Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 15:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe
-
Size
488KB
-
MD5
9ddb1454665a2fa5bd74e6aef3add44c
-
SHA1
73e2911a012055ef772bbdec820cbed7d661ba8d
-
SHA256
32baa99c119bd68c4a1b9a1b5b19f42039f2cc7cc8bb14129fdefebd53cb8947
-
SHA512
a6fd9079a497069e4fdc342438fd37ad73f477dbf710c8cf4cb41e05620092b0bc1207693ade31934c9dedd6118cf72eea7ac742e6f1a141270a21b4f09ead19
-
SSDEEP
12288:/U5rCOTeiDpjNR9jGRhqycX5koa8H8ONZ:/UQOJDpjNRZGHqycX5VrPN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2812 800D.tmp 4764 80B9.tmp 3508 97FA.tmp 1568 9FF9.tmp 4752 A345.tmp 1884 A6BF.tmp 3896 A79A.tmp 4480 A836.tmp 4980 AAD6.tmp 1832 AB72.tmp 2208 AC4D.tmp 948 ACE9.tmp 1648 AD95.tmp 3296 AF0C.tmp 3952 AFB8.tmp 1016 B083.tmp 3420 B13F.tmp 2288 B1EB.tmp 3128 B304.tmp 1092 B90F.tmp 3596 BAD4.tmp 3004 BD26.tmp 4492 BE20.tmp 4284 BEEB.tmp 4768 BFC6.tmp 4240 C14C.tmp 1208 C208.tmp 1840 C39E.tmp 4384 C469.tmp 3392 C544.tmp 4628 CDDF.tmp 1644 D060.tmp 4948 D10B.tmp 4776 D179.tmp 4824 D1F6.tmp 3800 D292.tmp 1944 D32E.tmp 4196 D65B.tmp 1620 D6E7.tmp 4584 D784.tmp 4676 D810.tmp 3896 D88D.tmp 1056 D9C6.tmp 3152 DA24.tmp 3120 DA72.tmp 368 DACF.tmp 1144 DB3D.tmp 3496 DBC9.tmp 2540 DC66.tmp 2020 DCF2.tmp 912 DD60.tmp 3192 DDBD.tmp 4620 DE89.tmp 4536 DF06.tmp 2560 DF83.tmp 3452 E00F.tmp 2936 E08C.tmp 2996 E0FA.tmp 1940 E186.tmp 3068 E1F4.tmp 872 E280.tmp 3252 E32C.tmp 3128 E407.tmp 1092 E4A3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 2812 3936 2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe 88 PID 3936 wrote to memory of 2812 3936 2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe 88 PID 3936 wrote to memory of 2812 3936 2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe 88 PID 2812 wrote to memory of 4764 2812 800D.tmp 89 PID 2812 wrote to memory of 4764 2812 800D.tmp 89 PID 2812 wrote to memory of 4764 2812 800D.tmp 89 PID 4764 wrote to memory of 3508 4764 80B9.tmp 90 PID 4764 wrote to memory of 3508 4764 80B9.tmp 90 PID 4764 wrote to memory of 3508 4764 80B9.tmp 90 PID 3508 wrote to memory of 1568 3508 97FA.tmp 91 PID 3508 wrote to memory of 1568 3508 97FA.tmp 91 PID 3508 wrote to memory of 1568 3508 97FA.tmp 91 PID 1568 wrote to memory of 4752 1568 9FF9.tmp 93 PID 1568 wrote to memory of 4752 1568 9FF9.tmp 93 PID 1568 wrote to memory of 4752 1568 9FF9.tmp 93 PID 4752 wrote to memory of 1884 4752 A345.tmp 94 PID 4752 wrote to memory of 1884 4752 A345.tmp 94 PID 4752 wrote to memory of 1884 4752 A345.tmp 94 PID 1884 wrote to memory of 3896 1884 A6BF.tmp 96 PID 1884 wrote to memory of 3896 1884 A6BF.tmp 96 PID 1884 wrote to memory of 3896 1884 A6BF.tmp 96 PID 3896 wrote to memory of 4480 3896 A79A.tmp 97 PID 3896 wrote to memory of 4480 3896 A79A.tmp 97 PID 3896 wrote to memory of 4480 3896 A79A.tmp 97 PID 4480 wrote to memory of 4980 4480 A836.tmp 98 PID 4480 wrote to memory of 4980 4480 A836.tmp 98 PID 4480 wrote to memory of 4980 4480 A836.tmp 98 PID 4980 wrote to memory of 1832 4980 AAD6.tmp 99 PID 4980 wrote to memory of 1832 4980 AAD6.tmp 99 PID 4980 wrote to memory of 1832 4980 AAD6.tmp 99 PID 1832 wrote to memory of 2208 1832 AB72.tmp 101 PID 1832 wrote to memory of 2208 1832 AB72.tmp 101 PID 1832 wrote to memory of 2208 1832 AB72.tmp 101 PID 2208 wrote to memory of 948 2208 AC4D.tmp 102 PID 2208 wrote to memory of 948 2208 AC4D.tmp 102 PID 2208 wrote to memory of 948 2208 AC4D.tmp 102 PID 948 wrote to memory of 1648 948 ACE9.tmp 103 PID 948 wrote to memory of 1648 948 ACE9.tmp 103 PID 948 wrote to memory of 1648 948 ACE9.tmp 103 PID 1648 wrote to memory of 3296 1648 AD95.tmp 104 PID 1648 wrote to memory of 3296 1648 AD95.tmp 104 PID 1648 wrote to memory of 3296 1648 AD95.tmp 104 PID 3296 wrote to memory of 3952 3296 AF0C.tmp 105 PID 3296 wrote to memory of 3952 3296 AF0C.tmp 105 PID 3296 wrote to memory of 3952 3296 AF0C.tmp 105 PID 3952 wrote to memory of 1016 3952 AFB8.tmp 106 PID 3952 wrote to memory of 1016 3952 AFB8.tmp 106 PID 3952 wrote to memory of 1016 3952 AFB8.tmp 106 PID 1016 wrote to memory of 3420 1016 B083.tmp 107 PID 1016 wrote to memory of 3420 1016 B083.tmp 107 PID 1016 wrote to memory of 3420 1016 B083.tmp 107 PID 3420 wrote to memory of 2288 3420 B13F.tmp 108 PID 3420 wrote to memory of 2288 3420 B13F.tmp 108 PID 3420 wrote to memory of 2288 3420 B13F.tmp 108 PID 2288 wrote to memory of 3128 2288 B1EB.tmp 109 PID 2288 wrote to memory of 3128 2288 B1EB.tmp 109 PID 2288 wrote to memory of 3128 2288 B1EB.tmp 109 PID 3128 wrote to memory of 1092 3128 B304.tmp 110 PID 3128 wrote to memory of 1092 3128 B304.tmp 110 PID 3128 wrote to memory of 1092 3128 B304.tmp 110 PID 1092 wrote to memory of 3596 1092 B90F.tmp 111 PID 1092 wrote to memory of 3596 1092 B90F.tmp 111 PID 1092 wrote to memory of 3596 1092 B90F.tmp 111 PID 3596 wrote to memory of 3004 3596 BAD4.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_9ddb1454665a2fa5bd74e6aef3add44c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\800D.tmp"C:\Users\Admin\AppData\Local\Temp\800D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\97FA.tmp"C:\Users\Admin\AppData\Local\Temp\97FA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\A345.tmp"C:\Users\Admin\AppData\Local\Temp\A345.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\ACE9.tmp"C:\Users\Admin\AppData\Local\Temp\ACE9.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\AD95.tmp"C:\Users\Admin\AppData\Local\Temp\AD95.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\B083.tmp"C:\Users\Admin\AppData\Local\Temp\B083.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"23⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\BE20.tmp"C:\Users\Admin\AppData\Local\Temp\BE20.tmp"24⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"25⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"26⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"27⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"28⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\C39E.tmp"C:\Users\Admin\AppData\Local\Temp\C39E.tmp"29⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\C469.tmp"C:\Users\Admin\AppData\Local\Temp\C469.tmp"30⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\C544.tmp"C:\Users\Admin\AppData\Local\Temp\C544.tmp"31⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"32⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"33⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"34⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\D179.tmp"C:\Users\Admin\AppData\Local\Temp\D179.tmp"35⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"36⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"37⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"38⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"39⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"40⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\D784.tmp"C:\Users\Admin\AppData\Local\Temp\D784.tmp"41⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"42⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\D88D.tmp"C:\Users\Admin\AppData\Local\Temp\D88D.tmp"43⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"44⤵
- Executes dropped EXE
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\DA24.tmp"C:\Users\Admin\AppData\Local\Temp\DA24.tmp"45⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"46⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"47⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"48⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"49⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"50⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"51⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\DD60.tmp"C:\Users\Admin\AppData\Local\Temp\DD60.tmp"52⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"53⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\DE89.tmp"C:\Users\Admin\AppData\Local\Temp\DE89.tmp"54⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\DF06.tmp"C:\Users\Admin\AppData\Local\Temp\DF06.tmp"55⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"56⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"57⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"58⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"59⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\E186.tmp"C:\Users\Admin\AppData\Local\Temp\E186.tmp"60⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"61⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"62⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"63⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\E407.tmp"C:\Users\Admin\AppData\Local\Temp\E407.tmp"64⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"65⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"66⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\E58D.tmp"C:\Users\Admin\AppData\Local\Temp\E58D.tmp"67⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"68⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"69⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"70⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"71⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\E81E.tmp"C:\Users\Admin\AppData\Local\Temp\E81E.tmp"72⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"73⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\E937.tmp"C:\Users\Admin\AppData\Local\Temp\E937.tmp"74⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"75⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\EA50.tmp"C:\Users\Admin\AppData\Local\Temp\EA50.tmp"76⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\EACD.tmp"C:\Users\Admin\AppData\Local\Temp\EACD.tmp"77⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"78⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"79⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"80⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"81⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"82⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"83⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"84⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"85⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"86⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\F02C.tmp"C:\Users\Admin\AppData\Local\Temp\F02C.tmp"87⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"88⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\F165.tmp"C:\Users\Admin\AppData\Local\Temp\F165.tmp"89⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"90⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\F25F.tmp"C:\Users\Admin\AppData\Local\Temp\F25F.tmp"91⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"92⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\F349.tmp"C:\Users\Admin\AppData\Local\Temp\F349.tmp"93⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"94⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\F453.tmp"C:\Users\Admin\AppData\Local\Temp\F453.tmp"95⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"96⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"97⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"98⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\F685.tmp"C:\Users\Admin\AppData\Local\Temp\F685.tmp"99⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"100⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"101⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\F81B.tmp"C:\Users\Admin\AppData\Local\Temp\F81B.tmp"102⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\F898.tmp"C:\Users\Admin\AppData\Local\Temp\F898.tmp"103⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\F915.tmp"C:\Users\Admin\AppData\Local\Temp\F915.tmp"104⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"105⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"106⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"107⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"108⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"109⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"110⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"111⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"112⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"113⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\FE46.tmp"C:\Users\Admin\AppData\Local\Temp\FE46.tmp"114⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\FED2.tmp"C:\Users\Admin\AppData\Local\Temp\FED2.tmp"115⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"116⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"117⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"118⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"119⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"120⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"121⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"122⤵PID:4888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-