Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 17:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe
-
Size
520KB
-
MD5
aefa47eef0526a08d3e2b5dd91108623
-
SHA1
2951883ff52ad7b37a6ccc176e4c3f8dd3a6991f
-
SHA256
aec2f676223b69985ef84f4117e846d426cf3b9f5a6d46327484c7276c7e7582
-
SHA512
25627e30d6b7bb2d8380698ff609b19f04faefb94a3e7b4dfa0b1f89bb4ce5be17bd0e9ec874d771da8c4551d28131679598e5fcd1c290cdb00c0bab4ad1a133
-
SSDEEP
12288:roRXOQjmOy9P4uJf+FG0FysELbg0NjP0HQoVNZ:rogQ9y9x5+FH/ELbg0NjSHVN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2972 8CBF.tmp 3132 8D4C.tmp 4948 8E17.tmp 3976 99B0.tmp 2016 9A5B.tmp 816 9B46.tmp 4384 9BE2.tmp 836 9C9E.tmp 3680 9D1B.tmp 2640 9E05.tmp 116 9EC0.tmp 4420 A095.tmp 4740 A141.tmp 4148 A22B.tmp 2392 A2E7.tmp 4968 A374.tmp 3772 A43F.tmp 2408 A7B9.tmp 2572 A8B3.tmp 4704 A96F.tmp 4536 AA88.tmp 396 AB24.tmp 3672 ABC1.tmp 1548 AC3E.tmp 1960 ACCA.tmp 4872 AD57.tmp 2160 ADE3.tmp 2916 AE60.tmp 4528 AF1C.tmp 4920 AFB8.tmp 2388 B093.tmp 1248 B14E.tmp 1140 B1DB.tmp 4076 B239.tmp 1488 B287.tmp 3308 B304.tmp 4844 B381.tmp 3704 B3EE.tmp 3048 B47B.tmp 4444 B73A.tmp 4068 B7C7.tmp 3320 B853.tmp 4428 B8D0.tmp 4260 B92E.tmp 1852 B98C.tmp 868 BE7D.tmp 4876 BF0A.tmp 3168 BFE5.tmp 3644 C071.tmp 2960 C0DF.tmp 3244 C14C.tmp 2192 C1F8.tmp 228 C265.tmp 4392 C302.tmp 3132 C36F.tmp 2464 C3EC.tmp 4892 C880.tmp 1828 C8FD.tmp 636 C999.tmp 4100 CD62.tmp 4112 CDEF.tmp 640 CE4C.tmp 3352 CEBA.tmp 3900 D3AB.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 2972 4172 2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe 83 PID 4172 wrote to memory of 2972 4172 2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe 83 PID 4172 wrote to memory of 2972 4172 2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe 83 PID 2972 wrote to memory of 3132 2972 8CBF.tmp 84 PID 2972 wrote to memory of 3132 2972 8CBF.tmp 84 PID 2972 wrote to memory of 3132 2972 8CBF.tmp 84 PID 3132 wrote to memory of 4948 3132 8D4C.tmp 85 PID 3132 wrote to memory of 4948 3132 8D4C.tmp 85 PID 3132 wrote to memory of 4948 3132 8D4C.tmp 85 PID 4948 wrote to memory of 3976 4948 8E17.tmp 86 PID 4948 wrote to memory of 3976 4948 8E17.tmp 86 PID 4948 wrote to memory of 3976 4948 8E17.tmp 86 PID 3976 wrote to memory of 2016 3976 99B0.tmp 87 PID 3976 wrote to memory of 2016 3976 99B0.tmp 87 PID 3976 wrote to memory of 2016 3976 99B0.tmp 87 PID 2016 wrote to memory of 816 2016 9A5B.tmp 88 PID 2016 wrote to memory of 816 2016 9A5B.tmp 88 PID 2016 wrote to memory of 816 2016 9A5B.tmp 88 PID 816 wrote to memory of 4384 816 9B46.tmp 89 PID 816 wrote to memory of 4384 816 9B46.tmp 89 PID 816 wrote to memory of 4384 816 9B46.tmp 89 PID 4384 wrote to memory of 836 4384 9BE2.tmp 90 PID 4384 wrote to memory of 836 4384 9BE2.tmp 90 PID 4384 wrote to memory of 836 4384 9BE2.tmp 90 PID 836 wrote to memory of 3680 836 9C9E.tmp 91 PID 836 wrote to memory of 3680 836 9C9E.tmp 91 PID 836 wrote to memory of 3680 836 9C9E.tmp 91 PID 3680 wrote to memory of 2640 3680 9D1B.tmp 92 PID 3680 wrote to memory of 2640 3680 9D1B.tmp 92 PID 3680 wrote to memory of 2640 3680 9D1B.tmp 92 PID 2640 wrote to memory of 116 2640 9E05.tmp 93 PID 2640 wrote to memory of 116 2640 9E05.tmp 93 PID 2640 wrote to memory of 116 2640 9E05.tmp 93 PID 116 wrote to memory of 4420 116 9EC0.tmp 94 PID 116 wrote to memory of 4420 116 9EC0.tmp 94 PID 116 wrote to memory of 4420 116 9EC0.tmp 94 PID 4420 wrote to memory of 4740 4420 A095.tmp 95 PID 4420 wrote to memory of 4740 4420 A095.tmp 95 PID 4420 wrote to memory of 4740 4420 A095.tmp 95 PID 4740 wrote to memory of 4148 4740 A141.tmp 96 PID 4740 wrote to memory of 4148 4740 A141.tmp 96 PID 4740 wrote to memory of 4148 4740 A141.tmp 96 PID 4148 wrote to memory of 2392 4148 A22B.tmp 97 PID 4148 wrote to memory of 2392 4148 A22B.tmp 97 PID 4148 wrote to memory of 2392 4148 A22B.tmp 97 PID 2392 wrote to memory of 4968 2392 A2E7.tmp 98 PID 2392 wrote to memory of 4968 2392 A2E7.tmp 98 PID 2392 wrote to memory of 4968 2392 A2E7.tmp 98 PID 4968 wrote to memory of 3772 4968 A374.tmp 99 PID 4968 wrote to memory of 3772 4968 A374.tmp 99 PID 4968 wrote to memory of 3772 4968 A374.tmp 99 PID 3772 wrote to memory of 2408 3772 A43F.tmp 100 PID 3772 wrote to memory of 2408 3772 A43F.tmp 100 PID 3772 wrote to memory of 2408 3772 A43F.tmp 100 PID 2408 wrote to memory of 2572 2408 A7B9.tmp 101 PID 2408 wrote to memory of 2572 2408 A7B9.tmp 101 PID 2408 wrote to memory of 2572 2408 A7B9.tmp 101 PID 2572 wrote to memory of 4704 2572 A8B3.tmp 102 PID 2572 wrote to memory of 4704 2572 A8B3.tmp 102 PID 2572 wrote to memory of 4704 2572 A8B3.tmp 102 PID 4704 wrote to memory of 4536 4704 A96F.tmp 103 PID 4704 wrote to memory of 4536 4704 A96F.tmp 103 PID 4704 wrote to memory of 4536 4704 A96F.tmp 103 PID 4536 wrote to memory of 396 4536 AA88.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_aefa47eef0526a08d3e2b5dd91108623_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\8D4C.tmp"C:\Users\Admin\AppData\Local\Temp\8D4C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\8E17.tmp"C:\Users\Admin\AppData\Local\Temp\8E17.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\9B46.tmp"C:\Users\Admin\AppData\Local\Temp\9B46.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\9C9E.tmp"C:\Users\Admin\AppData\Local\Temp\9C9E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\9E05.tmp"C:\Users\Admin\AppData\Local\Temp\9E05.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\A095.tmp"C:\Users\Admin\AppData\Local\Temp\A095.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\A374.tmp"C:\Users\Admin\AppData\Local\Temp\A374.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\AA88.tmp"C:\Users\Admin\AppData\Local\Temp\AA88.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"23⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"24⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"25⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"26⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\AD57.tmp"C:\Users\Admin\AppData\Local\Temp\AD57.tmp"27⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"28⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"29⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"30⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"31⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\B093.tmp"C:\Users\Admin\AppData\Local\Temp\B093.tmp"32⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"33⤵
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"34⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"35⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\B287.tmp"C:\Users\Admin\AppData\Local\Temp\B287.tmp"36⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"37⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\B381.tmp"C:\Users\Admin\AppData\Local\Temp\B381.tmp"38⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"39⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"40⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\B73A.tmp"C:\Users\Admin\AppData\Local\Temp\B73A.tmp"41⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"42⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"43⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"44⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"45⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\B98C.tmp"C:\Users\Admin\AppData\Local\Temp\B98C.tmp"46⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"47⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"48⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"49⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"50⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"51⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"52⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"53⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"54⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\C302.tmp"C:\Users\Admin\AppData\Local\Temp\C302.tmp"55⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"56⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"57⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"58⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"59⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"60⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"61⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"62⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"63⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"64⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"65⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\D438.tmp"C:\Users\Admin\AppData\Local\Temp\D438.tmp"66⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\D987.tmp"C:\Users\Admin\AppData\Local\Temp\D987.tmp"67⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"68⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"69⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"70⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"71⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"72⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"73⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\F30B.tmp"C:\Users\Admin\AppData\Local\Temp\F30B.tmp"74⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"75⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"76⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"77⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"78⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"79⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"80⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"81⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"82⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"83⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"84⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"85⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\3A.tmp"C:\Users\Admin\AppData\Local\Temp\3A.tmp"86⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"87⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"88⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"89⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2F9.tmp"C:\Users\Admin\AppData\Local\Temp\2F9.tmp"90⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\395.tmp"C:\Users\Admin\AppData\Local\Temp\395.tmp"91⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"92⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\4BE.tmp"C:\Users\Admin\AppData\Local\Temp\4BE.tmp"93⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"94⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\5D7.tmp"C:\Users\Admin\AppData\Local\Temp\5D7.tmp"95⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"96⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"97⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"98⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"99⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"100⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"101⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\981.tmp"C:\Users\Admin\AppData\Local\Temp\981.tmp"102⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"103⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"104⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\B17.tmp"C:\Users\Admin\AppData\Local\Temp\B17.tmp"105⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\BA3.tmp"C:\Users\Admin\AppData\Local\Temp\BA3.tmp"106⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\C30.tmp"C:\Users\Admin\AppData\Local\Temp\C30.tmp"107⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"108⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"109⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"110⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"111⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"112⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\EFF.tmp"C:\Users\Admin\AppData\Local\Temp\EFF.tmp"113⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"114⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"115⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"116⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\1131.tmp"C:\Users\Admin\AppData\Local\Temp\1131.tmp"117⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"118⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"119⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"120⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"121⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\1921.tmp"C:\Users\Admin\AppData\Local\Temp\1921.tmp"122⤵PID:3724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-