Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 15:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe
Resource
win7-20240319-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe
-
Size
486KB
-
MD5
f9651a2145f26e80f2ab417c962fa2ab
-
SHA1
f6e595f52a04354d2dea9b2efd96501b7e2df411
-
SHA256
0fae5139ce2d9d016dd000cc448c43a321cbe06105d306b63500c1a634823712
-
SHA512
dab84d48777cc3730eb15a1c4e8482d14516fcf9dc0dd23576f6f34bdb2f3784dc368179ca4d05fc74f2e5eff9dfaf58d8e11aded276638c0b667b67fc03997f
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7XDrbGz0cSbnJZmp77XzNs5lx11CXwHHKLZsz:/U5rCOTeiDnAENs777wHIeNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2924 7BC7.tmp 1172 7CE1.tmp 236 7D7D.tmp 4680 7E29.tmp 1368 7E96.tmp 440 7F52.tmp 3412 7FCF.tmp 1036 806B.tmp 2384 833A.tmp 812 83C6.tmp 3396 8491.tmp 3240 853D.tmp 3276 85BA.tmp 3220 87AE.tmp 2352 885A.tmp 3900 8916.tmp 1840 89B2.tmp 1264 8A4E.tmp 2128 8ADB.tmp 2240 8B87.tmp 4984 8D8A.tmp 4840 8E17.tmp 64 8F01.tmp 4248 8FAD.tmp 4536 9059.tmp 3176 9376.tmp 4280 9829.tmp 396 9ED0.tmp 3588 A20C.tmp 3428 A2E7.tmp 1812 A3A2.tmp 1580 A41F.tmp 2132 AA59.tmp 1412 AB44.tmp 1616 ABB1.tmp 636 AC3E.tmp 3580 AD38.tmp 572 AE22.tmp 2004 AE9F.tmp 4700 AF0C.tmp 1472 AF89.tmp 3584 B371.tmp 3168 B3EE.tmp 2032 B48B.tmp 3116 B508.tmp 1628 B602.tmp 4852 B66F.tmp 2116 B71B.tmp 2092 B7A7.tmp 4300 B834.tmp 1036 B8B1.tmp 3976 B92E.tmp 5016 B9CA.tmp 2492 BA57.tmp 764 BBCE.tmp 4048 BC3B.tmp 2088 BCA9.tmp 924 BD06.tmp 3284 BD93.tmp 1264 BE2F.tmp 2476 BEAC.tmp 4692 BF49.tmp 4792 BFB6.tmp 1876 C0DF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 2924 3576 2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe 86 PID 3576 wrote to memory of 2924 3576 2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe 86 PID 3576 wrote to memory of 2924 3576 2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe 86 PID 2924 wrote to memory of 1172 2924 7BC7.tmp 88 PID 2924 wrote to memory of 1172 2924 7BC7.tmp 88 PID 2924 wrote to memory of 1172 2924 7BC7.tmp 88 PID 1172 wrote to memory of 236 1172 7CE1.tmp 89 PID 1172 wrote to memory of 236 1172 7CE1.tmp 89 PID 1172 wrote to memory of 236 1172 7CE1.tmp 89 PID 236 wrote to memory of 4680 236 7D7D.tmp 90 PID 236 wrote to memory of 4680 236 7D7D.tmp 90 PID 236 wrote to memory of 4680 236 7D7D.tmp 90 PID 4680 wrote to memory of 1368 4680 7E29.tmp 91 PID 4680 wrote to memory of 1368 4680 7E29.tmp 91 PID 4680 wrote to memory of 1368 4680 7E29.tmp 91 PID 1368 wrote to memory of 440 1368 7E96.tmp 92 PID 1368 wrote to memory of 440 1368 7E96.tmp 92 PID 1368 wrote to memory of 440 1368 7E96.tmp 92 PID 440 wrote to memory of 3412 440 7F52.tmp 93 PID 440 wrote to memory of 3412 440 7F52.tmp 93 PID 440 wrote to memory of 3412 440 7F52.tmp 93 PID 3412 wrote to memory of 1036 3412 7FCF.tmp 94 PID 3412 wrote to memory of 1036 3412 7FCF.tmp 94 PID 3412 wrote to memory of 1036 3412 7FCF.tmp 94 PID 1036 wrote to memory of 2384 1036 806B.tmp 95 PID 1036 wrote to memory of 2384 1036 806B.tmp 95 PID 1036 wrote to memory of 2384 1036 806B.tmp 95 PID 2384 wrote to memory of 812 2384 833A.tmp 96 PID 2384 wrote to memory of 812 2384 833A.tmp 96 PID 2384 wrote to memory of 812 2384 833A.tmp 96 PID 812 wrote to memory of 3396 812 83C6.tmp 97 PID 812 wrote to memory of 3396 812 83C6.tmp 97 PID 812 wrote to memory of 3396 812 83C6.tmp 97 PID 3396 wrote to memory of 3240 3396 8491.tmp 98 PID 3396 wrote to memory of 3240 3396 8491.tmp 98 PID 3396 wrote to memory of 3240 3396 8491.tmp 98 PID 3240 wrote to memory of 3276 3240 853D.tmp 99 PID 3240 wrote to memory of 3276 3240 853D.tmp 99 PID 3240 wrote to memory of 3276 3240 853D.tmp 99 PID 3276 wrote to memory of 3220 3276 85BA.tmp 100 PID 3276 wrote to memory of 3220 3276 85BA.tmp 100 PID 3276 wrote to memory of 3220 3276 85BA.tmp 100 PID 3220 wrote to memory of 2352 3220 87AE.tmp 101 PID 3220 wrote to memory of 2352 3220 87AE.tmp 101 PID 3220 wrote to memory of 2352 3220 87AE.tmp 101 PID 2352 wrote to memory of 3900 2352 885A.tmp 102 PID 2352 wrote to memory of 3900 2352 885A.tmp 102 PID 2352 wrote to memory of 3900 2352 885A.tmp 102 PID 3900 wrote to memory of 1840 3900 8916.tmp 103 PID 3900 wrote to memory of 1840 3900 8916.tmp 103 PID 3900 wrote to memory of 1840 3900 8916.tmp 103 PID 1840 wrote to memory of 1264 1840 89B2.tmp 104 PID 1840 wrote to memory of 1264 1840 89B2.tmp 104 PID 1840 wrote to memory of 1264 1840 89B2.tmp 104 PID 1264 wrote to memory of 2128 1264 8A4E.tmp 105 PID 1264 wrote to memory of 2128 1264 8A4E.tmp 105 PID 1264 wrote to memory of 2128 1264 8A4E.tmp 105 PID 2128 wrote to memory of 2240 2128 8ADB.tmp 106 PID 2128 wrote to memory of 2240 2128 8ADB.tmp 106 PID 2128 wrote to memory of 2240 2128 8ADB.tmp 106 PID 2240 wrote to memory of 4984 2240 8B87.tmp 107 PID 2240 wrote to memory of 4984 2240 8B87.tmp 107 PID 2240 wrote to memory of 4984 2240 8B87.tmp 107 PID 4984 wrote to memory of 4840 4984 8D8A.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_f9651a2145f26e80f2ab417c962fa2ab_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\7E29.tmp"C:\Users\Admin\AppData\Local\Temp\7E29.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\7E96.tmp"C:\Users\Admin\AppData\Local\Temp\7E96.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\806B.tmp"C:\Users\Admin\AppData\Local\Temp\806B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\83C6.tmp"C:\Users\Admin\AppData\Local\Temp\83C6.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\853D.tmp"C:\Users\Admin\AppData\Local\Temp\853D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\85BA.tmp"C:\Users\Admin\AppData\Local\Temp\85BA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\87AE.tmp"C:\Users\Admin\AppData\Local\Temp\87AE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\885A.tmp"C:\Users\Admin\AppData\Local\Temp\885A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\8916.tmp"C:\Users\Admin\AppData\Local\Temp\8916.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\89B2.tmp"C:\Users\Admin\AppData\Local\Temp\89B2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\8A4E.tmp"C:\Users\Admin\AppData\Local\Temp\8A4E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\8B87.tmp"C:\Users\Admin\AppData\Local\Temp\8B87.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\8E17.tmp"C:\Users\Admin\AppData\Local\Temp\8E17.tmp"23⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\8F01.tmp"C:\Users\Admin\AppData\Local\Temp\8F01.tmp"24⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"25⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\9059.tmp"C:\Users\Admin\AppData\Local\Temp\9059.tmp"26⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"27⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\9829.tmp"C:\Users\Admin\AppData\Local\Temp\9829.tmp"28⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\9ED0.tmp"C:\Users\Admin\AppData\Local\Temp\9ED0.tmp"29⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\A20C.tmp"C:\Users\Admin\AppData\Local\Temp\A20C.tmp"30⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"31⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"32⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\A41F.tmp"C:\Users\Admin\AppData\Local\Temp\A41F.tmp"33⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\AA59.tmp"C:\Users\Admin\AppData\Local\Temp\AA59.tmp"34⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\AB44.tmp"C:\Users\Admin\AppData\Local\Temp\AB44.tmp"35⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\ABB1.tmp"C:\Users\Admin\AppData\Local\Temp\ABB1.tmp"36⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"37⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\AD38.tmp"C:\Users\Admin\AppData\Local\Temp\AD38.tmp"38⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"39⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"40⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"41⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"42⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"43⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"44⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"45⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\B48B.tmp"C:\Users\Admin\AppData\Local\Temp\B48B.tmp"46⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"47⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"48⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"49⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\B71B.tmp"C:\Users\Admin\AppData\Local\Temp\B71B.tmp"50⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"51⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"52⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"53⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"54⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"55⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"56⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"57⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"58⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"59⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\BD06.tmp"C:\Users\Admin\AppData\Local\Temp\BD06.tmp"60⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\BD93.tmp"C:\Users\Admin\AppData\Local\Temp\BD93.tmp"61⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"62⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\BEAC.tmp"C:\Users\Admin\AppData\Local\Temp\BEAC.tmp"63⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"64⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"65⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"66⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\C15C.tmp"C:\Users\Admin\AppData\Local\Temp\C15C.tmp"67⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"68⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\C275.tmp"C:\Users\Admin\AppData\Local\Temp\C275.tmp"69⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\C311.tmp"C:\Users\Admin\AppData\Local\Temp\C311.tmp"70⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\C3AE.tmp"C:\Users\Admin\AppData\Local\Temp\C3AE.tmp"71⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\C41B.tmp"C:\Users\Admin\AppData\Local\Temp\C41B.tmp"72⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"73⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"74⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\C61F.tmp"C:\Users\Admin\AppData\Local\Temp\C61F.tmp"75⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"76⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"77⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"78⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"79⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"80⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"81⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\D169.tmp"C:\Users\Admin\AppData\Local\Temp\D169.tmp"82⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"83⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"84⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"85⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"86⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"87⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"88⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"89⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"90⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"91⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"92⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"93⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"94⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"95⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"96⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"97⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"98⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"99⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"100⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"101⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"102⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\E04E.tmp"C:\Users\Admin\AppData\Local\Temp\E04E.tmp"103⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"104⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"105⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"106⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"107⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"108⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"109⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"110⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"111⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"112⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\E55F.tmp"C:\Users\Admin\AppData\Local\Temp\E55F.tmp"113⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"114⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\E678.tmp"C:\Users\Admin\AppData\Local\Temp\E678.tmp"115⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"116⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"117⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"118⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp"119⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"120⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"121⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"122⤵PID:1684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-