Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 15:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe
-
Size
487KB
-
MD5
4447f41462c13bc8578e32e267f88c77
-
SHA1
66c95a26b8173d1706847e88339e8f220a5c13f8
-
SHA256
158315fbbd3c71aaa6c6a1c25710da110cf0d0226565cfa1d2017dab8b6061f9
-
SHA512
2b815902ea58f2d477d49d7beb950bcc5944d0451598a91f76b30bee5d1424cc26acfd9fc22d3a404332b1486dae15feea148c0eb1ed619413877e9776ed26ee
-
SSDEEP
12288:yU5rCOTeiNq6vyvT1eniq58Up07AfCg1bZ:yUQOJNERenpCUprKg1b
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 552 AF99.tmp 2708 B045.tmp 3612 B0F1.tmp 3948 B18D.tmp 1240 B239.tmp 3520 B333.tmp 4516 B3CF.tmp 4868 B5C3.tmp 4404 B6DC.tmp 2800 B788.tmp 3848 B815.tmp 2380 B8D0.tmp 4932 BAD4.tmp 5080 BBBE.tmp 4804 BC4B.tmp 2812 BD55.tmp 3168 BE3F.tmp 3924 C0C0.tmp 4876 C16B.tmp 5020 C227.tmp 3140 C311.tmp 464 C3BD.tmp 368 C563.tmp 3240 C65D.tmp 1684 C738.tmp 2560 C7D4.tmp 1756 C8BE.tmp 1632 CAA3.tmp 3608 CB4F.tmp 4664 CC0A.tmp 3980 CCE5.tmp 4560 CDA0.tmp 2608 CE4C.tmp 4596 CED9.tmp 628 CF46.tmp 5052 CFC3.tmp 3896 D060.tmp 5036 D0FC.tmp 1260 D1A8.tmp 4116 D225.tmp 1828 D2D1.tmp 4720 D34E.tmp 3868 D3CB.tmp 4748 D7B3.tmp 2448 D820.tmp 4324 D87E.tmp 4320 D8CC.tmp 4336 DA33.tmp 3604 DAC0.tmp 4760 DB5C.tmp 2120 DC08.tmp 5084 DCB4.tmp 4880 DD31.tmp 4172 DDBD.tmp 4036 DE5A.tmp 1292 DF44.tmp 2432 DFF0.tmp 3520 E08C.tmp 4968 E128.tmp 4200 E1C5.tmp 4868 E280.tmp 840 E31C.tmp 3112 E3A9.tmp 4892 E445.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2632 wrote to memory of 552 2632 2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe 84 PID 2632 wrote to memory of 552 2632 2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe 84 PID 2632 wrote to memory of 552 2632 2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe 84 PID 552 wrote to memory of 2708 552 AF99.tmp 85 PID 552 wrote to memory of 2708 552 AF99.tmp 85 PID 552 wrote to memory of 2708 552 AF99.tmp 85 PID 2708 wrote to memory of 3612 2708 B045.tmp 86 PID 2708 wrote to memory of 3612 2708 B045.tmp 86 PID 2708 wrote to memory of 3612 2708 B045.tmp 86 PID 3612 wrote to memory of 3948 3612 B0F1.tmp 87 PID 3612 wrote to memory of 3948 3612 B0F1.tmp 87 PID 3612 wrote to memory of 3948 3612 B0F1.tmp 87 PID 3948 wrote to memory of 1240 3948 B18D.tmp 88 PID 3948 wrote to memory of 1240 3948 B18D.tmp 88 PID 3948 wrote to memory of 1240 3948 B18D.tmp 88 PID 1240 wrote to memory of 3520 1240 B239.tmp 89 PID 1240 wrote to memory of 3520 1240 B239.tmp 89 PID 1240 wrote to memory of 3520 1240 B239.tmp 89 PID 3520 wrote to memory of 4516 3520 B333.tmp 90 PID 3520 wrote to memory of 4516 3520 B333.tmp 90 PID 3520 wrote to memory of 4516 3520 B333.tmp 90 PID 4516 wrote to memory of 4868 4516 B3CF.tmp 91 PID 4516 wrote to memory of 4868 4516 B3CF.tmp 91 PID 4516 wrote to memory of 4868 4516 B3CF.tmp 91 PID 4868 wrote to memory of 4404 4868 B5C3.tmp 92 PID 4868 wrote to memory of 4404 4868 B5C3.tmp 92 PID 4868 wrote to memory of 4404 4868 B5C3.tmp 92 PID 4404 wrote to memory of 2800 4404 B6DC.tmp 93 PID 4404 wrote to memory of 2800 4404 B6DC.tmp 93 PID 4404 wrote to memory of 2800 4404 B6DC.tmp 93 PID 2800 wrote to memory of 3848 2800 B788.tmp 94 PID 2800 wrote to memory of 3848 2800 B788.tmp 94 PID 2800 wrote to memory of 3848 2800 B788.tmp 94 PID 3848 wrote to memory of 2380 3848 B815.tmp 95 PID 3848 wrote to memory of 2380 3848 B815.tmp 95 PID 3848 wrote to memory of 2380 3848 B815.tmp 95 PID 2380 wrote to memory of 4932 2380 B8D0.tmp 96 PID 2380 wrote to memory of 4932 2380 B8D0.tmp 96 PID 2380 wrote to memory of 4932 2380 B8D0.tmp 96 PID 4932 wrote to memory of 5080 4932 BAD4.tmp 97 PID 4932 wrote to memory of 5080 4932 BAD4.tmp 97 PID 4932 wrote to memory of 5080 4932 BAD4.tmp 97 PID 5080 wrote to memory of 4804 5080 BBBE.tmp 98 PID 5080 wrote to memory of 4804 5080 BBBE.tmp 98 PID 5080 wrote to memory of 4804 5080 BBBE.tmp 98 PID 4804 wrote to memory of 2812 4804 BC4B.tmp 99 PID 4804 wrote to memory of 2812 4804 BC4B.tmp 99 PID 4804 wrote to memory of 2812 4804 BC4B.tmp 99 PID 2812 wrote to memory of 3168 2812 BD55.tmp 100 PID 2812 wrote to memory of 3168 2812 BD55.tmp 100 PID 2812 wrote to memory of 3168 2812 BD55.tmp 100 PID 3168 wrote to memory of 3924 3168 BE3F.tmp 101 PID 3168 wrote to memory of 3924 3168 BE3F.tmp 101 PID 3168 wrote to memory of 3924 3168 BE3F.tmp 101 PID 3924 wrote to memory of 4876 3924 C0C0.tmp 102 PID 3924 wrote to memory of 4876 3924 C0C0.tmp 102 PID 3924 wrote to memory of 4876 3924 C0C0.tmp 102 PID 4876 wrote to memory of 5020 4876 C16B.tmp 103 PID 4876 wrote to memory of 5020 4876 C16B.tmp 103 PID 4876 wrote to memory of 5020 4876 C16B.tmp 103 PID 5020 wrote to memory of 3140 5020 C227.tmp 104 PID 5020 wrote to memory of 3140 5020 C227.tmp 104 PID 5020 wrote to memory of 3140 5020 C227.tmp 104 PID 3140 wrote to memory of 464 3140 C311.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_4447f41462c13bc8578e32e267f88c77_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\B788.tmp"C:\Users\Admin\AppData\Local\Temp\B788.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\B815.tmp"C:\Users\Admin\AppData\Local\Temp\B815.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\C16B.tmp"C:\Users\Admin\AppData\Local\Temp\C16B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\C227.tmp"C:\Users\Admin\AppData\Local\Temp\C227.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\C311.tmp"C:\Users\Admin\AppData\Local\Temp\C311.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"23⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\C563.tmp"C:\Users\Admin\AppData\Local\Temp\C563.tmp"24⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"25⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"26⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"27⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\C8BE.tmp"C:\Users\Admin\AppData\Local\Temp\C8BE.tmp"28⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"29⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"30⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"31⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"32⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"33⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"34⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\CED9.tmp"C:\Users\Admin\AppData\Local\Temp\CED9.tmp"35⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"36⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"37⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"38⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"39⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"40⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\D225.tmp"C:\Users\Admin\AppData\Local\Temp\D225.tmp"41⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"42⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"43⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"44⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"45⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"46⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"47⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\D8CC.tmp"C:\Users\Admin\AppData\Local\Temp\D8CC.tmp"48⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"49⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"50⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"51⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\DC08.tmp"C:\Users\Admin\AppData\Local\Temp\DC08.tmp"52⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"53⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"54⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"55⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"56⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"57⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"58⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"59⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\E128.tmp"C:\Users\Admin\AppData\Local\Temp\E128.tmp"60⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"61⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"62⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"63⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"64⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"65⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"66⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\E55F.tmp"C:\Users\Admin\AppData\Local\Temp\E55F.tmp"67⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"68⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\E668.tmp"C:\Users\Admin\AppData\Local\Temp\E668.tmp"69⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"70⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"71⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"72⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"73⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"74⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp"75⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"76⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"77⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"78⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"79⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"80⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"81⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"82⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\EE57.tmp"C:\Users\Admin\AppData\Local\Temp\EE57.tmp"83⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\EF03.tmp"C:\Users\Admin\AppData\Local\Temp\EF03.tmp"84⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"85⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"86⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"87⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"88⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"89⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"90⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\F31A.tmp"C:\Users\Admin\AppData\Local\Temp\F31A.tmp"91⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"92⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"93⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"94⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"95⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\F618.tmp"C:\Users\Admin\AppData\Local\Temp\F618.tmp"96⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"97⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"98⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"99⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\F82B.tmp"C:\Users\Admin\AppData\Local\Temp\F82B.tmp"100⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\F898.tmp"C:\Users\Admin\AppData\Local\Temp\F898.tmp"101⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"102⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\F992.tmp"C:\Users\Admin\AppData\Local\Temp\F992.tmp"103⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"104⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"105⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\FB67.tmp"C:\Users\Admin\AppData\Local\Temp\FB67.tmp"106⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\FC03.tmp"C:\Users\Admin\AppData\Local\Temp\FC03.tmp"107⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"108⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"109⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"110⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"111⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"112⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\FF11.tmp"C:\Users\Admin\AppData\Local\Temp\FF11.tmp"113⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"114⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"115⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"116⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\191.tmp"C:\Users\Admin\AppData\Local\Temp\191.tmp"117⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"118⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"119⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"120⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"121⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"122⤵PID:224
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-