Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 18:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe
-
Size
530KB
-
MD5
d06ef15fe4fdc94d73d70d8f3d7005aa
-
SHA1
ba80530f207886071750f1cef901f7a192cc5eed
-
SHA256
8743f308b16095e0d38d3af6b1279fbcca32f8fd2fb8045cc86d7aa6c183c03e
-
SHA512
f9d06378a5b7b3bf4a787b29f37fbcb0690373d43c8d96f366c82a55c7d7569e9158f4cc526d68b620a5c60ac5e1253b833cce8a062138d1185f56c6d18cc968
-
SSDEEP
12288:AU5rCOTeio9x4RSlghT9B12PnnMsNZulFVg0M1:AUQOJoItX12PnnrNclFV/M1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4120 6906.tmp 2748 6D9A.tmp 972 6E94.tmp 2656 721E.tmp 1952 7337.tmp 4472 74ED.tmp 1720 778C.tmp 3268 7942.tmp 2716 79CF.tmp 3472 7B46.tmp 4240 7C9D.tmp 760 7DD6.tmp 2964 7F7C.tmp 4092 8141.tmp 1500 8299.tmp 2024 83F0.tmp 5108 8548.tmp 3424 85F4.tmp 3532 87C9.tmp 4984 8865.tmp 4560 894F.tmp 4360 8A49.tmp 2780 8B34.tmp 952 8BE0.tmp 392 8CBA.tmp 4180 8E51.tmp 1840 8F3B.tmp 3904 9045.tmp 2756 912F.tmp 2284 920A.tmp 1684 92E4.tmp 3324 93BF.tmp 3212 94D8.tmp 3920 9594.tmp 3060 9621.tmp 5084 969E.tmp 4484 971B.tmp 3724 9788.tmp 1408 98D0.tmp 3068 993D.tmp 4604 9A09.tmp 1252 9AA5.tmp 348 9B12.tmp 2216 9BED.tmp 4912 9DB2.tmp 2564 9E2F.tmp 4668 9F96.tmp 2972 A023.tmp 2380 A18A.tmp 4044 A217.tmp 4436 A294.tmp 3084 A301.tmp 1928 A37E.tmp 1444 A478.tmp 1212 A4F5.tmp 4548 A592.tmp 2844 A61E.tmp 1844 A6AB.tmp 3452 A757.tmp 884 A7D4.tmp 1652 A88F.tmp 4004 A8FD.tmp 4512 A96A.tmp 4572 AB00.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4120 3436 2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe 83 PID 3436 wrote to memory of 4120 3436 2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe 83 PID 3436 wrote to memory of 4120 3436 2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe 83 PID 4120 wrote to memory of 2748 4120 6906.tmp 84 PID 4120 wrote to memory of 2748 4120 6906.tmp 84 PID 4120 wrote to memory of 2748 4120 6906.tmp 84 PID 2748 wrote to memory of 972 2748 6D9A.tmp 85 PID 2748 wrote to memory of 972 2748 6D9A.tmp 85 PID 2748 wrote to memory of 972 2748 6D9A.tmp 85 PID 972 wrote to memory of 2656 972 6E94.tmp 87 PID 972 wrote to memory of 2656 972 6E94.tmp 87 PID 972 wrote to memory of 2656 972 6E94.tmp 87 PID 2656 wrote to memory of 1952 2656 721E.tmp 89 PID 2656 wrote to memory of 1952 2656 721E.tmp 89 PID 2656 wrote to memory of 1952 2656 721E.tmp 89 PID 1952 wrote to memory of 4472 1952 7337.tmp 90 PID 1952 wrote to memory of 4472 1952 7337.tmp 90 PID 1952 wrote to memory of 4472 1952 7337.tmp 90 PID 4472 wrote to memory of 1720 4472 74ED.tmp 91 PID 4472 wrote to memory of 1720 4472 74ED.tmp 91 PID 4472 wrote to memory of 1720 4472 74ED.tmp 91 PID 1720 wrote to memory of 3268 1720 778C.tmp 92 PID 1720 wrote to memory of 3268 1720 778C.tmp 92 PID 1720 wrote to memory of 3268 1720 778C.tmp 92 PID 3268 wrote to memory of 2716 3268 7942.tmp 93 PID 3268 wrote to memory of 2716 3268 7942.tmp 93 PID 3268 wrote to memory of 2716 3268 7942.tmp 93 PID 2716 wrote to memory of 3472 2716 79CF.tmp 94 PID 2716 wrote to memory of 3472 2716 79CF.tmp 94 PID 2716 wrote to memory of 3472 2716 79CF.tmp 94 PID 3472 wrote to memory of 4240 3472 7B46.tmp 95 PID 3472 wrote to memory of 4240 3472 7B46.tmp 95 PID 3472 wrote to memory of 4240 3472 7B46.tmp 95 PID 4240 wrote to memory of 760 4240 7C9D.tmp 96 PID 4240 wrote to memory of 760 4240 7C9D.tmp 96 PID 4240 wrote to memory of 760 4240 7C9D.tmp 96 PID 760 wrote to memory of 2964 760 7DD6.tmp 97 PID 760 wrote to memory of 2964 760 7DD6.tmp 97 PID 760 wrote to memory of 2964 760 7DD6.tmp 97 PID 2964 wrote to memory of 4092 2964 7F7C.tmp 98 PID 2964 wrote to memory of 4092 2964 7F7C.tmp 98 PID 2964 wrote to memory of 4092 2964 7F7C.tmp 98 PID 4092 wrote to memory of 1500 4092 8141.tmp 99 PID 4092 wrote to memory of 1500 4092 8141.tmp 99 PID 4092 wrote to memory of 1500 4092 8141.tmp 99 PID 1500 wrote to memory of 2024 1500 8299.tmp 100 PID 1500 wrote to memory of 2024 1500 8299.tmp 100 PID 1500 wrote to memory of 2024 1500 8299.tmp 100 PID 2024 wrote to memory of 5108 2024 83F0.tmp 101 PID 2024 wrote to memory of 5108 2024 83F0.tmp 101 PID 2024 wrote to memory of 5108 2024 83F0.tmp 101 PID 5108 wrote to memory of 3424 5108 8548.tmp 102 PID 5108 wrote to memory of 3424 5108 8548.tmp 102 PID 5108 wrote to memory of 3424 5108 8548.tmp 102 PID 3424 wrote to memory of 3532 3424 85F4.tmp 103 PID 3424 wrote to memory of 3532 3424 85F4.tmp 103 PID 3424 wrote to memory of 3532 3424 85F4.tmp 103 PID 3532 wrote to memory of 4984 3532 87C9.tmp 104 PID 3532 wrote to memory of 4984 3532 87C9.tmp 104 PID 3532 wrote to memory of 4984 3532 87C9.tmp 104 PID 4984 wrote to memory of 4560 4984 8865.tmp 105 PID 4984 wrote to memory of 4560 4984 8865.tmp 105 PID 4984 wrote to memory of 4560 4984 8865.tmp 105 PID 4560 wrote to memory of 4360 4560 894F.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_d06ef15fe4fdc94d73d70d8f3d7005aa_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\6E94.tmp"C:\Users\Admin\AppData\Local\Temp\6E94.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\7337.tmp"C:\Users\Admin\AppData\Local\Temp\7337.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\74ED.tmp"C:\Users\Admin\AppData\Local\Temp\74ED.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\778C.tmp"C:\Users\Admin\AppData\Local\Temp\778C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\7942.tmp"C:\Users\Admin\AppData\Local\Temp\7942.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\79CF.tmp"C:\Users\Admin\AppData\Local\Temp\79CF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\7B46.tmp"C:\Users\Admin\AppData\Local\Temp\7B46.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\7F7C.tmp"C:\Users\Admin\AppData\Local\Temp\7F7C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\8141.tmp"C:\Users\Admin\AppData\Local\Temp\8141.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\8299.tmp"C:\Users\Admin\AppData\Local\Temp\8299.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\83F0.tmp"C:\Users\Admin\AppData\Local\Temp\83F0.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\8548.tmp"C:\Users\Admin\AppData\Local\Temp\8548.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\85F4.tmp"C:\Users\Admin\AppData\Local\Temp\85F4.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\87C9.tmp"C:\Users\Admin\AppData\Local\Temp\87C9.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\8865.tmp"C:\Users\Admin\AppData\Local\Temp\8865.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\894F.tmp"C:\Users\Admin\AppData\Local\Temp\894F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\8A49.tmp"C:\Users\Admin\AppData\Local\Temp\8A49.tmp"23⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\8B34.tmp"C:\Users\Admin\AppData\Local\Temp\8B34.tmp"24⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\8BE0.tmp"C:\Users\Admin\AppData\Local\Temp\8BE0.tmp"25⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\8CBA.tmp"C:\Users\Admin\AppData\Local\Temp\8CBA.tmp"26⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\8E51.tmp"C:\Users\Admin\AppData\Local\Temp\8E51.tmp"27⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\8F3B.tmp"C:\Users\Admin\AppData\Local\Temp\8F3B.tmp"28⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\9045.tmp"C:\Users\Admin\AppData\Local\Temp\9045.tmp"29⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\912F.tmp"C:\Users\Admin\AppData\Local\Temp\912F.tmp"30⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\920A.tmp"C:\Users\Admin\AppData\Local\Temp\920A.tmp"31⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\92E4.tmp"C:\Users\Admin\AppData\Local\Temp\92E4.tmp"32⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\93BF.tmp"C:\Users\Admin\AppData\Local\Temp\93BF.tmp"33⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\94D8.tmp"C:\Users\Admin\AppData\Local\Temp\94D8.tmp"34⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\9594.tmp"C:\Users\Admin\AppData\Local\Temp\9594.tmp"35⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\9621.tmp"C:\Users\Admin\AppData\Local\Temp\9621.tmp"36⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\969E.tmp"C:\Users\Admin\AppData\Local\Temp\969E.tmp"37⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\971B.tmp"C:\Users\Admin\AppData\Local\Temp\971B.tmp"38⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\9788.tmp"C:\Users\Admin\AppData\Local\Temp\9788.tmp"39⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\98D0.tmp"C:\Users\Admin\AppData\Local\Temp\98D0.tmp"40⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\993D.tmp"C:\Users\Admin\AppData\Local\Temp\993D.tmp"41⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\9A09.tmp"C:\Users\Admin\AppData\Local\Temp\9A09.tmp"42⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\9AA5.tmp"C:\Users\Admin\AppData\Local\Temp\9AA5.tmp"43⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\9B12.tmp"C:\Users\Admin\AppData\Local\Temp\9B12.tmp"44⤵
- Executes dropped EXE
PID:348 -
C:\Users\Admin\AppData\Local\Temp\9BED.tmp"C:\Users\Admin\AppData\Local\Temp\9BED.tmp"45⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\9DB2.tmp"C:\Users\Admin\AppData\Local\Temp\9DB2.tmp"46⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\9E2F.tmp"C:\Users\Admin\AppData\Local\Temp\9E2F.tmp"47⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\9F96.tmp"C:\Users\Admin\AppData\Local\Temp\9F96.tmp"48⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\A023.tmp"C:\Users\Admin\AppData\Local\Temp\A023.tmp"49⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\A18A.tmp"C:\Users\Admin\AppData\Local\Temp\A18A.tmp"50⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\A217.tmp"C:\Users\Admin\AppData\Local\Temp\A217.tmp"51⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\A294.tmp"C:\Users\Admin\AppData\Local\Temp\A294.tmp"52⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\A301.tmp"C:\Users\Admin\AppData\Local\Temp\A301.tmp"53⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\A37E.tmp"C:\Users\Admin\AppData\Local\Temp\A37E.tmp"54⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\A478.tmp"C:\Users\Admin\AppData\Local\Temp\A478.tmp"55⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\A4F5.tmp"C:\Users\Admin\AppData\Local\Temp\A4F5.tmp"56⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\A592.tmp"C:\Users\Admin\AppData\Local\Temp\A592.tmp"57⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\A61E.tmp"C:\Users\Admin\AppData\Local\Temp\A61E.tmp"58⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\A6AB.tmp"C:\Users\Admin\AppData\Local\Temp\A6AB.tmp"59⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\A757.tmp"C:\Users\Admin\AppData\Local\Temp\A757.tmp"60⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\A7D4.tmp"C:\Users\Admin\AppData\Local\Temp\A7D4.tmp"61⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\A88F.tmp"C:\Users\Admin\AppData\Local\Temp\A88F.tmp"62⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"C:\Users\Admin\AppData\Local\Temp\A8FD.tmp"63⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\A96A.tmp"C:\Users\Admin\AppData\Local\Temp\A96A.tmp"64⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\AB00.tmp"C:\Users\Admin\AppData\Local\Temp\AB00.tmp"65⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\AB6E.tmp"C:\Users\Admin\AppData\Local\Temp\AB6E.tmp"66⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"67⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\AC48.tmp"C:\Users\Admin\AppData\Local\Temp\AC48.tmp"68⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\AD91.tmp"C:\Users\Admin\AppData\Local\Temp\AD91.tmp"69⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\AE2D.tmp"C:\Users\Admin\AppData\Local\Temp\AE2D.tmp"70⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"71⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\B050.tmp"C:\Users\Admin\AppData\Local\Temp\B050.tmp"72⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"73⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\B169.tmp"C:\Users\Admin\AppData\Local\Temp\B169.tmp"74⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\B1E6.tmp"C:\Users\Admin\AppData\Local\Temp\B1E6.tmp"75⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\B273.tmp"C:\Users\Admin\AppData\Local\Temp\B273.tmp"76⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\B33E.tmp"C:\Users\Admin\AppData\Local\Temp\B33E.tmp"77⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\B428.tmp"C:\Users\Admin\AppData\Local\Temp\B428.tmp"78⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\B495.tmp"C:\Users\Admin\AppData\Local\Temp\B495.tmp"79⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\B512.tmp"C:\Users\Admin\AppData\Local\Temp\B512.tmp"80⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\B59F.tmp"C:\Users\Admin\AppData\Local\Temp\B59F.tmp"81⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\B774.tmp"C:\Users\Admin\AppData\Local\Temp\B774.tmp"82⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"83⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\B949.tmp"C:\Users\Admin\AppData\Local\Temp\B949.tmp"84⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"85⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\BA62.tmp"C:\Users\Admin\AppData\Local\Temp\BA62.tmp"86⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"87⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\BBC9.tmp"C:\Users\Admin\AppData\Local\Temp\BBC9.tmp"88⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\BC37.tmp"C:\Users\Admin\AppData\Local\Temp\BC37.tmp"89⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\BF53.tmp"C:\Users\Admin\AppData\Local\Temp\BF53.tmp"90⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\C01F.tmp"C:\Users\Admin\AppData\Local\Temp\C01F.tmp"91⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\C08C.tmp"C:\Users\Admin\AppData\Local\Temp\C08C.tmp"92⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\C109.tmp"C:\Users\Admin\AppData\Local\Temp\C109.tmp"93⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\C1A5.tmp"C:\Users\Admin\AppData\Local\Temp\C1A5.tmp"94⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\C270.tmp"C:\Users\Admin\AppData\Local\Temp\C270.tmp"95⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\C2FD.tmp"C:\Users\Admin\AppData\Local\Temp\C2FD.tmp"96⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\C3D8.tmp"C:\Users\Admin\AppData\Local\Temp\C3D8.tmp"97⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\C493.tmp"C:\Users\Admin\AppData\Local\Temp\C493.tmp"98⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\C59D.tmp"C:\Users\Admin\AppData\Local\Temp\C59D.tmp"99⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\C60A.tmp"C:\Users\Admin\AppData\Local\Temp\C60A.tmp"100⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\C678.tmp"C:\Users\Admin\AppData\Local\Temp\C678.tmp"101⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\C6F5.tmp"C:\Users\Admin\AppData\Local\Temp\C6F5.tmp"102⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\C83D.tmp"C:\Users\Admin\AppData\Local\Temp\C83D.tmp"103⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\C8AA.tmp"C:\Users\Admin\AppData\Local\Temp\C8AA.tmp"104⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\C946.tmp"C:\Users\Admin\AppData\Local\Temp\C946.tmp"105⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\C9B4.tmp"C:\Users\Admin\AppData\Local\Temp\C9B4.tmp"106⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\CA40.tmp"C:\Users\Admin\AppData\Local\Temp\CA40.tmp"107⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"108⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"109⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\CC34.tmp"C:\Users\Admin\AppData\Local\Temp\CC34.tmp"110⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\CD9C.tmp"C:\Users\Admin\AppData\Local\Temp\CD9C.tmp"111⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\CE38.tmp"C:\Users\Admin\AppData\Local\Temp\CE38.tmp"112⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\CEA5.tmp"C:\Users\Admin\AppData\Local\Temp\CEA5.tmp"113⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\CF13.tmp"C:\Users\Admin\AppData\Local\Temp\CF13.tmp"114⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\CFED.tmp"C:\Users\Admin\AppData\Local\Temp\CFED.tmp"115⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\D06A.tmp"C:\Users\Admin\AppData\Local\Temp\D06A.tmp"116⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\D0D8.tmp"C:\Users\Admin\AppData\Local\Temp\D0D8.tmp"117⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\D339.tmp"C:\Users\Admin\AppData\Local\Temp\D339.tmp"118⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\D3A7.tmp"C:\Users\Admin\AppData\Local\Temp\D3A7.tmp"119⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\D452.tmp"C:\Users\Admin\AppData\Local\Temp\D452.tmp"120⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\D4DF.tmp"C:\Users\Admin\AppData\Local\Temp\D4DF.tmp"121⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\D5C9.tmp"C:\Users\Admin\AppData\Local\Temp\D5C9.tmp"122⤵PID:1560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-