Analysis
-
max time kernel
163s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe
-
Size
486KB
-
MD5
fdcb2a2f7666681336f1172626cd1dc7
-
SHA1
ac8873646a5202e4119f366498562bfc87ac3d9b
-
SHA256
e341893ea4a8841d8742f68402e6b3a4a3890f6f2c1a834e50dee430a68b6ba6
-
SHA512
99b418ecefbf4bd83f38d66a49056c3310319ade3c786cd3c3bafd6bd0fe53066e0029e8d0fa0e9289f214eba2f3a717fc790dd5e7ab172b67a0907c9ba71bb2
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7jAjv/FYgJyTU/07p5cY9Or/LSeTwigXtmBuX:/U5rCOTeiDExfyTxYDLqjLNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 528 ED2F.tmp 1632 F676.tmp 2916 F702.tmp 368 F78F.tmp 2300 F7FC.tmp 2128 F9C1.tmp 2288 FA1F.tmp 2192 887.tmp 4160 1037.tmp 4832 198E.tmp 1540 1C4D.tmp 3220 1D57.tmp 3540 1F7A.tmp 4112 20C2.tmp 4068 214E.tmp 3292 21BC.tmp 2260 22E5.tmp 2320 23EE.tmp 1116 24AA.tmp 1100 25B3.tmp 788 2630.tmp 572 26CD.tmp 1748 272A.tmp 4516 27B7.tmp 4752 2872.tmp 3136 28FF.tmp 2768 297C.tmp 820 29F9.tmp 2292 2A86.tmp 4972 2B70.tmp 2772 2BED.tmp 4352 2C5A.tmp 2308 2CE7.tmp 4404 2DB2.tmp 784 2E4E.tmp 3896 2EDB.tmp 4512 2F68.tmp 2816 3004.tmp 2960 3081.tmp 4948 3227.tmp 556 32C3.tmp 2828 3330.tmp 2980 33CD.tmp 4600 344A.tmp 1304 3563.tmp 2156 3812.tmp 3600 38ED.tmp 3204 396A.tmp 1900 39E7.tmp 4440 3A55.tmp 4156 3BEB.tmp 2520 3C58.tmp 2092 3CF4.tmp 2060 3D91.tmp 4248 3E2D.tmp 932 3EAA.tmp 1564 3F08.tmp 3900 3FF2.tmp 3812 4590.tmp 4668 500F.tmp 4912 554F.tmp 4936 62CC.tmp 844 69D1.tmp 5052 70F5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 528 2960 2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe 87 PID 2960 wrote to memory of 528 2960 2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe 87 PID 2960 wrote to memory of 528 2960 2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe 87 PID 528 wrote to memory of 1632 528 ED2F.tmp 90 PID 528 wrote to memory of 1632 528 ED2F.tmp 90 PID 528 wrote to memory of 1632 528 ED2F.tmp 90 PID 1632 wrote to memory of 2916 1632 F676.tmp 92 PID 1632 wrote to memory of 2916 1632 F676.tmp 92 PID 1632 wrote to memory of 2916 1632 F676.tmp 92 PID 2916 wrote to memory of 368 2916 F702.tmp 93 PID 2916 wrote to memory of 368 2916 F702.tmp 93 PID 2916 wrote to memory of 368 2916 F702.tmp 93 PID 368 wrote to memory of 2300 368 F78F.tmp 94 PID 368 wrote to memory of 2300 368 F78F.tmp 94 PID 368 wrote to memory of 2300 368 F78F.tmp 94 PID 2300 wrote to memory of 2128 2300 F7FC.tmp 95 PID 2300 wrote to memory of 2128 2300 F7FC.tmp 95 PID 2300 wrote to memory of 2128 2300 F7FC.tmp 95 PID 2128 wrote to memory of 2288 2128 F9C1.tmp 96 PID 2128 wrote to memory of 2288 2128 F9C1.tmp 96 PID 2128 wrote to memory of 2288 2128 F9C1.tmp 96 PID 2288 wrote to memory of 2192 2288 FA1F.tmp 97 PID 2288 wrote to memory of 2192 2288 FA1F.tmp 97 PID 2288 wrote to memory of 2192 2288 FA1F.tmp 97 PID 2192 wrote to memory of 4160 2192 887.tmp 98 PID 2192 wrote to memory of 4160 2192 887.tmp 98 PID 2192 wrote to memory of 4160 2192 887.tmp 98 PID 4160 wrote to memory of 4832 4160 1037.tmp 99 PID 4160 wrote to memory of 4832 4160 1037.tmp 99 PID 4160 wrote to memory of 4832 4160 1037.tmp 99 PID 4832 wrote to memory of 1540 4832 198E.tmp 100 PID 4832 wrote to memory of 1540 4832 198E.tmp 100 PID 4832 wrote to memory of 1540 4832 198E.tmp 100 PID 1540 wrote to memory of 3220 1540 1C4D.tmp 101 PID 1540 wrote to memory of 3220 1540 1C4D.tmp 101 PID 1540 wrote to memory of 3220 1540 1C4D.tmp 101 PID 3220 wrote to memory of 3540 3220 1D57.tmp 102 PID 3220 wrote to memory of 3540 3220 1D57.tmp 102 PID 3220 wrote to memory of 3540 3220 1D57.tmp 102 PID 3540 wrote to memory of 4112 3540 1F7A.tmp 103 PID 3540 wrote to memory of 4112 3540 1F7A.tmp 103 PID 3540 wrote to memory of 4112 3540 1F7A.tmp 103 PID 4112 wrote to memory of 4068 4112 20C2.tmp 105 PID 4112 wrote to memory of 4068 4112 20C2.tmp 105 PID 4112 wrote to memory of 4068 4112 20C2.tmp 105 PID 4068 wrote to memory of 3292 4068 214E.tmp 106 PID 4068 wrote to memory of 3292 4068 214E.tmp 106 PID 4068 wrote to memory of 3292 4068 214E.tmp 106 PID 3292 wrote to memory of 2260 3292 21BC.tmp 107 PID 3292 wrote to memory of 2260 3292 21BC.tmp 107 PID 3292 wrote to memory of 2260 3292 21BC.tmp 107 PID 2260 wrote to memory of 2320 2260 22E5.tmp 108 PID 2260 wrote to memory of 2320 2260 22E5.tmp 108 PID 2260 wrote to memory of 2320 2260 22E5.tmp 108 PID 2320 wrote to memory of 1116 2320 23EE.tmp 109 PID 2320 wrote to memory of 1116 2320 23EE.tmp 109 PID 2320 wrote to memory of 1116 2320 23EE.tmp 109 PID 1116 wrote to memory of 1100 1116 24AA.tmp 110 PID 1116 wrote to memory of 1100 1116 24AA.tmp 110 PID 1116 wrote to memory of 1100 1116 24AA.tmp 110 PID 1100 wrote to memory of 788 1100 25B3.tmp 111 PID 1100 wrote to memory of 788 1100 25B3.tmp 111 PID 1100 wrote to memory of 788 1100 25B3.tmp 111 PID 788 wrote to memory of 572 788 2630.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_fdcb2a2f7666681336f1172626cd1dc7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\F78F.tmp"C:\Users\Admin\AppData\Local\Temp\F78F.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\887.tmp"C:\Users\Admin\AppData\Local\Temp\887.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\198E.tmp"C:\Users\Admin\AppData\Local\Temp\198E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\20C2.tmp"C:\Users\Admin\AppData\Local\Temp\20C2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\21BC.tmp"C:\Users\Admin\AppData\Local\Temp\21BC.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\23EE.tmp"C:\Users\Admin\AppData\Local\Temp\23EE.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\24AA.tmp"C:\Users\Admin\AppData\Local\Temp\24AA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\2630.tmp"C:\Users\Admin\AppData\Local\Temp\2630.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\26CD.tmp"C:\Users\Admin\AppData\Local\Temp\26CD.tmp"23⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\272A.tmp"C:\Users\Admin\AppData\Local\Temp\272A.tmp"24⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"25⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\2872.tmp"C:\Users\Admin\AppData\Local\Temp\2872.tmp"26⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\28FF.tmp"C:\Users\Admin\AppData\Local\Temp\28FF.tmp"27⤵
- Executes dropped EXE
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"28⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"29⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\2A86.tmp"C:\Users\Admin\AppData\Local\Temp\2A86.tmp"30⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\2B70.tmp"C:\Users\Admin\AppData\Local\Temp\2B70.tmp"31⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"32⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"33⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"34⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"35⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"36⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"37⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\2F68.tmp"C:\Users\Admin\AppData\Local\Temp\2F68.tmp"38⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3004.tmp"C:\Users\Admin\AppData\Local\Temp\3004.tmp"39⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"40⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"41⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"42⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"43⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"44⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"45⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3563.tmp"C:\Users\Admin\AppData\Local\Temp\3563.tmp"46⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"47⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"48⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\396A.tmp"C:\Users\Admin\AppData\Local\Temp\396A.tmp"49⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"50⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"51⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"52⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"53⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"54⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"55⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"56⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"57⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"58⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"59⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"60⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\500F.tmp"C:\Users\Admin\AppData\Local\Temp\500F.tmp"61⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\554F.tmp"C:\Users\Admin\AppData\Local\Temp\554F.tmp"62⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\62CC.tmp"C:\Users\Admin\AppData\Local\Temp\62CC.tmp"63⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\69D1.tmp"C:\Users\Admin\AppData\Local\Temp\69D1.tmp"64⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\70F5.tmp"C:\Users\Admin\AppData\Local\Temp\70F5.tmp"65⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"66⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\824A.tmp"C:\Users\Admin\AppData\Local\Temp\824A.tmp"67⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\8F99.tmp"C:\Users\Admin\AppData\Local\Temp\8F99.tmp"68⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\9A37.tmp"C:\Users\Admin\AppData\Local\Temp\9A37.tmp"69⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\A43A.tmp"C:\Users\Admin\AppData\Local\Temp\A43A.tmp"70⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\A4D6.tmp"C:\Users\Admin\AppData\Local\Temp\A4D6.tmp"71⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\A5C1.tmp"C:\Users\Admin\AppData\Local\Temp\A5C1.tmp"72⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\A62E.tmp"C:\Users\Admin\AppData\Local\Temp\A62E.tmp"73⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\A68C.tmp"C:\Users\Admin\AppData\Local\Temp\A68C.tmp"74⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\A6F9.tmp"C:\Users\Admin\AppData\Local\Temp\A6F9.tmp"75⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\AF85.tmp"C:\Users\Admin\AppData\Local\Temp\AF85.tmp"76⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\B735.tmp"C:\Users\Admin\AppData\Local\Temp\B735.tmp"77⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\BD8E.tmp"C:\Users\Admin\AppData\Local\Temp\BD8E.tmp"78⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\EF4D.tmp"C:\Users\Admin\AppData\Local\Temp\EF4D.tmp"79⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\F112.tmp"C:\Users\Admin\AppData\Local\Temp\F112.tmp"80⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\FB24.tmp"C:\Users\Admin\AppData\Local\Temp\FB24.tmp"81⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\FDA5.tmp"C:\Users\Admin\AppData\Local\Temp\FDA5.tmp"82⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\FF99.tmp"C:\Users\Admin\AppData\Local\Temp\FF99.tmp"83⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\7C6.tmp"C:\Users\Admin\AppData\Local\Temp\7C6.tmp"84⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\E9C.tmp"C:\Users\Admin\AppData\Local\Temp\E9C.tmp"85⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\FD5.tmp"C:\Users\Admin\AppData\Local\Temp\FD5.tmp"86⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\1071.tmp"C:\Users\Admin\AppData\Local\Temp\1071.tmp"87⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\1207.tmp"C:\Users\Admin\AppData\Local\Temp\1207.tmp"88⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\1340.tmp"C:\Users\Admin\AppData\Local\Temp\1340.tmp"89⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\14D6.tmp"C:\Users\Admin\AppData\Local\Temp\14D6.tmp"90⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\163D.tmp"C:\Users\Admin\AppData\Local\Temp\163D.tmp"91⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\1766.tmp"C:\Users\Admin\AppData\Local\Temp\1766.tmp"92⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\18CE.tmp"C:\Users\Admin\AppData\Local\Temp\18CE.tmp"93⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"94⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\1A25.tmp"C:\Users\Admin\AppData\Local\Temp\1A25.tmp"95⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"96⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\1B6E.tmp"C:\Users\Admin\AppData\Local\Temp\1B6E.tmp"97⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\1C48.tmp"C:\Users\Admin\AppData\Local\Temp\1C48.tmp"98⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\1CE5.tmp"C:\Users\Admin\AppData\Local\Temp\1CE5.tmp"99⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\1D42.tmp"C:\Users\Admin\AppData\Local\Temp\1D42.tmp"100⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\1DB0.tmp"C:\Users\Admin\AppData\Local\Temp\1DB0.tmp"101⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\1E1D.tmp"C:\Users\Admin\AppData\Local\Temp\1E1D.tmp"102⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\1EC9.tmp"C:\Users\Admin\AppData\Local\Temp\1EC9.tmp"103⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\1F65.tmp"C:\Users\Admin\AppData\Local\Temp\1F65.tmp"104⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\2011.tmp"C:\Users\Admin\AppData\Local\Temp\2011.tmp"105⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\20BD.tmp"C:\Users\Admin\AppData\Local\Temp\20BD.tmp"106⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\213A.tmp"C:\Users\Admin\AppData\Local\Temp\213A.tmp"107⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\2198.tmp"C:\Users\Admin\AppData\Local\Temp\2198.tmp"108⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\21F5.tmp"C:\Users\Admin\AppData\Local\Temp\21F5.tmp"109⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2272.tmp"C:\Users\Admin\AppData\Local\Temp\2272.tmp"110⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\22D0.tmp"C:\Users\Admin\AppData\Local\Temp\22D0.tmp"111⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\232E.tmp"C:\Users\Admin\AppData\Local\Temp\232E.tmp"112⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\238C.tmp"C:\Users\Admin\AppData\Local\Temp\238C.tmp"113⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\23F9.tmp"C:\Users\Admin\AppData\Local\Temp\23F9.tmp"114⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2466.tmp"C:\Users\Admin\AppData\Local\Temp\2466.tmp"115⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\24F3.tmp"C:\Users\Admin\AppData\Local\Temp\24F3.tmp"116⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\25DD.tmp"C:\Users\Admin\AppData\Local\Temp\25DD.tmp"117⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2716.tmp"C:\Users\Admin\AppData\Local\Temp\2716.tmp"118⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\2D11.tmp"C:\Users\Admin\AppData\Local\Temp\2D11.tmp"119⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\2F15.tmp"C:\Users\Admin\AppData\Local\Temp\2F15.tmp"120⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2F92.tmp"C:\Users\Admin\AppData\Local\Temp\2F92.tmp"121⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3668.tmp"C:\Users\Admin\AppData\Local\Temp\3668.tmp"122⤵PID:1668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-