Analysis
-
max time kernel
164s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe
-
Size
488KB
-
MD5
ee82ac17d82796624e3591e2d09ca1f9
-
SHA1
2cb1bf6647360bd317247d24e1004861a50c0706
-
SHA256
d207cff066d7f19e1042dedf6b3cbd12601b4ca4b48cc388354a4b54b16683ce
-
SHA512
054bac6c0476ee34f9cb3b86fedc40ff24ca179b03fbb9a997c59011be7e558711d3da6f821ac1bd304fdf554e0a6436501a12c67a3f39b594d0646fa0f71c16
-
SSDEEP
12288:/U5rCOTeiDoB+l8D0LTOUOqEzHRjwUBWNZ:/UQOJDoB+OdjBBWN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4044 57CF.tmp 964 5E28.tmp 3692 5EB5.tmp 3480 5F9F.tmp 2756 60D8.tmp 3640 6174.tmp 4016 63A7.tmp 3600 64A1.tmp 2252 6695.tmp 4104 677F.tmp 4476 6906.tmp 4452 6BE4.tmp 3168 6CCE.tmp 1068 6E65.tmp 1600 7059.tmp 3736 7337.tmp 4424 7579.tmp 1404 774E.tmp 4684 79A0.tmp 3328 7C11.tmp 496 7C9D.tmp 3712 8037.tmp 2352 825A.tmp 4128 83E1.tmp 1872 8623.tmp 1152 87C9.tmp 2288 8855.tmp 3744 8BA1.tmp 4196 8CF9.tmp 3008 8E22.tmp 32 9016.tmp 4544 911F.tmp 3024 92B6.tmp 5044 9371.tmp 4884 95C3.tmp 2172 9749.tmp 1692 990F.tmp 3492 9B22.tmp 216 9C2B.tmp 2228 9CB8.tmp 996 9E10.tmp 1516 9F87.tmp 1060 A330.tmp 1260 A38E.tmp 4344 A524.tmp 4524 A592.tmp 392 A766.tmp 3260 AA45.tmp 728 ABDB.tmp 828 ACB6.tmp 1324 AD23.tmp 1884 ADA0.tmp 1424 B06F.tmp 3096 B198.tmp 3976 B224.tmp 2496 B6D8.tmp 4620 B820.tmp 1640 B88D.tmp 3224 B9C6.tmp 1320 BC56.tmp 388 BCD3.tmp 2176 BD50.tmp 2964 BDEC.tmp 2984 BFB1.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 4044 1972 2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe 90 PID 1972 wrote to memory of 4044 1972 2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe 90 PID 1972 wrote to memory of 4044 1972 2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe 90 PID 4044 wrote to memory of 964 4044 57CF.tmp 91 PID 4044 wrote to memory of 964 4044 57CF.tmp 91 PID 4044 wrote to memory of 964 4044 57CF.tmp 91 PID 964 wrote to memory of 3692 964 5E28.tmp 92 PID 964 wrote to memory of 3692 964 5E28.tmp 92 PID 964 wrote to memory of 3692 964 5E28.tmp 92 PID 3692 wrote to memory of 3480 3692 5EB5.tmp 93 PID 3692 wrote to memory of 3480 3692 5EB5.tmp 93 PID 3692 wrote to memory of 3480 3692 5EB5.tmp 93 PID 3480 wrote to memory of 2756 3480 5F9F.tmp 94 PID 3480 wrote to memory of 2756 3480 5F9F.tmp 94 PID 3480 wrote to memory of 2756 3480 5F9F.tmp 94 PID 2756 wrote to memory of 3640 2756 60D8.tmp 95 PID 2756 wrote to memory of 3640 2756 60D8.tmp 95 PID 2756 wrote to memory of 3640 2756 60D8.tmp 95 PID 3640 wrote to memory of 4016 3640 6174.tmp 96 PID 3640 wrote to memory of 4016 3640 6174.tmp 96 PID 3640 wrote to memory of 4016 3640 6174.tmp 96 PID 4016 wrote to memory of 3600 4016 63A7.tmp 97 PID 4016 wrote to memory of 3600 4016 63A7.tmp 97 PID 4016 wrote to memory of 3600 4016 63A7.tmp 97 PID 3600 wrote to memory of 2252 3600 64A1.tmp 98 PID 3600 wrote to memory of 2252 3600 64A1.tmp 98 PID 3600 wrote to memory of 2252 3600 64A1.tmp 98 PID 2252 wrote to memory of 4104 2252 6695.tmp 99 PID 2252 wrote to memory of 4104 2252 6695.tmp 99 PID 2252 wrote to memory of 4104 2252 6695.tmp 99 PID 4104 wrote to memory of 4476 4104 677F.tmp 100 PID 4104 wrote to memory of 4476 4104 677F.tmp 100 PID 4104 wrote to memory of 4476 4104 677F.tmp 100 PID 4476 wrote to memory of 4452 4476 6906.tmp 101 PID 4476 wrote to memory of 4452 4476 6906.tmp 101 PID 4476 wrote to memory of 4452 4476 6906.tmp 101 PID 4452 wrote to memory of 3168 4452 6BE4.tmp 102 PID 4452 wrote to memory of 3168 4452 6BE4.tmp 102 PID 4452 wrote to memory of 3168 4452 6BE4.tmp 102 PID 3168 wrote to memory of 1068 3168 6CCE.tmp 103 PID 3168 wrote to memory of 1068 3168 6CCE.tmp 103 PID 3168 wrote to memory of 1068 3168 6CCE.tmp 103 PID 1068 wrote to memory of 1600 1068 6E65.tmp 104 PID 1068 wrote to memory of 1600 1068 6E65.tmp 104 PID 1068 wrote to memory of 1600 1068 6E65.tmp 104 PID 1600 wrote to memory of 3736 1600 7059.tmp 105 PID 1600 wrote to memory of 3736 1600 7059.tmp 105 PID 1600 wrote to memory of 3736 1600 7059.tmp 105 PID 3736 wrote to memory of 4424 3736 7337.tmp 106 PID 3736 wrote to memory of 4424 3736 7337.tmp 106 PID 3736 wrote to memory of 4424 3736 7337.tmp 106 PID 4424 wrote to memory of 1404 4424 7579.tmp 107 PID 4424 wrote to memory of 1404 4424 7579.tmp 107 PID 4424 wrote to memory of 1404 4424 7579.tmp 107 PID 1404 wrote to memory of 4684 1404 774E.tmp 108 PID 1404 wrote to memory of 4684 1404 774E.tmp 108 PID 1404 wrote to memory of 4684 1404 774E.tmp 108 PID 4684 wrote to memory of 3328 4684 79A0.tmp 109 PID 4684 wrote to memory of 3328 4684 79A0.tmp 109 PID 4684 wrote to memory of 3328 4684 79A0.tmp 109 PID 3328 wrote to memory of 496 3328 7C11.tmp 110 PID 3328 wrote to memory of 496 3328 7C11.tmp 110 PID 3328 wrote to memory of 496 3328 7C11.tmp 110 PID 496 wrote to memory of 3712 496 7C9D.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_ee82ac17d82796624e3591e2d09ca1f9_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\57CF.tmp"C:\Users\Admin\AppData\Local\Temp\57CF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\6174.tmp"C:\Users\Admin\AppData\Local\Temp\6174.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\63A7.tmp"C:\Users\Admin\AppData\Local\Temp\63A7.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\64A1.tmp"C:\Users\Admin\AppData\Local\Temp\64A1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\6695.tmp"C:\Users\Admin\AppData\Local\Temp\6695.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\677F.tmp"C:\Users\Admin\AppData\Local\Temp\677F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\6E65.tmp"C:\Users\Admin\AppData\Local\Temp\6E65.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\7059.tmp"C:\Users\Admin\AppData\Local\Temp\7059.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\7337.tmp"C:\Users\Admin\AppData\Local\Temp\7337.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\7579.tmp"C:\Users\Admin\AppData\Local\Temp\7579.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\79A0.tmp"C:\Users\Admin\AppData\Local\Temp\79A0.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\7C11.tmp"C:\Users\Admin\AppData\Local\Temp\7C11.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\8037.tmp"C:\Users\Admin\AppData\Local\Temp\8037.tmp"23⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\825A.tmp"C:\Users\Admin\AppData\Local\Temp\825A.tmp"24⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\83E1.tmp"C:\Users\Admin\AppData\Local\Temp\83E1.tmp"25⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\8623.tmp"C:\Users\Admin\AppData\Local\Temp\8623.tmp"26⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\87C9.tmp"C:\Users\Admin\AppData\Local\Temp\87C9.tmp"27⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\8855.tmp"C:\Users\Admin\AppData\Local\Temp\8855.tmp"28⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"29⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\8CF9.tmp"C:\Users\Admin\AppData\Local\Temp\8CF9.tmp"30⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\8E22.tmp"C:\Users\Admin\AppData\Local\Temp\8E22.tmp"31⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\9016.tmp"C:\Users\Admin\AppData\Local\Temp\9016.tmp"32⤵
- Executes dropped EXE
PID:32 -
C:\Users\Admin\AppData\Local\Temp\911F.tmp"C:\Users\Admin\AppData\Local\Temp\911F.tmp"33⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\92B6.tmp"C:\Users\Admin\AppData\Local\Temp\92B6.tmp"34⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\9371.tmp"C:\Users\Admin\AppData\Local\Temp\9371.tmp"35⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\95C3.tmp"C:\Users\Admin\AppData\Local\Temp\95C3.tmp"36⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\9749.tmp"C:\Users\Admin\AppData\Local\Temp\9749.tmp"37⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\990F.tmp"C:\Users\Admin\AppData\Local\Temp\990F.tmp"38⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\9B22.tmp"C:\Users\Admin\AppData\Local\Temp\9B22.tmp"39⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"40⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"41⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\9E10.tmp"C:\Users\Admin\AppData\Local\Temp\9E10.tmp"42⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\9F87.tmp"C:\Users\Admin\AppData\Local\Temp\9F87.tmp"43⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\A330.tmp"C:\Users\Admin\AppData\Local\Temp\A330.tmp"44⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\A38E.tmp"C:\Users\Admin\AppData\Local\Temp\A38E.tmp"45⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\A524.tmp"C:\Users\Admin\AppData\Local\Temp\A524.tmp"46⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\A592.tmp"C:\Users\Admin\AppData\Local\Temp\A592.tmp"47⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\A766.tmp"C:\Users\Admin\AppData\Local\Temp\A766.tmp"48⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\AA45.tmp"C:\Users\Admin\AppData\Local\Temp\AA45.tmp"49⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"50⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\ACB6.tmp"C:\Users\Admin\AppData\Local\Temp\ACB6.tmp"51⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\AD23.tmp"C:\Users\Admin\AppData\Local\Temp\AD23.tmp"52⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\ADA0.tmp"C:\Users\Admin\AppData\Local\Temp\ADA0.tmp"53⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\B06F.tmp"C:\Users\Admin\AppData\Local\Temp\B06F.tmp"54⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\B198.tmp"C:\Users\Admin\AppData\Local\Temp\B198.tmp"55⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\B224.tmp"C:\Users\Admin\AppData\Local\Temp\B224.tmp"56⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\B6D8.tmp"C:\Users\Admin\AppData\Local\Temp\B6D8.tmp"57⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\B820.tmp"C:\Users\Admin\AppData\Local\Temp\B820.tmp"58⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\B88D.tmp"C:\Users\Admin\AppData\Local\Temp\B88D.tmp"59⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\B9C6.tmp"C:\Users\Admin\AppData\Local\Temp\B9C6.tmp"60⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\BC56.tmp"C:\Users\Admin\AppData\Local\Temp\BC56.tmp"61⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\BCD3.tmp"C:\Users\Admin\AppData\Local\Temp\BCD3.tmp"62⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\BD50.tmp"C:\Users\Admin\AppData\Local\Temp\BD50.tmp"63⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\BDEC.tmp"C:\Users\Admin\AppData\Local\Temp\BDEC.tmp"64⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\BFB1.tmp"C:\Users\Admin\AppData\Local\Temp\BFB1.tmp"65⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\C232.tmp"C:\Users\Admin\AppData\Local\Temp\C232.tmp"66⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\C2AF.tmp"C:\Users\Admin\AppData\Local\Temp\C2AF.tmp"67⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\C435.tmp"C:\Users\Admin\AppData\Local\Temp\C435.tmp"68⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\C629.tmp"C:\Users\Admin\AppData\Local\Temp\C629.tmp"69⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\C697.tmp"C:\Users\Admin\AppData\Local\Temp\C697.tmp"70⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\C704.tmp"C:\Users\Admin\AppData\Local\Temp\C704.tmp"71⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\C781.tmp"C:\Users\Admin\AppData\Local\Temp\C781.tmp"72⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\C956.tmp"C:\Users\Admin\AppData\Local\Temp\C956.tmp"73⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\C9B4.tmp"C:\Users\Admin\AppData\Local\Temp\C9B4.tmp"74⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\CA40.tmp"C:\Users\Admin\AppData\Local\Temp\CA40.tmp"75⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\CB5A.tmp"C:\Users\Admin\AppData\Local\Temp\CB5A.tmp"76⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\CBE6.tmp"C:\Users\Admin\AppData\Local\Temp\CBE6.tmp"77⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\CC54.tmp"C:\Users\Admin\AppData\Local\Temp\CC54.tmp"78⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\CCD1.tmp"C:\Users\Admin\AppData\Local\Temp\CCD1.tmp"79⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\CE09.tmp"C:\Users\Admin\AppData\Local\Temp\CE09.tmp"80⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\CE86.tmp"C:\Users\Admin\AppData\Local\Temp\CE86.tmp"81⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"82⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\CF70.tmp"C:\Users\Admin\AppData\Local\Temp\CF70.tmp"83⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"84⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\D07A.tmp"C:\Users\Admin\AppData\Local\Temp\D07A.tmp"85⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\D193.tmp"C:\Users\Admin\AppData\Local\Temp\D193.tmp"86⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\D210.tmp"C:\Users\Admin\AppData\Local\Temp\D210.tmp"87⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\D26E.tmp"C:\Users\Admin\AppData\Local\Temp\D26E.tmp"88⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\D2EB.tmp"C:\Users\Admin\AppData\Local\Temp\D2EB.tmp"89⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\D433.tmp"C:\Users\Admin\AppData\Local\Temp\D433.tmp"90⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\D4A1.tmp"C:\Users\Admin\AppData\Local\Temp\D4A1.tmp"91⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\D5F8.tmp"C:\Users\Admin\AppData\Local\Temp\D5F8.tmp"92⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\D656.tmp"C:\Users\Admin\AppData\Local\Temp\D656.tmp"93⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\D915.tmp"C:\Users\Admin\AppData\Local\Temp\D915.tmp"94⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\D992.tmp"C:\Users\Admin\AppData\Local\Temp\D992.tmp"95⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\DA0F.tmp"C:\Users\Admin\AppData\Local\Temp\DA0F.tmp"96⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\DA8C.tmp"C:\Users\Admin\AppData\Local\Temp\DA8C.tmp"97⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\DC22.tmp"C:\Users\Admin\AppData\Local\Temp\DC22.tmp"98⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\DCCE.tmp"C:\Users\Admin\AppData\Local\Temp\DCCE.tmp"99⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\DD4B.tmp"C:\Users\Admin\AppData\Local\Temp\DD4B.tmp"100⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\DDC8.tmp"C:\Users\Admin\AppData\Local\Temp\DDC8.tmp"101⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\DF8D.tmp"C:\Users\Admin\AppData\Local\Temp\DF8D.tmp"102⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\E00A.tmp"C:\Users\Admin\AppData\Local\Temp\E00A.tmp"103⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\E421.tmp"C:\Users\Admin\AppData\Local\Temp\E421.tmp"104⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\E4CD.tmp"C:\Users\Admin\AppData\Local\Temp\E4CD.tmp"105⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\E54A.tmp"C:\Users\Admin\AppData\Local\Temp\E54A.tmp"106⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\E5A8.tmp"C:\Users\Admin\AppData\Local\Temp\E5A8.tmp"107⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\E72F.tmp"C:\Users\Admin\AppData\Local\Temp\E72F.tmp"108⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\E7AC.tmp"C:\Users\Admin\AppData\Local\Temp\E7AC.tmp"109⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\E838.tmp"C:\Users\Admin\AppData\Local\Temp\E838.tmp"110⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\EA2C.tmp"C:\Users\Admin\AppData\Local\Temp\EA2C.tmp"111⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\EAA9.tmp"C:\Users\Admin\AppData\Local\Temp\EAA9.tmp"112⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\EB94.tmp"C:\Users\Admin\AppData\Local\Temp\EB94.tmp"113⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\EC11.tmp"C:\Users\Admin\AppData\Local\Temp\EC11.tmp"114⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"115⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\ED0B.tmp"C:\Users\Admin\AppData\Local\Temp\ED0B.tmp"116⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\EE53.tmp"C:\Users\Admin\AppData\Local\Temp\EE53.tmp"117⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\F076.tmp"C:\Users\Admin\AppData\Local\Temp\F076.tmp"118⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\F102.tmp"C:\Users\Admin\AppData\Local\Temp\F102.tmp"119⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\F2C7.tmp"C:\Users\Admin\AppData\Local\Temp\F2C7.tmp"120⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\F335.tmp"C:\Users\Admin\AppData\Local\Temp\F335.tmp"121⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\F3A2.tmp"C:\Users\Admin\AppData\Local\Temp\F3A2.tmp"122⤵PID:1956
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-