppData\Local\Temp\9F96.tmp"69⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\A081.tmp"C:\Users\Admin\AppData\Local\Temp\A081.tmp"70⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\A1F8.tmp"C:\Users\Admin\AppData\Local\Temp\A1F8.tmp"71⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"72⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\A39E.tmp"C:\Users\Admin\AppData\Local\Temp\A39E.tmp"73⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\A42A.tmp"C:\Users\Admin\AppData\Local\Temp\A42A.tmp"74⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\A4A7.tmp"C:\Users\Admin\AppData\Local\Temp\A4A7.tmp"75⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\A515.tmp"C:\Users\Admin\AppData\Local\Temp\A515.tmp"76⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"77⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\A61E.tmp"C:\Users\Admin\AppData\Local\Temp\A61E.tmp"78⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\A68C.tmp"C:\Users\Admin\AppData\Local\Temp\A68C.tmp"79⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\A6E9.tmp"C:\Users\Admin\AppData\Local\Temp\A6E9.tmp"80⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\A757.tmp"C:\Users\Admin\AppData\Local\Temp\A757.tmp"81⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\A7C4.tmp"C:\Users\Admin\AppData\Local\Temp\A7C4.tmp"82⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\A851.tmp"C:\Users\Admin\AppData\Local\Temp\A851.tmp"83⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"84⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\A96A.tmp"C:\Users\Admin\AppData\Local\Temp\A96A.tmp"85⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\A9E7.tmp"C:\Users\Admin\AppData\Local\Temp\A9E7.tmp"86⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\AA45.tmp"C:\Users\Admin\AppData\Local\Temp\AA45.tmp"87⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\AAB2.tmp"C:\Users\Admin\AppData\Local\Temp\AAB2.tmp"88⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\AB10.tmp"C:\Users\Admin\AppData\Local\Temp\AB10.tmp"89⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\AB8D.tmp"C:\Users\Admin\AppData\Local\Temp\AB8D.tmp"90⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\ABFA.tmp"C:\Users\Admin\AppData\Local\Temp\ABFA.tmp"91⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\AC77.tmp"C:\Users\Admin\AppData\Local\Temp\AC77.tmp"92⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\ACD5.tmp"C:\Users\Admin\AppData\Local\Temp\ACD5.tmp"93⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\AD52.tmp"C:\Users\Admin\AppData\Local\Temp\AD52.tmp"94⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\AE1D.tmp"C:\Users\Admin\AppData\Local\Temp\AE1D.tmp"95⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\AED9.tmp"C:\Users\Admin\AppData\Local\Temp\AED9.tmp"96⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\AF46.tmp"C:\Users\Admin\AppData\Local\Temp\AF46.tmp"97⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\AFA4.tmp"C:\Users\Admin\AppData\Local\Temp\AFA4.tmp"98⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\B021.tmp"C:\Users\Admin\AppData\Local\Temp\B021.tmp"99⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\B07F.tmp"C:\Users\Admin\AppData\Local\Temp\B07F.tmp"100⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"101⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\B169.tmp"C:\Users\Admin\AppData\Local\Temp\B169.tmp"102⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"103⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\B244.tmp"C:\Users\Admin\AppData\Local\Temp\B244.tmp"104⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"105⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\B30F.tmp"C:\Users\Admin\AppData\Local\Temp\B30F.tmp"106⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\B39B.tmp"C:\Users\Admin\AppData\Local\Temp\B39B.tmp"107⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\B428.tmp"C:\Users\Admin\AppData\Local\Temp\B428.tmp"108⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"109⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\B503.tmp"C:\Users\Admin\AppData\Local\Temp\B503.tmp"110⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\B580.tmp"C:\Users\Admin\AppData\Local\Temp\B580.tmp"111⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\B5CE.tmp"C:\Users\Admin\AppData\Local\Temp\B5CE.tmp"112⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\B63B.tmp"C:\Users\Admin\AppData\Local\Temp\B63B.tmp"113⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\B6A9.tmp"C:\Users\Admin\AppData\Local\Temp\B6A9.tmp"114⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\B716.tmp"C:\Users\Admin\AppData\Local\Temp\B716.tmp"115⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\B783.tmp"C:\Users\Admin\AppData\Local\Temp\B783.tmp"116⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\B810.tmp"C:\Users\Admin\AppData\Local\Temp\B810.tmp"117⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"118⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\B91A.tmp"C:\Users\Admin\AppData\Local\Temp\B91A.tmp"119⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\B9A6.tmp"C:\Users\Admin\AppData\Local\Temp\B9A6.tmp"120⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\BA33.tmp"C:\Users\Admin\AppData\Local\Temp\BA33.tmp"121⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\BAB0.tmp"C:\Users\Admin\AppData\Local\Temp\BAB0.tmp"122⤵PID:464
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-