Analysis
-
max time kernel
173s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 12:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe
Resource
win7-20240319-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe
-
Size
487KB
-
MD5
d32204f2ea8570e8cc17309e9ed21373
-
SHA1
8da29e09a27e0cea0051a64615208ca9ad4cb812
-
SHA256
61ac5e8af3a0542213e1f73586ad26cf9ab67b22f5e626e28f02cf03b5d8ab5c
-
SHA512
8b26ee2e96d222f2b613c23f4dc3ef619b7eb9a3c0590e621df4ec543f12afd8beb94a0ba93bd8a4d4490392e8604c2d6f19776687c76844e8e67e8c6db39132
-
SSDEEP
12288:yU5rCOTeiNEsHJXY/PLNaPLZ1FVdSqhOYFbZ:yUQOJNEsHJXFRVwqFb
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2844 6666.tmp 2296 6712.tmp 3440 6A8C.tmp 2932 6CAF.tmp 3472 6E74.tmp 3828 7356.tmp 4428 7606.tmp 2160 7AE8.tmp 5096 8008.tmp 3176 80A5.tmp 4580 8112.tmp 4740 81CD.tmp 3212 8FD7.tmp 784 992E.tmp 4032 99CA.tmp 4824 9A47.tmp 2384 9AE3.tmp 3116 9B80.tmp 4980 9C3B.tmp 1252 9C99.tmp 388 9D06.tmp 2660 9DB2.tmp 2740 9F19.tmp 2664 B3DA.tmp 1152 BBD9.tmp 3912 C455.tmp 1456 C510.tmp 2236 C58D.tmp 4060 C639.tmp 4580 C714.tmp 5100 C7FE.tmp 3512 C8AA.tmp 3604 C937.tmp 3928 C9D3.tmp 4636 CA40.tmp 4308 D1B3.tmp 4032 D24F.tmp 1060 D2EB.tmp 4200 D358.tmp 1512 D3E5.tmp 2844 D462.tmp 4980 D4CF.tmp 2408 E1A1.tmp 1884 E421.tmp 4512 E6B2.tmp 2084 E73E.tmp 4836 E7BB.tmp 2932 E838.tmp 2296 E8C5.tmp 5076 E961.tmp 540 EE05.tmp 1656 EE91.tmp 2764 EF1E.tmp 1408 EFBA.tmp 2644 F047.tmp 4872 F0C4.tmp 2728 F150.tmp 3636 F1DD.tmp 3576 F26A.tmp 5016 F315.tmp 3924 F392.tmp 3752 F509.tmp 3948 F577.tmp 1440 F603.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 2844 5056 2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe 91 PID 5056 wrote to memory of 2844 5056 2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe 91 PID 5056 wrote to memory of 2844 5056 2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe 91 PID 2844 wrote to memory of 2296 2844 6666.tmp 93 PID 2844 wrote to memory of 2296 2844 6666.tmp 93 PID 2844 wrote to memory of 2296 2844 6666.tmp 93 PID 2296 wrote to memory of 3440 2296 6712.tmp 94 PID 2296 wrote to memory of 3440 2296 6712.tmp 94 PID 2296 wrote to memory of 3440 2296 6712.tmp 94 PID 3440 wrote to memory of 2932 3440 6A8C.tmp 96 PID 3440 wrote to memory of 2932 3440 6A8C.tmp 96 PID 3440 wrote to memory of 2932 3440 6A8C.tmp 96 PID 2932 wrote to memory of 3472 2932 6CAF.tmp 97 PID 2932 wrote to memory of 3472 2932 6CAF.tmp 97 PID 2932 wrote to memory of 3472 2932 6CAF.tmp 97 PID 3472 wrote to memory of 3828 3472 6E74.tmp 98 PID 3472 wrote to memory of 3828 3472 6E74.tmp 98 PID 3472 wrote to memory of 3828 3472 6E74.tmp 98 PID 3828 wrote to memory of 4428 3828 7356.tmp 99 PID 3828 wrote to memory of 4428 3828 7356.tmp 99 PID 3828 wrote to memory of 4428 3828 7356.tmp 99 PID 4428 wrote to memory of 2160 4428 7606.tmp 101 PID 4428 wrote to memory of 2160 4428 7606.tmp 101 PID 4428 wrote to memory of 2160 4428 7606.tmp 101 PID 2160 wrote to memory of 5096 2160 7AE8.tmp 103 PID 2160 wrote to memory of 5096 2160 7AE8.tmp 103 PID 2160 wrote to memory of 5096 2160 7AE8.tmp 103 PID 5096 wrote to memory of 3176 5096 8008.tmp 105 PID 5096 wrote to memory of 3176 5096 8008.tmp 105 PID 5096 wrote to memory of 3176 5096 8008.tmp 105 PID 3176 wrote to memory of 4580 3176 80A5.tmp 106 PID 3176 wrote to memory of 4580 3176 80A5.tmp 106 PID 3176 wrote to memory of 4580 3176 80A5.tmp 106 PID 4580 wrote to memory of 4740 4580 8112.tmp 107 PID 4580 wrote to memory of 4740 4580 8112.tmp 107 PID 4580 wrote to memory of 4740 4580 8112.tmp 107 PID 4740 wrote to memory of 3212 4740 81CD.tmp 108 PID 4740 wrote to memory of 3212 4740 81CD.tmp 108 PID 4740 wrote to memory of 3212 4740 81CD.tmp 108 PID 3212 wrote to memory of 784 3212 8FD7.tmp 109 PID 3212 wrote to memory of 784 3212 8FD7.tmp 109 PID 3212 wrote to memory of 784 3212 8FD7.tmp 109 PID 784 wrote to memory of 4032 784 992E.tmp 110 PID 784 wrote to memory of 4032 784 992E.tmp 110 PID 784 wrote to memory of 4032 784 992E.tmp 110 PID 4032 wrote to memory of 4824 4032 99CA.tmp 111 PID 4032 wrote to memory of 4824 4032 99CA.tmp 111 PID 4032 wrote to memory of 4824 4032 99CA.tmp 111 PID 4824 wrote to memory of 2384 4824 9A47.tmp 112 PID 4824 wrote to memory of 2384 4824 9A47.tmp 112 PID 4824 wrote to memory of 2384 4824 9A47.tmp 112 PID 2384 wrote to memory of 3116 2384 9AE3.tmp 113 PID 2384 wrote to memory of 3116 2384 9AE3.tmp 113 PID 2384 wrote to memory of 3116 2384 9AE3.tmp 113 PID 3116 wrote to memory of 4980 3116 9B80.tmp 114 PID 3116 wrote to memory of 4980 3116 9B80.tmp 114 PID 3116 wrote to memory of 4980 3116 9B80.tmp 114 PID 4980 wrote to memory of 1252 4980 9C3B.tmp 116 PID 4980 wrote to memory of 1252 4980 9C3B.tmp 116 PID 4980 wrote to memory of 1252 4980 9C3B.tmp 116 PID 1252 wrote to memory of 388 1252 9C99.tmp 117 PID 1252 wrote to memory of 388 1252 9C99.tmp 117 PID 1252 wrote to memory of 388 1252 9C99.tmp 117 PID 388 wrote to memory of 2660 388 9D06.tmp 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_d32204f2ea8570e8cc17309e9ed21373_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\6712.tmp"C:\Users\Admin\AppData\Local\Temp\6712.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\7356.tmp"C:\Users\Admin\AppData\Local\Temp\7356.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\7606.tmp"C:\Users\Admin\AppData\Local\Temp\7606.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\7AE8.tmp"C:\Users\Admin\AppData\Local\Temp\7AE8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\8008.tmp"C:\Users\Admin\AppData\Local\Temp\8008.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\80A5.tmp"C:\Users\Admin\AppData\Local\Temp\80A5.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\8112.tmp"C:\Users\Admin\AppData\Local\Temp\8112.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\81CD.tmp"C:\Users\Admin\AppData\Local\Temp\81CD.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\8FD7.tmp"C:\Users\Admin\AppData\Local\Temp\8FD7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\992E.tmp"C:\Users\Admin\AppData\Local\Temp\992E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\99CA.tmp"C:\Users\Admin\AppData\Local\Temp\99CA.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\9A47.tmp"C:\Users\Admin\AppData\Local\Temp\9A47.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\9AE3.tmp"C:\Users\Admin\AppData\Local\Temp\9AE3.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\9B80.tmp"C:\Users\Admin\AppData\Local\Temp\9B80.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\9C3B.tmp"C:\Users\Admin\AppData\Local\Temp\9C3B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\9C99.tmp"C:\Users\Admin\AppData\Local\Temp\9C99.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\9D06.tmp"C:\Users\Admin\AppData\Local\Temp\9D06.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\9DB2.tmp"C:\Users\Admin\AppData\Local\Temp\9DB2.tmp"23⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\9F19.tmp"C:\Users\Admin\AppData\Local\Temp\9F19.tmp"24⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\B3DA.tmp"C:\Users\Admin\AppData\Local\Temp\B3DA.tmp"25⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"26⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\C455.tmp"C:\Users\Admin\AppData\Local\Temp\C455.tmp"27⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\C510.tmp"C:\Users\Admin\AppData\Local\Temp\C510.tmp"28⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\C58D.tmp"C:\Users\Admin\AppData\Local\Temp\C58D.tmp"29⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\C639.tmp"C:\Users\Admin\AppData\Local\Temp\C639.tmp"30⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\C714.tmp"C:\Users\Admin\AppData\Local\Temp\C714.tmp"31⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"32⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\C8AA.tmp"C:\Users\Admin\AppData\Local\Temp\C8AA.tmp"33⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\C937.tmp"C:\Users\Admin\AppData\Local\Temp\C937.tmp"34⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\C9D3.tmp"C:\Users\Admin\AppData\Local\Temp\C9D3.tmp"35⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\CA40.tmp"C:\Users\Admin\AppData\Local\Temp\CA40.tmp"36⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\D1B3.tmp"C:\Users\Admin\AppData\Local\Temp\D1B3.tmp"37⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\D24F.tmp"C:\Users\Admin\AppData\Local\Temp\D24F.tmp"38⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\D2EB.tmp"C:\Users\Admin\AppData\Local\Temp\D2EB.tmp"39⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\D358.tmp"C:\Users\Admin\AppData\Local\Temp\D358.tmp"40⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\D3E5.tmp"C:\Users\Admin\AppData\Local\Temp\D3E5.tmp"41⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\D462.tmp"C:\Users\Admin\AppData\Local\Temp\D462.tmp"42⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"43⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\E1A1.tmp"C:\Users\Admin\AppData\Local\Temp\E1A1.tmp"44⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\E421.tmp"C:\Users\Admin\AppData\Local\Temp\E421.tmp"45⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\E6B2.tmp"C:\Users\Admin\AppData\Local\Temp\E6B2.tmp"46⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\E73E.tmp"C:\Users\Admin\AppData\Local\Temp\E73E.tmp"47⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\E7BB.tmp"C:\Users\Admin\AppData\Local\Temp\E7BB.tmp"48⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\E838.tmp"C:\Users\Admin\AppData\Local\Temp\E838.tmp"49⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\E8C5.tmp"C:\Users\Admin\AppData\Local\Temp\E8C5.tmp"50⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\E961.tmp"C:\Users\Admin\AppData\Local\Temp\E961.tmp"51⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\EE05.tmp"C:\Users\Admin\AppData\Local\Temp\EE05.tmp"52⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\EE91.tmp"C:\Users\Admin\AppData\Local\Temp\EE91.tmp"53⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\EF1E.tmp"C:\Users\Admin\AppData\Local\Temp\EF1E.tmp"54⤵
- Executes dropped EXE
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\EFBA.tmp"C:\Users\Admin\AppData\Local\Temp\EFBA.tmp"55⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\F047.tmp"C:\Users\Admin\AppData\Local\Temp\F047.tmp"56⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"57⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\F150.tmp"C:\Users\Admin\AppData\Local\Temp\F150.tmp"58⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\F1DD.tmp"C:\Users\Admin\AppData\Local\Temp\F1DD.tmp"59⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\F26A.tmp"C:\Users\Admin\AppData\Local\Temp\F26A.tmp"60⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\F315.tmp"C:\Users\Admin\AppData\Local\Temp\F315.tmp"61⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\F392.tmp"C:\Users\Admin\AppData\Local\Temp\F392.tmp"62⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\F509.tmp"C:\Users\Admin\AppData\Local\Temp\F509.tmp"63⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\F577.tmp"C:\Users\Admin\AppData\Local\Temp\F577.tmp"64⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\F603.tmp"C:\Users\Admin\AppData\Local\Temp\F603.tmp"65⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\F680.tmp"C:\Users\Admin\AppData\Local\Temp\F680.tmp"66⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\F6FD.tmp"C:\Users\Admin\AppData\Local\Temp\F6FD.tmp"67⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\F76B.tmp"C:\Users\Admin\AppData\Local\Temp\F76B.tmp"68⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\F7F7.tmp"C:\Users\Admin\AppData\Local\Temp\F7F7.tmp"69⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\F874.tmp"C:\Users\Admin\AppData\Local\Temp\F874.tmp"70⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\F8F1.tmp"C:\Users\Admin\AppData\Local\Temp\F8F1.tmp"71⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\FBC0.tmp"C:\Users\Admin\AppData\Local\Temp\FBC0.tmp"72⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\FC1E.tmp"C:\Users\Admin\AppData\Local\Temp\FC1E.tmp"73⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\FCAB.tmp"C:\Users\Admin\AppData\Local\Temp\FCAB.tmp"74⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\FD47.tmp"C:\Users\Admin\AppData\Local\Temp\FD47.tmp"75⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\FDD3.tmp"C:\Users\Admin\AppData\Local\Temp\FDD3.tmp"76⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\FE70.tmp"C:\Users\Admin\AppData\Local\Temp\FE70.tmp"77⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\FF6A.tmp"C:\Users\Admin\AppData\Local\Temp\FF6A.tmp"78⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\FFE7.tmp"C:\Users\Admin\AppData\Local\Temp\FFE7.tmp"79⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\83.tmp"C:\Users\Admin\AppData\Local\Temp\83.tmp"80⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\12F.tmp"C:\Users\Admin\AppData\Local\Temp\12F.tmp"81⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\1AC.tmp"C:\Users\Admin\AppData\Local\Temp\1AC.tmp"82⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\238.tmp"C:\Users\Admin\AppData\Local\Temp\238.tmp"83⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2B5.tmp"C:\Users\Admin\AppData\Local\Temp\2B5.tmp"84⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\3AF.tmp"C:\Users\Admin\AppData\Local\Temp\3AF.tmp"85⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\7A7.tmp"C:\Users\Admin\AppData\Local\Temp\7A7.tmp"86⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\AD4.tmp"C:\Users\Admin\AppData\Local\Temp\AD4.tmp"87⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\BCE.tmp"C:\Users\Admin\AppData\Local\Temp\BCE.tmp"88⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\C5A.tmp"C:\Users\Admin\AppData\Local\Temp\C5A.tmp"89⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\CE7.tmp"C:\Users\Admin\AppData\Local\Temp\CE7.tmp"90⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\D64.tmp"C:\Users\Admin\AppData\Local\Temp\D64.tmp"91⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\E00.tmp"C:\Users\Admin\AppData\Local\Temp\E00.tmp"92⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\E9C.tmp"C:\Users\Admin\AppData\Local\Temp\E9C.tmp"93⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\F29.tmp"C:\Users\Admin\AppData\Local\Temp\F29.tmp"94⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\FC5.tmp"C:\Users\Admin\AppData\Local\Temp\FC5.tmp"95⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\1728.tmp"C:\Users\Admin\AppData\Local\Temp\1728.tmp"96⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\17B4.tmp"C:\Users\Admin\AppData\Local\Temp\17B4.tmp"97⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\19C8.tmp"C:\Users\Admin\AppData\Local\Temp\19C8.tmp"98⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\1A54.tmp"C:\Users\Admin\AppData\Local\Temp\1A54.tmp"99⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"100⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"101⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2C27.tmp"C:\Users\Admin\AppData\Local\Temp\2C27.tmp"102⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\2C85.tmp"C:\Users\Admin\AppData\Local\Temp\2C85.tmp"103⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\422F.tmp"C:\Users\Admin\AppData\Local\Temp\422F.tmp"104⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\459A.tmp"C:\Users\Admin\AppData\Local\Temp\459A.tmp"105⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\45F8.tmp"C:\Users\Admin\AppData\Local\Temp\45F8.tmp"106⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\4B96.tmp"C:\Users\Admin\AppData\Local\Temp\4B96.tmp"107⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\4DA9.tmp"C:\Users\Admin\AppData\Local\Temp\4DA9.tmp"108⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\5152.tmp"C:\Users\Admin\AppData\Local\Temp\5152.tmp"109⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\573E.tmp"C:\Users\Admin\AppData\Local\Temp\573E.tmp"110⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\5CDC.tmp"C:\Users\Admin\AppData\Local\Temp\5CDC.tmp"111⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\6894.tmp"C:\Users\Admin\AppData\Local\Temp\6894.tmp"112⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\6D18.tmp"C:\Users\Admin\AppData\Local\Temp\6D18.tmp"113⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\718C.tmp"C:\Users\Admin\AppData\Local\Temp\718C.tmp"114⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\791E.tmp"C:\Users\Admin\AppData\Local\Temp\791E.tmp"115⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\7A56.tmp"C:\Users\Admin\AppData\Local\Temp\7A56.tmp"116⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\8AD1.tmp"C:\Users\Admin\AppData\Local\Temp\8AD1.tmp"117⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\8E7B.tmp"C:\Users\Admin\AppData\Local\Temp\8E7B.tmp"118⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\937C.tmp"C:\Users\Admin\AppData\Local\Temp\937C.tmp"119⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\97F1.tmp"C:\Users\Admin\AppData\Local\Temp\97F1.tmp"120⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\985E.tmp"C:\Users\Admin\AppData\Local\Temp\985E.tmp"121⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\98DB.tmp"C:\Users\Admin\AppData\Local\Temp\98DB.tmp"122⤵PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-