Analysis
-
max time kernel
163s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 22:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe
-
Size
520KB
-
MD5
990245a6f2f9147ee38742a28932f398
-
SHA1
077e5008717eedabcfb66af715ec56b5f5513243
-
SHA256
2236a75b12c2fc20f20aa9fb092e8821042538f43b3f8074cb448a1d1469c8f3
-
SHA512
5c22408ec94d1e6e75f1ccb0fb7728ae39c19e556a4a01476e182497b57dcbe77ea2d8b0d0d4106d2edc259ce716e78736c1bcdd0d2bbe1c1d31bdb9eaa2bfb2
-
SSDEEP
6144:lLvd/XzCjUIF1UuXLyQjmOH+JjLW6F+NNv9XDSYuMnjxeyKozSn0+ebsH3dZ:roRXOQjmOym6F+NzDb5xHKozS0sNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1972 C2E2.tmp 2820 C39E.tmp 1420 C44A.tmp 3100 C796.tmp 3760 CB9D.tmp 2428 CD52.tmp 4612 CE0E.tmp 1840 CFA4.tmp 4932 D0AE.tmp 4528 D188.tmp 4560 D254.tmp 1548 D33E.tmp 5080 D4C5.tmp 2640 D59F.tmp 4692 D699.tmp 4664 D784.tmp 3684 D820.tmp 2888 D8FB.tmp 4652 D9A7.tmp 1052 DADF.tmp 3192 DB8B.tmp 3556 DC18.tmp 904 DC95.tmp 3112 DD40.tmp 3228 DE4A.tmp 4984 DF15.tmp 1100 DFE0.tmp 1992 E06D.tmp 3552 E128.tmp 4764 E1E4.tmp 2508 E261.tmp 648 E35B.tmp 1704 E426.tmp 4844 E4C2.tmp 1964 E53F.tmp 440 E5CC.tmp 3800 E649.tmp 4420 E6C6.tmp 2260 E762.tmp 3776 E7EF.tmp 3924 E88B.tmp 4424 E966.tmp 760 EA02.tmp 1028 EAAE.tmp 1816 EB4A.tmp 1304 EBD7.tmp 1972 EC54.tmp 4044 ECC1.tmp 2820 ED5D.tmp 5044 EDCB.tmp 1600 EE29.tmp 4912 EEE4.tmp 2872 EF71.tmp 3412 F01D.tmp 3744 F09A.tmp 4612 F107.tmp 4200 F194.tmp 4456 F201.tmp 8 F28E.tmp 3200 F31A.tmp 576 F3D6.tmp 1216 F462.tmp 1548 F4FF.tmp 3956 F57C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1972 4492 2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe 88 PID 4492 wrote to memory of 1972 4492 2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe 88 PID 4492 wrote to memory of 1972 4492 2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe 88 PID 1972 wrote to memory of 2820 1972 C2E2.tmp 89 PID 1972 wrote to memory of 2820 1972 C2E2.tmp 89 PID 1972 wrote to memory of 2820 1972 C2E2.tmp 89 PID 2820 wrote to memory of 1420 2820 C39E.tmp 90 PID 2820 wrote to memory of 1420 2820 C39E.tmp 90 PID 2820 wrote to memory of 1420 2820 C39E.tmp 90 PID 1420 wrote to memory of 3100 1420 C44A.tmp 91 PID 1420 wrote to memory of 3100 1420 C44A.tmp 91 PID 1420 wrote to memory of 3100 1420 C44A.tmp 91 PID 3100 wrote to memory of 3760 3100 C796.tmp 92 PID 3100 wrote to memory of 3760 3100 C796.tmp 92 PID 3100 wrote to memory of 3760 3100 C796.tmp 92 PID 3760 wrote to memory of 2428 3760 CB9D.tmp 93 PID 3760 wrote to memory of 2428 3760 CB9D.tmp 93 PID 3760 wrote to memory of 2428 3760 CB9D.tmp 93 PID 2428 wrote to memory of 4612 2428 CD52.tmp 94 PID 2428 wrote to memory of 4612 2428 CD52.tmp 94 PID 2428 wrote to memory of 4612 2428 CD52.tmp 94 PID 4612 wrote to memory of 1840 4612 CE0E.tmp 95 PID 4612 wrote to memory of 1840 4612 CE0E.tmp 95 PID 4612 wrote to memory of 1840 4612 CE0E.tmp 95 PID 1840 wrote to memory of 4932 1840 CFA4.tmp 96 PID 1840 wrote to memory of 4932 1840 CFA4.tmp 96 PID 1840 wrote to memory of 4932 1840 CFA4.tmp 96 PID 4932 wrote to memory of 4528 4932 D0AE.tmp 97 PID 4932 wrote to memory of 4528 4932 D0AE.tmp 97 PID 4932 wrote to memory of 4528 4932 D0AE.tmp 97 PID 4528 wrote to memory of 4560 4528 D188.tmp 98 PID 4528 wrote to memory of 4560 4528 D188.tmp 98 PID 4528 wrote to memory of 4560 4528 D188.tmp 98 PID 4560 wrote to memory of 1548 4560 D254.tmp 99 PID 4560 wrote to memory of 1548 4560 D254.tmp 99 PID 4560 wrote to memory of 1548 4560 D254.tmp 99 PID 1548 wrote to memory of 5080 1548 D33E.tmp 100 PID 1548 wrote to memory of 5080 1548 D33E.tmp 100 PID 1548 wrote to memory of 5080 1548 D33E.tmp 100 PID 5080 wrote to memory of 2640 5080 D4C5.tmp 101 PID 5080 wrote to memory of 2640 5080 D4C5.tmp 101 PID 5080 wrote to memory of 2640 5080 D4C5.tmp 101 PID 2640 wrote to memory of 4692 2640 D59F.tmp 102 PID 2640 wrote to memory of 4692 2640 D59F.tmp 102 PID 2640 wrote to memory of 4692 2640 D59F.tmp 102 PID 4692 wrote to memory of 4664 4692 D699.tmp 103 PID 4692 wrote to memory of 4664 4692 D699.tmp 103 PID 4692 wrote to memory of 4664 4692 D699.tmp 103 PID 4664 wrote to memory of 3684 4664 D784.tmp 104 PID 4664 wrote to memory of 3684 4664 D784.tmp 104 PID 4664 wrote to memory of 3684 4664 D784.tmp 104 PID 3684 wrote to memory of 2888 3684 D820.tmp 105 PID 3684 wrote to memory of 2888 3684 D820.tmp 105 PID 3684 wrote to memory of 2888 3684 D820.tmp 105 PID 2888 wrote to memory of 4652 2888 D8FB.tmp 107 PID 2888 wrote to memory of 4652 2888 D8FB.tmp 107 PID 2888 wrote to memory of 4652 2888 D8FB.tmp 107 PID 4652 wrote to memory of 1052 4652 D9A7.tmp 108 PID 4652 wrote to memory of 1052 4652 D9A7.tmp 108 PID 4652 wrote to memory of 1052 4652 D9A7.tmp 108 PID 1052 wrote to memory of 3192 1052 DADF.tmp 109 PID 1052 wrote to memory of 3192 1052 DADF.tmp 109 PID 1052 wrote to memory of 3192 1052 DADF.tmp 109 PID 3192 wrote to memory of 3556 3192 DB8B.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-27_990245a6f2f9147ee38742a28932f398_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\C39E.tmp"C:\Users\Admin\AppData\Local\Temp\C39E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\C796.tmp"C:\Users\Admin\AppData\Local\Temp\C796.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\D188.tmp"C:\Users\Admin\AppData\Local\Temp\D188.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\D254.tmp"C:\Users\Admin\AppData\Local\Temp\D254.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\D33E.tmp"C:\Users\Admin\AppData\Local\Temp\D33E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\D59F.tmp"C:\Users\Admin\AppData\Local\Temp\D59F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\D784.tmp"C:\Users\Admin\AppData\Local\Temp\D784.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"23⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"24⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\DD40.tmp"C:\Users\Admin\AppData\Local\Temp\DD40.tmp"25⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"26⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\DF15.tmp"C:\Users\Admin\AppData\Local\Temp\DF15.tmp"27⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"28⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\E06D.tmp"C:\Users\Admin\AppData\Local\Temp\E06D.tmp"29⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\E128.tmp"C:\Users\Admin\AppData\Local\Temp\E128.tmp"30⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"31⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\E261.tmp"C:\Users\Admin\AppData\Local\Temp\E261.tmp"32⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"33⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"34⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"35⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\E53F.tmp"C:\Users\Admin\AppData\Local\Temp\E53F.tmp"36⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"37⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"38⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"39⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"40⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\E7EF.tmp"C:\Users\Admin\AppData\Local\Temp\E7EF.tmp"41⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\E88B.tmp"C:\Users\Admin\AppData\Local\Temp\E88B.tmp"42⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\E966.tmp"C:\Users\Admin\AppData\Local\Temp\E966.tmp"43⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\EA02.tmp"C:\Users\Admin\AppData\Local\Temp\EA02.tmp"44⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"45⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"46⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"47⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\EC54.tmp"C:\Users\Admin\AppData\Local\Temp\EC54.tmp"48⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"49⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"50⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"51⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\EE29.tmp"C:\Users\Admin\AppData\Local\Temp\EE29.tmp"52⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"53⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"54⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"55⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"56⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\F107.tmp"C:\Users\Admin\AppData\Local\Temp\F107.tmp"57⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"58⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\F201.tmp"C:\Users\Admin\AppData\Local\Temp\F201.tmp"59⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"60⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\F31A.tmp"C:\Users\Admin\AppData\Local\Temp\F31A.tmp"61⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"62⤵
- Executes dropped EXE
PID:576 -
C:\Users\Admin\AppData\Local\Temp\F462.tmp"C:\Users\Admin\AppData\Local\Temp\F462.tmp"63⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"64⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\F57C.tmp"C:\Users\Admin\AppData\Local\Temp\F57C.tmp"65⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"66⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"67⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"68⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\F760.tmp"C:\Users\Admin\AppData\Local\Temp\F760.tmp"69⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"70⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\F889.tmp"C:\Users\Admin\AppData\Local\Temp\F889.tmp"71⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\F925.tmp"C:\Users\Admin\AppData\Local\Temp\F925.tmp"72⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"73⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"74⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\FACB.tmp"C:\Users\Admin\AppData\Local\Temp\FACB.tmp"75⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\FB58.tmp"C:\Users\Admin\AppData\Local\Temp\FB58.tmp"76⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"77⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"78⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"79⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"80⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"81⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp"82⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\FF20.tmp"C:\Users\Admin\AppData\Local\Temp\FF20.tmp"83⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"84⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\2A.tmp"C:\Users\Admin\AppData\Local\Temp\2A.tmp"85⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\A7.tmp"C:\Users\Admin\AppData\Local\Temp\A7.tmp"86⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"87⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"88⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"89⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\2E9.tmp"C:\Users\Admin\AppData\Local\Temp\2E9.tmp"90⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"91⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3E3.tmp"C:\Users\Admin\AppData\Local\Temp\3E3.tmp"92⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"93⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"94⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\579.tmp"C:\Users\Admin\AppData\Local\Temp\579.tmp"95⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\616.tmp"C:\Users\Admin\AppData\Local\Temp\616.tmp"96⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\693.tmp"C:\Users\Admin\AppData\Local\Temp\693.tmp"97⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"98⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"99⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\838.tmp"C:\Users\Admin\AppData\Local\Temp\838.tmp"100⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\8D5.tmp"C:\Users\Admin\AppData\Local\Temp\8D5.tmp"101⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\971.tmp"C:\Users\Admin\AppData\Local\Temp\971.tmp"102⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"103⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\A8A.tmp"C:\Users\Admin\AppData\Local\Temp\A8A.tmp"104⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\B26.tmp"C:\Users\Admin\AppData\Local\Temp\B26.tmp"105⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"106⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"107⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"108⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"109⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"110⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"111⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"112⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"113⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\FE9.tmp"C:\Users\Admin\AppData\Local\Temp\FE9.tmp"114⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\1085.tmp"C:\Users\Admin\AppData\Local\Temp\1085.tmp"115⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"116⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"117⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"118⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"119⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"120⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"121⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"122⤵PID:3744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-