Analysis
-
max time kernel
165s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 00:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe
-
Size
520KB
-
MD5
14d28fc3395f9158eb1190b0addc6d85
-
SHA1
a2c9ceb33f7517d5250738baa3019f4e3ce3812a
-
SHA256
ef9daf736e9594bd0a47028e49b5712344df8f2de0893a8a66dbd0bc89164354
-
SHA512
8a76de4d6d0e21e1783b58bb03bb1abd84653612fee7d8f58470d339fa2860fbfed5165fd0739b4ef39a934c8a6f881cd808e965aafc922c5e0260842d459699
-
SSDEEP
12288:roRXOQjmOylceeHJJ46hRBIWVy+NGF1JC/cVrvFNZ:rogQ9ylceeHJJ40KWjNG7kc7N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2208 56F5.tmp 748 630A.tmp 2908 65D9.tmp 2712 66C4.tmp 1860 676F.tmp 3268 6906.tmp 3956 6BB5.tmp 2032 6C80.tmp 3720 6D2C.tmp 1972 6DC8.tmp 3388 71D0.tmp 2356 73B4.tmp 4536 747F.tmp 3348 754A.tmp 3284 772F.tmp 3812 77BB.tmp 2312 7896.tmp 4480 7952.tmp 3880 7A1D.tmp 3964 7A9A.tmp 2660 7B74.tmp 376 7C5F.tmp 2060 7D59.tmp 568 7E34.tmp 3956 7FCA.tmp 4152 80C4.tmp 2728 8170.tmp 4348 82D7.tmp 4372 83A2.tmp 3068 843E.tmp 224 850A.tmp 4536 86AF.tmp 4632 875B.tmp 4184 8807.tmp 4316 88A3.tmp 2328 8920.tmp 4932 89BD.tmp 2076 8A59.tmp 3552 8D28.tmp 3872 8DA5.tmp 3924 90A2.tmp 1692 913F.tmp 1236 91EA.tmp 1396 9258.tmp 2920 92E4.tmp 2780 94C9.tmp 2128 9546.tmp 2800 95C3.tmp 4152 9640.tmp 3464 96DC.tmp 3580 9769.tmp 2432 97E6.tmp 4372 9882.tmp 3740 98FF.tmp 4500 9B22.tmp 1748 9BDD.tmp 3876 9D06.tmp 4632 9D74.tmp 4184 9DF1.tmp 2312 9E6E.tmp 2356 9F19.tmp 4932 9FC5.tmp 2076 A033.tmp 3888 A0B0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2208 4060 2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe 99 PID 4060 wrote to memory of 2208 4060 2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe 99 PID 4060 wrote to memory of 2208 4060 2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe 99 PID 2208 wrote to memory of 748 2208 56F5.tmp 100 PID 2208 wrote to memory of 748 2208 56F5.tmp 100 PID 2208 wrote to memory of 748 2208 56F5.tmp 100 PID 748 wrote to memory of 2908 748 630A.tmp 102 PID 748 wrote to memory of 2908 748 630A.tmp 102 PID 748 wrote to memory of 2908 748 630A.tmp 102 PID 2908 wrote to memory of 2712 2908 65D9.tmp 103 PID 2908 wrote to memory of 2712 2908 65D9.tmp 103 PID 2908 wrote to memory of 2712 2908 65D9.tmp 103 PID 2712 wrote to memory of 1860 2712 66C4.tmp 104 PID 2712 wrote to memory of 1860 2712 66C4.tmp 104 PID 2712 wrote to memory of 1860 2712 66C4.tmp 104 PID 1860 wrote to memory of 3268 1860 676F.tmp 105 PID 1860 wrote to memory of 3268 1860 676F.tmp 105 PID 1860 wrote to memory of 3268 1860 676F.tmp 105 PID 3268 wrote to memory of 3956 3268 6906.tmp 106 PID 3268 wrote to memory of 3956 3268 6906.tmp 106 PID 3268 wrote to memory of 3956 3268 6906.tmp 106 PID 3956 wrote to memory of 2032 3956 6BB5.tmp 107 PID 3956 wrote to memory of 2032 3956 6BB5.tmp 107 PID 3956 wrote to memory of 2032 3956 6BB5.tmp 107 PID 2032 wrote to memory of 3720 2032 6C80.tmp 108 PID 2032 wrote to memory of 3720 2032 6C80.tmp 108 PID 2032 wrote to memory of 3720 2032 6C80.tmp 108 PID 3720 wrote to memory of 1972 3720 6D2C.tmp 109 PID 3720 wrote to memory of 1972 3720 6D2C.tmp 109 PID 3720 wrote to memory of 1972 3720 6D2C.tmp 109 PID 1972 wrote to memory of 3388 1972 6DC8.tmp 110 PID 1972 wrote to memory of 3388 1972 6DC8.tmp 110 PID 1972 wrote to memory of 3388 1972 6DC8.tmp 110 PID 4420 wrote to memory of 2356 4420 7327.tmp 112 PID 4420 wrote to memory of 2356 4420 7327.tmp 112 PID 4420 wrote to memory of 2356 4420 7327.tmp 112 PID 2356 wrote to memory of 4536 2356 73B4.tmp 113 PID 2356 wrote to memory of 4536 2356 73B4.tmp 113 PID 2356 wrote to memory of 4536 2356 73B4.tmp 113 PID 4536 wrote to memory of 3348 4536 747F.tmp 114 PID 4536 wrote to memory of 3348 4536 747F.tmp 114 PID 4536 wrote to memory of 3348 4536 747F.tmp 114 PID 3348 wrote to memory of 3284 3348 754A.tmp 115 PID 3348 wrote to memory of 3284 3348 754A.tmp 115 PID 3348 wrote to memory of 3284 3348 754A.tmp 115 PID 3284 wrote to memory of 3812 3284 772F.tmp 116 PID 3284 wrote to memory of 3812 3284 772F.tmp 116 PID 3284 wrote to memory of 3812 3284 772F.tmp 116 PID 3812 wrote to memory of 2312 3812 77BB.tmp 117 PID 3812 wrote to memory of 2312 3812 77BB.tmp 117 PID 3812 wrote to memory of 2312 3812 77BB.tmp 117 PID 2312 wrote to memory of 4480 2312 7896.tmp 118 PID 2312 wrote to memory of 4480 2312 7896.tmp 118 PID 2312 wrote to memory of 4480 2312 7896.tmp 118 PID 4480 wrote to memory of 3880 4480 7952.tmp 119 PID 4480 wrote to memory of 3880 4480 7952.tmp 119 PID 4480 wrote to memory of 3880 4480 7952.tmp 119 PID 3880 wrote to memory of 3964 3880 7A1D.tmp 120 PID 3880 wrote to memory of 3964 3880 7A1D.tmp 120 PID 3880 wrote to memory of 3964 3880 7A1D.tmp 120 PID 3964 wrote to memory of 2660 3964 7A9A.tmp 121 PID 3964 wrote to memory of 2660 3964 7A9A.tmp 121 PID 3964 wrote to memory of 2660 3964 7A9A.tmp 121 PID 2660 wrote to memory of 376 2660 7B74.tmp 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_14d28fc3395f9158eb1190b0addc6d85_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\56F5.tmp"C:\Users\Admin\AppData\Local\Temp\56F5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\65D9.tmp"C:\Users\Admin\AppData\Local\Temp\65D9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\66C4.tmp"C:\Users\Admin\AppData\Local\Temp\66C4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\676F.tmp"C:\Users\Admin\AppData\Local\Temp\676F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\6D2C.tmp"C:\Users\Admin\AppData\Local\Temp\6D2C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\71D0.tmp"C:\Users\Admin\AppData\Local\Temp\71D0.tmp"12⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"13⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\73B4.tmp"C:\Users\Admin\AppData\Local\Temp\73B4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\747F.tmp"C:\Users\Admin\AppData\Local\Temp\747F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\754A.tmp"C:\Users\Admin\AppData\Local\Temp\754A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\772F.tmp"C:\Users\Admin\AppData\Local\Temp\772F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\77BB.tmp"C:\Users\Admin\AppData\Local\Temp\77BB.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\7896.tmp"C:\Users\Admin\AppData\Local\Temp\7896.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\7952.tmp"C:\Users\Admin\AppData\Local\Temp\7952.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\7B74.tmp"C:\Users\Admin\AppData\Local\Temp\7B74.tmp"23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"24⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\7D59.tmp"C:\Users\Admin\AppData\Local\Temp\7D59.tmp"25⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\7E34.tmp"C:\Users\Admin\AppData\Local\Temp\7E34.tmp"26⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"27⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\80C4.tmp"C:\Users\Admin\AppData\Local\Temp\80C4.tmp"28⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\8170.tmp"C:\Users\Admin\AppData\Local\Temp\8170.tmp"29⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\82D7.tmp"C:\Users\Admin\AppData\Local\Temp\82D7.tmp"30⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\83A2.tmp"C:\Users\Admin\AppData\Local\Temp\83A2.tmp"31⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\843E.tmp"C:\Users\Admin\AppData\Local\Temp\843E.tmp"32⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\850A.tmp"C:\Users\Admin\AppData\Local\Temp\850A.tmp"33⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\86AF.tmp"C:\Users\Admin\AppData\Local\Temp\86AF.tmp"34⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\875B.tmp"C:\Users\Admin\AppData\Local\Temp\875B.tmp"35⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\8807.tmp"C:\Users\Admin\AppData\Local\Temp\8807.tmp"36⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\88A3.tmp"C:\Users\Admin\AppData\Local\Temp\88A3.tmp"37⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\8920.tmp"C:\Users\Admin\AppData\Local\Temp\8920.tmp"38⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\89BD.tmp"C:\Users\Admin\AppData\Local\Temp\89BD.tmp"39⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\8A59.tmp"C:\Users\Admin\AppData\Local\Temp\8A59.tmp"40⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\8D28.tmp"C:\Users\Admin\AppData\Local\Temp\8D28.tmp"41⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\8DA5.tmp"C:\Users\Admin\AppData\Local\Temp\8DA5.tmp"42⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\90A2.tmp"C:\Users\Admin\AppData\Local\Temp\90A2.tmp"43⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\913F.tmp"C:\Users\Admin\AppData\Local\Temp\913F.tmp"44⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\91EA.tmp"C:\Users\Admin\AppData\Local\Temp\91EA.tmp"45⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\9258.tmp"C:\Users\Admin\AppData\Local\Temp\9258.tmp"46⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\92E4.tmp"C:\Users\Admin\AppData\Local\Temp\92E4.tmp"47⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\94C9.tmp"C:\Users\Admin\AppData\Local\Temp\94C9.tmp"48⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\9546.tmp"C:\Users\Admin\AppData\Local\Temp\9546.tmp"49⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\95C3.tmp"C:\Users\Admin\AppData\Local\Temp\95C3.tmp"50⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\9640.tmp"C:\Users\Admin\AppData\Local\Temp\9640.tmp"51⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\96DC.tmp"C:\Users\Admin\AppData\Local\Temp\96DC.tmp"52⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\9769.tmp"C:\Users\Admin\AppData\Local\Temp\9769.tmp"53⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\97E6.tmp"C:\Users\Admin\AppData\Local\Temp\97E6.tmp"54⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\9882.tmp"C:\Users\Admin\AppData\Local\Temp\9882.tmp"55⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\98FF.tmp"C:\Users\Admin\AppData\Local\Temp\98FF.tmp"56⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\9B22.tmp"C:\Users\Admin\AppData\Local\Temp\9B22.tmp"57⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\9BDD.tmp"C:\Users\Admin\AppData\Local\Temp\9BDD.tmp"58⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\9D06.tmp"C:\Users\Admin\AppData\Local\Temp\9D06.tmp"59⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\9D74.tmp"C:\Users\Admin\AppData\Local\Temp\9D74.tmp"60⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\9DF1.tmp"C:\Users\Admin\AppData\Local\Temp\9DF1.tmp"61⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\9E6E.tmp"C:\Users\Admin\AppData\Local\Temp\9E6E.tmp"62⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\9F19.tmp"C:\Users\Admin\AppData\Local\Temp\9F19.tmp"63⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"64⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\A033.tmp"C:\Users\Admin\AppData\Local\Temp\A033.tmp"65⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\A0B0.tmp"C:\Users\Admin\AppData\Local\Temp\A0B0.tmp"66⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\A13C.tmp"C:\Users\Admin\AppData\Local\Temp\A13C.tmp"67⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\A1D9.tmp"C:\Users\Admin\AppData\Local\Temp\A1D9.tmp"68⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\A256.tmp"C:\Users\Admin\AppData\Local\Temp\A256.tmp"69⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\A301.tmp"C:\Users\Admin\AppData\Local\Temp\A301.tmp"70⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\A37E.tmp"C:\Users\Admin\AppData\Local\Temp\A37E.tmp"71⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\A40B.tmp"C:\Users\Admin\AppData\Local\Temp\A40B.tmp"72⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\A478.tmp"C:\Users\Admin\AppData\Local\Temp\A478.tmp"73⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\A515.tmp"C:\Users\Admin\AppData\Local\Temp\A515.tmp"74⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\A7E3.tmp"C:\Users\Admin\AppData\Local\Temp\A7E3.tmp"75⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\A851.tmp"C:\Users\Admin\AppData\Local\Temp\A851.tmp"76⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\A999.tmp"C:\Users\Admin\AppData\Local\Temp\A999.tmp"77⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\AA26.tmp"C:\Users\Admin\AppData\Local\Temp\AA26.tmp"78⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\AAC2.tmp"C:\Users\Admin\AppData\Local\Temp\AAC2.tmp"79⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\AB3F.tmp"C:\Users\Admin\AppData\Local\Temp\AB3F.tmp"80⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\AC29.tmp"C:\Users\Admin\AppData\Local\Temp\AC29.tmp"81⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\AC97.tmp"C:\Users\Admin\AppData\Local\Temp\AC97.tmp"82⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\AD33.tmp"C:\Users\Admin\AppData\Local\Temp\AD33.tmp"83⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\ADB0.tmp"C:\Users\Admin\AppData\Local\Temp\ADB0.tmp"84⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\AE5C.tmp"C:\Users\Admin\AppData\Local\Temp\AE5C.tmp"85⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\AEE8.tmp"C:\Users\Admin\AppData\Local\Temp\AEE8.tmp"86⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\AF85.tmp"C:\Users\Admin\AppData\Local\Temp\AF85.tmp"87⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\B011.tmp"C:\Users\Admin\AppData\Local\Temp\B011.tmp"88⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\B09E.tmp"C:\Users\Admin\AppData\Local\Temp\B09E.tmp"89⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\B11B.tmp"C:\Users\Admin\AppData\Local\Temp\B11B.tmp"90⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\B1C7.tmp"C:\Users\Admin\AppData\Local\Temp\B1C7.tmp"91⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\B253.tmp"C:\Users\Admin\AppData\Local\Temp\B253.tmp"92⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\B2F0.tmp"C:\Users\Admin\AppData\Local\Temp\B2F0.tmp"93⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\B36D.tmp"C:\Users\Admin\AppData\Local\Temp\B36D.tmp"94⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\B418.tmp"C:\Users\Admin\AppData\Local\Temp\B418.tmp"95⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\B4B5.tmp"C:\Users\Admin\AppData\Local\Temp\B4B5.tmp"96⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\B541.tmp"C:\Users\Admin\AppData\Local\Temp\B541.tmp"97⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\B5BE.tmp"C:\Users\Admin\AppData\Local\Temp\B5BE.tmp"98⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\B64B.tmp"C:\Users\Admin\AppData\Local\Temp\B64B.tmp"99⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\B6B8.tmp"C:\Users\Admin\AppData\Local\Temp\B6B8.tmp"100⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\B764.tmp"C:\Users\Admin\AppData\Local\Temp\B764.tmp"101⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\B7E1.tmp"C:\Users\Admin\AppData\Local\Temp\B7E1.tmp"102⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\B85E.tmp"C:\Users\Admin\AppData\Local\Temp\B85E.tmp"103⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\B8DB.tmp"C:\Users\Admin\AppData\Local\Temp\B8DB.tmp"104⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\B977.tmp"C:\Users\Admin\AppData\Local\Temp\B977.tmp"105⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\B9E5.tmp"C:\Users\Admin\AppData\Local\Temp\B9E5.tmp"106⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\BA71.tmp"C:\Users\Admin\AppData\Local\Temp\BA71.tmp"107⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\BADF.tmp"C:\Users\Admin\AppData\Local\Temp\BADF.tmp"108⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\BB5C.tmp"C:\Users\Admin\AppData\Local\Temp\BB5C.tmp"109⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\BBE8.tmp"C:\Users\Admin\AppData\Local\Temp\BBE8.tmp"110⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\BC65.tmp"C:\Users\Admin\AppData\Local\Temp\BC65.tmp"111⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\BD11.tmp"C:\Users\Admin\AppData\Local\Temp\BD11.tmp"112⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\BD7F.tmp"C:\Users\Admin\AppData\Local\Temp\BD7F.tmp"113⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\BE0B.tmp"C:\Users\Admin\AppData\Local\Temp\BE0B.tmp"114⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BE98.tmp"C:\Users\Admin\AppData\Local\Temp\BE98.tmp"115⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\BF34.tmp"C:\Users\Admin\AppData\Local\Temp\BF34.tmp"116⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\BFA2.tmp"C:\Users\Admin\AppData\Local\Temp\BFA2.tmp"117⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\C03E.tmp"C:\Users\Admin\AppData\Local\Temp\C03E.tmp"118⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\C0BB.tmp"C:\Users\Admin\AppData\Local\Temp\C0BB.tmp"119⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\C138.tmp"C:\Users\Admin\AppData\Local\Temp\C138.tmp"120⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\C1C4.tmp"C:\Users\Admin\AppData\Local\Temp\C1C4.tmp"121⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\C251.tmp"C:\Users\Admin\AppData\Local\Temp\C251.tmp"122⤵PID:1104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-