Analysis
-
max time kernel
156s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 06:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe
-
Size
486KB
-
MD5
770e45db7bd2cbe45fe14e511382b6c6
-
SHA1
41c702f4c0d2f1c1b307646ba309bc12e54a1fb3
-
SHA256
1ae9f2a856acb53d670f4482b7180c9fcd9433fae29c24c090d1f2feb2328a08
-
SHA512
e970d90b33421590e5a0a5c43c55f313ad5e06d7906e96b850495dcc9e90420bb81015efaa74f2f1aeabd19babce96c6c6aa8cd7dc204f1ea78d46cbb1cebc88
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7y5+MyphwxffPZOFbcZR1FhRbKF5mORDygsHT:/U5rCOTeiDygT6pfP6gZVhRq8ORD0NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5076 86B4.tmp 3924 89A2.tmp 2540 8A3E.tmp 4552 8B87.tmp 1784 8C04.tmp 2900 8C90.tmp 4248 8CFE.tmp 4068 8D7B.tmp 2528 8DF8.tmp 3220 8E55.tmp 3204 8EE2.tmp 4128 8F5F.tmp 1832 8FCC.tmp 896 9124.tmp 836 91B1.tmp 1440 922E.tmp 4572 92AB.tmp 2592 9308.tmp 3004 9385.tmp 4748 9422.tmp 1628 94BE.tmp 4048 9683.tmp 552 971F.tmp 2680 97EA.tmp 2828 9867.tmp 492 9913.tmp 1556 99CF.tmp 400 9A5B.tmp 3008 9D0B.tmp 4928 9E34.tmp 4964 9EA1.tmp 3852 9F0F.tmp 4520 9F8C.tmp 2192 A047.tmp 2820 A0A5.tmp 3964 A112.tmp 3620 A19F.tmp 4132 A21C.tmp 1172 A289.tmp 5080 A306.tmp 2080 A374.tmp 1568 A41F.tmp 3672 A49C.tmp 4784 A519.tmp 1708 A95F.tmp 3576 A9EC.tmp 2900 AA59.tmp 4780 AB72.tmp 2692 AC0F.tmp 2584 ACAB.tmp 4856 AD28.tmp 3844 ADC4.tmp 3204 AE60.tmp 3784 AF0C.tmp 2116 AFB8.tmp 3900 B798.tmp 2576 BA67.tmp 4180 BAC4.tmp 1836 BB32.tmp 3440 BB80.tmp 1896 BBED.tmp 644 BC7A.tmp 1344 BCF7.tmp 2648 BFB6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 5076 4728 2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe 86 PID 4728 wrote to memory of 5076 4728 2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe 86 PID 4728 wrote to memory of 5076 4728 2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe 86 PID 5076 wrote to memory of 3924 5076 86B4.tmp 88 PID 5076 wrote to memory of 3924 5076 86B4.tmp 88 PID 5076 wrote to memory of 3924 5076 86B4.tmp 88 PID 3924 wrote to memory of 2540 3924 89A2.tmp 89 PID 3924 wrote to memory of 2540 3924 89A2.tmp 89 PID 3924 wrote to memory of 2540 3924 89A2.tmp 89 PID 2540 wrote to memory of 4552 2540 8A3E.tmp 91 PID 2540 wrote to memory of 4552 2540 8A3E.tmp 91 PID 2540 wrote to memory of 4552 2540 8A3E.tmp 91 PID 4552 wrote to memory of 1784 4552 8B87.tmp 92 PID 4552 wrote to memory of 1784 4552 8B87.tmp 92 PID 4552 wrote to memory of 1784 4552 8B87.tmp 92 PID 1784 wrote to memory of 2900 1784 8C04.tmp 93 PID 1784 wrote to memory of 2900 1784 8C04.tmp 93 PID 1784 wrote to memory of 2900 1784 8C04.tmp 93 PID 2900 wrote to memory of 4248 2900 8C90.tmp 94 PID 2900 wrote to memory of 4248 2900 8C90.tmp 94 PID 2900 wrote to memory of 4248 2900 8C90.tmp 94 PID 4248 wrote to memory of 4068 4248 8CFE.tmp 95 PID 4248 wrote to memory of 4068 4248 8CFE.tmp 95 PID 4248 wrote to memory of 4068 4248 8CFE.tmp 95 PID 4068 wrote to memory of 2528 4068 8D7B.tmp 96 PID 4068 wrote to memory of 2528 4068 8D7B.tmp 96 PID 4068 wrote to memory of 2528 4068 8D7B.tmp 96 PID 2528 wrote to memory of 3220 2528 8DF8.tmp 97 PID 2528 wrote to memory of 3220 2528 8DF8.tmp 97 PID 2528 wrote to memory of 3220 2528 8DF8.tmp 97 PID 3220 wrote to memory of 3204 3220 8E55.tmp 98 PID 3220 wrote to memory of 3204 3220 8E55.tmp 98 PID 3220 wrote to memory of 3204 3220 8E55.tmp 98 PID 3204 wrote to memory of 4128 3204 8EE2.tmp 99 PID 3204 wrote to memory of 4128 3204 8EE2.tmp 99 PID 3204 wrote to memory of 4128 3204 8EE2.tmp 99 PID 4128 wrote to memory of 1832 4128 8F5F.tmp 100 PID 4128 wrote to memory of 1832 4128 8F5F.tmp 100 PID 4128 wrote to memory of 1832 4128 8F5F.tmp 100 PID 1832 wrote to memory of 896 1832 8FCC.tmp 101 PID 1832 wrote to memory of 896 1832 8FCC.tmp 101 PID 1832 wrote to memory of 896 1832 8FCC.tmp 101 PID 896 wrote to memory of 836 896 9124.tmp 102 PID 896 wrote to memory of 836 896 9124.tmp 102 PID 896 wrote to memory of 836 896 9124.tmp 102 PID 836 wrote to memory of 1440 836 91B1.tmp 103 PID 836 wrote to memory of 1440 836 91B1.tmp 103 PID 836 wrote to memory of 1440 836 91B1.tmp 103 PID 1440 wrote to memory of 4572 1440 922E.tmp 104 PID 1440 wrote to memory of 4572 1440 922E.tmp 104 PID 1440 wrote to memory of 4572 1440 922E.tmp 104 PID 4572 wrote to memory of 2592 4572 92AB.tmp 105 PID 4572 wrote to memory of 2592 4572 92AB.tmp 105 PID 4572 wrote to memory of 2592 4572 92AB.tmp 105 PID 2592 wrote to memory of 3004 2592 9308.tmp 106 PID 2592 wrote to memory of 3004 2592 9308.tmp 106 PID 2592 wrote to memory of 3004 2592 9308.tmp 106 PID 3004 wrote to memory of 4748 3004 9385.tmp 107 PID 3004 wrote to memory of 4748 3004 9385.tmp 107 PID 3004 wrote to memory of 4748 3004 9385.tmp 107 PID 4748 wrote to memory of 1628 4748 9422.tmp 108 PID 4748 wrote to memory of 1628 4748 9422.tmp 108 PID 4748 wrote to memory of 1628 4748 9422.tmp 108 PID 1628 wrote to memory of 4048 1628 94BE.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_770e45db7bd2cbe45fe14e511382b6c6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\89A2.tmp"C:\Users\Admin\AppData\Local\Temp\89A2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\8B87.tmp"C:\Users\Admin\AppData\Local\Temp\8B87.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\8C04.tmp"C:\Users\Admin\AppData\Local\Temp\8C04.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\8C90.tmp"C:\Users\Admin\AppData\Local\Temp\8C90.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\8D7B.tmp"C:\Users\Admin\AppData\Local\Temp\8D7B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\8DF8.tmp"C:\Users\Admin\AppData\Local\Temp\8DF8.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\8E55.tmp"C:\Users\Admin\AppData\Local\Temp\8E55.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\8EE2.tmp"C:\Users\Admin\AppData\Local\Temp\8EE2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\9124.tmp"C:\Users\Admin\AppData\Local\Temp\9124.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\91B1.tmp"C:\Users\Admin\AppData\Local\Temp\91B1.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\92AB.tmp"C:\Users\Admin\AppData\Local\Temp\92AB.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\9308.tmp"C:\Users\Admin\AppData\Local\Temp\9308.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\9385.tmp"C:\Users\Admin\AppData\Local\Temp\9385.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\94BE.tmp"C:\Users\Admin\AppData\Local\Temp\94BE.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\9683.tmp"C:\Users\Admin\AppData\Local\Temp\9683.tmp"23⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\971F.tmp"C:\Users\Admin\AppData\Local\Temp\971F.tmp"24⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"25⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"26⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\9913.tmp"C:\Users\Admin\AppData\Local\Temp\9913.tmp"27⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\99CF.tmp"C:\Users\Admin\AppData\Local\Temp\99CF.tmp"28⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"29⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"30⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"31⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\9EA1.tmp"C:\Users\Admin\AppData\Local\Temp\9EA1.tmp"32⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\9F0F.tmp"C:\Users\Admin\AppData\Local\Temp\9F0F.tmp"33⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"34⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\A047.tmp"C:\Users\Admin\AppData\Local\Temp\A047.tmp"35⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"36⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\A112.tmp"C:\Users\Admin\AppData\Local\Temp\A112.tmp"37⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\A19F.tmp"C:\Users\Admin\AppData\Local\Temp\A19F.tmp"38⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"39⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\A289.tmp"C:\Users\Admin\AppData\Local\Temp\A289.tmp"40⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\A306.tmp"C:\Users\Admin\AppData\Local\Temp\A306.tmp"41⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\A374.tmp"C:\Users\Admin\AppData\Local\Temp\A374.tmp"42⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\A41F.tmp"C:\Users\Admin\AppData\Local\Temp\A41F.tmp"43⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\A49C.tmp"C:\Users\Admin\AppData\Local\Temp\A49C.tmp"44⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\A519.tmp"C:\Users\Admin\AppData\Local\Temp\A519.tmp"45⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\A95F.tmp"C:\Users\Admin\AppData\Local\Temp\A95F.tmp"46⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"47⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\AA59.tmp"C:\Users\Admin\AppData\Local\Temp\AA59.tmp"48⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"49⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"50⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"51⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\AD28.tmp"C:\Users\Admin\AppData\Local\Temp\AD28.tmp"52⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"53⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"54⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"55⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"56⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"57⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\BA67.tmp"C:\Users\Admin\AppData\Local\Temp\BA67.tmp"58⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"59⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\BB32.tmp"C:\Users\Admin\AppData\Local\Temp\BB32.tmp"60⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\BB80.tmp"C:\Users\Admin\AppData\Local\Temp\BB80.tmp"61⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"62⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"63⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"64⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"65⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"66⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\C12D.tmp"C:\Users\Admin\AppData\Local\Temp\C12D.tmp"67⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"68⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\C246.tmp"C:\Users\Admin\AppData\Local\Temp\C246.tmp"69⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"70⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"71⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"72⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"73⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\CA07.tmp"C:\Users\Admin\AppData\Local\Temp\CA07.tmp"74⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"75⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"76⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"77⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"78⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\CD91.tmp"C:\Users\Admin\AppData\Local\Temp\CD91.tmp"79⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"80⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"81⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"82⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"83⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"84⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\D37C.tmp"C:\Users\Admin\AppData\Local\Temp\D37C.tmp"85⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\D448.tmp"C:\Users\Admin\AppData\Local\Temp\D448.tmp"86⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"87⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"88⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"89⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"90⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\D84F.tmp"C:\Users\Admin\AppData\Local\Temp\D84F.tmp"91⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"92⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\DA04.tmp"C:\Users\Admin\AppData\Local\Temp\DA04.tmp"93⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"94⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"95⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"96⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"97⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"98⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"99⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\DE98.tmp"C:\Users\Admin\AppData\Local\Temp\DE98.tmp"100⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\DF15.tmp"C:\Users\Admin\AppData\Local\Temp\DF15.tmp"101⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"102⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\E01F.tmp"C:\Users\Admin\AppData\Local\Temp\E01F.tmp"103⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"104⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\E119.tmp"C:\Users\Admin\AppData\Local\Temp\E119.tmp"105⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\E186.tmp"C:\Users\Admin\AppData\Local\Temp\E186.tmp"106⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"107⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\E29F.tmp"C:\Users\Admin\AppData\Local\Temp\E29F.tmp"108⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\E416.tmp"C:\Users\Admin\AppData\Local\Temp\E416.tmp"109⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\E474.tmp"C:\Users\Admin\AppData\Local\Temp\E474.tmp"110⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"111⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"112⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\E60A.tmp"C:\Users\Admin\AppData\Local\Temp\E60A.tmp"113⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"114⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"115⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"116⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\E85C.tmp"C:\Users\Admin\AppData\Local\Temp\E85C.tmp"117⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"118⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"119⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"120⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\EB98.tmp"C:\Users\Admin\AppData\Local\Temp\EB98.tmp"121⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\EC25.tmp"C:\Users\Admin\AppData\Local\Temp\EC25.tmp"122⤵PID:1420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-