Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe
-
Size
486KB
-
MD5
08c0cc0f4a30d61534a21c7bb477988e
-
SHA1
8ad835597ec0d9a78a06390f16cd8893b0e902fe
-
SHA256
f64b4ea34bafcb1c0e371bb0b49e7e1e158ad85641a507c1bdf644c52072bf47
-
SHA512
f4e0de7b0850cd392b8e645363fb0d1ce30635f13c89b94547be2da09d188db060e963e317f74c548bdd59154ec5249dbf530cca3011505484afc144fc3bc0ce
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7MRgEza/vIlwp+vn9P7dtZPTHwIpoJvMeZpoX:/U5rCOTeiDzESvIzv9xPTJpdeH0rNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3764 7F42.tmp 2044 7FDE.tmp 3916 809A.tmp 3320 83A7.tmp 4448 84A1.tmp 228 856C.tmp 1988 8628.tmp 2568 86B4.tmp 2352 88F6.tmp 992 8993.tmp 3736 8A1F.tmp 4644 8ABB.tmp 5068 8B67.tmp 4440 8C23.tmp 524 8D3C.tmp 3820 8DE8.tmp 1936 8EA3.tmp 3200 8F30.tmp 2004 8FCC.tmp 4428 9049.tmp 392 9105.tmp 1336 91E0.tmp 2708 9431.tmp 2108 94FC.tmp 4756 95B8.tmp 3768 9693.tmp 3224 97AC.tmp 4712 9829.tmp 1992 98C5.tmp 3428 9990.tmp 404 9A6B.tmp 4016 9B36.tmp 3844 9C01.tmp 3492 9D0B.tmp 672 9D98.tmp 3024 9E15.tmp 4764 9E82.tmp 2080 9EEF.tmp 3760 9F8C.tmp 3128 A018.tmp 2368 A0A5.tmp 2664 A160.tmp 2816 A22B.tmp 3212 A2D7.tmp 2308 A364.tmp 1132 A400.tmp 3788 A48D.tmp 1304 A519.tmp 1428 A596.tmp 4248 A623.tmp 2608 A6B0.tmp 2648 A77B.tmp 4552 A817.tmp 4100 A8A4.tmp 924 A921.tmp 4492 A9AD.tmp 3336 AA4A.tmp 4284 AAE6.tmp 2044 AB63.tmp 2640 ABEF.tmp 1240 AC8C.tmp 5088 AD18.tmp 1852 AD95.tmp 4760 AE22.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 3764 3524 2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe 84 PID 3524 wrote to memory of 3764 3524 2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe 84 PID 3524 wrote to memory of 3764 3524 2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe 84 PID 3764 wrote to memory of 2044 3764 7F42.tmp 85 PID 3764 wrote to memory of 2044 3764 7F42.tmp 85 PID 3764 wrote to memory of 2044 3764 7F42.tmp 85 PID 2044 wrote to memory of 3916 2044 7FDE.tmp 86 PID 2044 wrote to memory of 3916 2044 7FDE.tmp 86 PID 2044 wrote to memory of 3916 2044 7FDE.tmp 86 PID 3916 wrote to memory of 3320 3916 809A.tmp 87 PID 3916 wrote to memory of 3320 3916 809A.tmp 87 PID 3916 wrote to memory of 3320 3916 809A.tmp 87 PID 3320 wrote to memory of 4448 3320 83A7.tmp 88 PID 3320 wrote to memory of 4448 3320 83A7.tmp 88 PID 3320 wrote to memory of 4448 3320 83A7.tmp 88 PID 4448 wrote to memory of 228 4448 84A1.tmp 89 PID 4448 wrote to memory of 228 4448 84A1.tmp 89 PID 4448 wrote to memory of 228 4448 84A1.tmp 89 PID 228 wrote to memory of 1988 228 856C.tmp 90 PID 228 wrote to memory of 1988 228 856C.tmp 90 PID 228 wrote to memory of 1988 228 856C.tmp 90 PID 1988 wrote to memory of 2568 1988 8628.tmp 91 PID 1988 wrote to memory of 2568 1988 8628.tmp 91 PID 1988 wrote to memory of 2568 1988 8628.tmp 91 PID 2568 wrote to memory of 2352 2568 86B4.tmp 92 PID 2568 wrote to memory of 2352 2568 86B4.tmp 92 PID 2568 wrote to memory of 2352 2568 86B4.tmp 92 PID 2352 wrote to memory of 992 2352 88F6.tmp 93 PID 2352 wrote to memory of 992 2352 88F6.tmp 93 PID 2352 wrote to memory of 992 2352 88F6.tmp 93 PID 992 wrote to memory of 3736 992 8993.tmp 94 PID 992 wrote to memory of 3736 992 8993.tmp 94 PID 992 wrote to memory of 3736 992 8993.tmp 94 PID 3736 wrote to memory of 4644 3736 8A1F.tmp 95 PID 3736 wrote to memory of 4644 3736 8A1F.tmp 95 PID 3736 wrote to memory of 4644 3736 8A1F.tmp 95 PID 4644 wrote to memory of 5068 4644 8ABB.tmp 96 PID 4644 wrote to memory of 5068 4644 8ABB.tmp 96 PID 4644 wrote to memory of 5068 4644 8ABB.tmp 96 PID 5068 wrote to memory of 4440 5068 8B67.tmp 97 PID 5068 wrote to memory of 4440 5068 8B67.tmp 97 PID 5068 wrote to memory of 4440 5068 8B67.tmp 97 PID 4440 wrote to memory of 524 4440 8C23.tmp 98 PID 4440 wrote to memory of 524 4440 8C23.tmp 98 PID 4440 wrote to memory of 524 4440 8C23.tmp 98 PID 524 wrote to memory of 3820 524 8D3C.tmp 99 PID 524 wrote to memory of 3820 524 8D3C.tmp 99 PID 524 wrote to memory of 3820 524 8D3C.tmp 99 PID 3820 wrote to memory of 1936 3820 8DE8.tmp 100 PID 3820 wrote to memory of 1936 3820 8DE8.tmp 100 PID 3820 wrote to memory of 1936 3820 8DE8.tmp 100 PID 1936 wrote to memory of 3200 1936 8EA3.tmp 101 PID 1936 wrote to memory of 3200 1936 8EA3.tmp 101 PID 1936 wrote to memory of 3200 1936 8EA3.tmp 101 PID 3200 wrote to memory of 2004 3200 8F30.tmp 102 PID 3200 wrote to memory of 2004 3200 8F30.tmp 102 PID 3200 wrote to memory of 2004 3200 8F30.tmp 102 PID 2004 wrote to memory of 4428 2004 8FCC.tmp 103 PID 2004 wrote to memory of 4428 2004 8FCC.tmp 103 PID 2004 wrote to memory of 4428 2004 8FCC.tmp 103 PID 4428 wrote to memory of 392 4428 9049.tmp 104 PID 4428 wrote to memory of 392 4428 9049.tmp 104 PID 4428 wrote to memory of 392 4428 9049.tmp 104 PID 392 wrote to memory of 1336 392 9105.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_08c0cc0f4a30d61534a21c7bb477988e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\7F42.tmp"C:\Users\Admin\AppData\Local\Temp\7F42.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\809A.tmp"C:\Users\Admin\AppData\Local\Temp\809A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\83A7.tmp"C:\Users\Admin\AppData\Local\Temp\83A7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\84A1.tmp"C:\Users\Admin\AppData\Local\Temp\84A1.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\88F6.tmp"C:\Users\Admin\AppData\Local\Temp\88F6.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\8993.tmp"C:\Users\Admin\AppData\Local\Temp\8993.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\8C23.tmp"C:\Users\Admin\AppData\Local\Temp\8C23.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\8F30.tmp"C:\Users\Admin\AppData\Local\Temp\8F30.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\9049.tmp"C:\Users\Admin\AppData\Local\Temp\9049.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\9105.tmp"C:\Users\Admin\AppData\Local\Temp\9105.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"23⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\9431.tmp"C:\Users\Admin\AppData\Local\Temp\9431.tmp"24⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\94FC.tmp"C:\Users\Admin\AppData\Local\Temp\94FC.tmp"25⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\95B8.tmp"C:\Users\Admin\AppData\Local\Temp\95B8.tmp"26⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\9693.tmp"C:\Users\Admin\AppData\Local\Temp\9693.tmp"27⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\97AC.tmp"C:\Users\Admin\AppData\Local\Temp\97AC.tmp"28⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\9829.tmp"C:\Users\Admin\AppData\Local\Temp\9829.tmp"29⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"30⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\9990.tmp"C:\Users\Admin\AppData\Local\Temp\9990.tmp"31⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\9A6B.tmp"C:\Users\Admin\AppData\Local\Temp\9A6B.tmp"32⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\9B36.tmp"C:\Users\Admin\AppData\Local\Temp\9B36.tmp"33⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\9C01.tmp"C:\Users\Admin\AppData\Local\Temp\9C01.tmp"34⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"35⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"36⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\9E15.tmp"C:\Users\Admin\AppData\Local\Temp\9E15.tmp"37⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\9E82.tmp"C:\Users\Admin\AppData\Local\Temp\9E82.tmp"38⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"39⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"40⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"41⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"42⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\A160.tmp"C:\Users\Admin\AppData\Local\Temp\A160.tmp"43⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"44⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"45⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"46⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\A400.tmp"C:\Users\Admin\AppData\Local\Temp\A400.tmp"47⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\A48D.tmp"C:\Users\Admin\AppData\Local\Temp\A48D.tmp"48⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\A519.tmp"C:\Users\Admin\AppData\Local\Temp\A519.tmp"49⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\A596.tmp"C:\Users\Admin\AppData\Local\Temp\A596.tmp"50⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"51⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\A6B0.tmp"C:\Users\Admin\AppData\Local\Temp\A6B0.tmp"52⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\A77B.tmp"C:\Users\Admin\AppData\Local\Temp\A77B.tmp"53⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\A817.tmp"C:\Users\Admin\AppData\Local\Temp\A817.tmp"54⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"55⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\A921.tmp"C:\Users\Admin\AppData\Local\Temp\A921.tmp"56⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"57⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"58⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"59⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\AB63.tmp"C:\Users\Admin\AppData\Local\Temp\AB63.tmp"60⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"61⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\AC8C.tmp"C:\Users\Admin\AppData\Local\Temp\AC8C.tmp"62⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"63⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\AD95.tmp"C:\Users\Admin\AppData\Local\Temp\AD95.tmp"64⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"65⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"66⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"67⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"68⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"69⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"70⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\B16E.tmp"C:\Users\Admin\AppData\Local\Temp\B16E.tmp"71⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\B248.tmp"C:\Users\Admin\AppData\Local\Temp\B248.tmp"72⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"73⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"74⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\B40E.tmp"C:\Users\Admin\AppData\Local\Temp\B40E.tmp"75⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"76⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\B536.tmp"C:\Users\Admin\AppData\Local\Temp\B536.tmp"77⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"78⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\B611.tmp"C:\Users\Admin\AppData\Local\Temp\B611.tmp"79⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\B67F.tmp"C:\Users\Admin\AppData\Local\Temp\B67F.tmp"80⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"81⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\B779.tmp"C:\Users\Admin\AppData\Local\Temp\B779.tmp"82⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"83⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"84⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"85⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\B93E.tmp"C:\Users\Admin\AppData\Local\Temp\B93E.tmp"86⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"87⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"88⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"89⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\BB32.tmp"C:\Users\Admin\AppData\Local\Temp\BB32.tmp"90⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"91⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\BC1C.tmp"C:\Users\Admin\AppData\Local\Temp\BC1C.tmp"92⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\BD45.tmp"C:\Users\Admin\AppData\Local\Temp\BD45.tmp"93⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"94⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\BE10.tmp"C:\Users\Admin\AppData\Local\Temp\BE10.tmp"95⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"96⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"97⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"98⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"99⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"100⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"101⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\C15C.tmp"C:\Users\Admin\AppData\Local\Temp\C15C.tmp"102⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"103⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\C294.tmp"C:\Users\Admin\AppData\Local\Temp\C294.tmp"104⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\C321.tmp"C:\Users\Admin\AppData\Local\Temp\C321.tmp"105⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"106⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"107⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\C4C7.tmp"C:\Users\Admin\AppData\Local\Temp\C4C7.tmp"108⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\C544.tmp"C:\Users\Admin\AppData\Local\Temp\C544.tmp"109⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"110⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"111⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"112⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"113⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"114⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"115⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\C93B.tmp"C:\Users\Admin\AppData\Local\Temp\C93B.tmp"116⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"117⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"118⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"119⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"120⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"121⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\CD23.tmp"C:\Users\Admin\AppData\Local\Temp\CD23.tmp"122⤵PID:4492
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-