Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 16:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe
-
Size
712KB
-
MD5
c8ca6bbb4898016a4d62495a1e594c5f
-
SHA1
451718dc39664bef0c281d4ff4a0879770a5e434
-
SHA256
3b15082e961b8f9ec95cb6659bc52df5cbe56d3a361dc2b1600a02379a536324
-
SHA512
c43a66c06708ff25d162298bd8c8b9b962f32ec6e7856f45eaa11c77edbd337adaf5456801d0f324a4c394e846aec3304ddc75dede4742f7a0a73f4540275a7b
-
SSDEEP
12288:FU5rCOTeiDUsgK6b/8EfwmQMaGTWsSMKXPEsR0zarjNZdCvq5TJLCvY90D8/LVBN:FUQOJDUsgKhEfwzMaoCXPZRca/NnCvqP
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3544 8944.tmp 1832 89B2.tmp 3820 8A3E.tmp 3508 8B19.tmp 1248 8BC5.tmp 4948 8C52.tmp 2012 8CBF.tmp 3252 8D3C.tmp 1804 8DA9.tmp 1688 8E36.tmp 2356 8E94.tmp 2600 8F01.tmp 2424 8F6F.tmp 1224 8FEC.tmp 1340 9097.tmp 828 9114.tmp 4804 9182.tmp 3344 923D.tmp 664 92BA.tmp 2820 9347.tmp 4616 93D4.tmp 2852 9451.tmp 1520 951C.tmp 3776 95A8.tmp 4928 9645.tmp 2832 96D1.tmp 4832 973F.tmp 1652 97FA.tmp 4720 9867.tmp 2884 9904.tmp 2228 9971.tmp 4628 99FE.tmp 636 9A5B.tmp 2044 9AB9.tmp 448 9B17.tmp 768 9B75.tmp 3740 9BC3.tmp 4860 9C21.tmp 1484 9C7E.tmp 4908 9CDC.tmp 2108 9D2A.tmp 996 9D78.tmp 1336 9DC6.tmp 1820 9E24.tmp 3412 9E82.tmp 1308 9EE0.tmp 4356 9F3D.tmp 3020 9F8C.tmp 368 9FDA.tmp 716 A037.tmp 4480 A095.tmp 1872 A0F3.tmp 3028 A151.tmp 1136 A1AE.tmp 944 A20C.tmp 5024 A27A.tmp 1696 A2C8.tmp 4012 A325.tmp 1972 A383.tmp 1832 A3D1.tmp 1860 A42F.tmp 3136 A47D.tmp 2028 A4DB.tmp 3760 A529.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 3544 4580 2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe 84 PID 4580 wrote to memory of 3544 4580 2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe 84 PID 4580 wrote to memory of 3544 4580 2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe 84 PID 3544 wrote to memory of 1832 3544 8944.tmp 85 PID 3544 wrote to memory of 1832 3544 8944.tmp 85 PID 3544 wrote to memory of 1832 3544 8944.tmp 85 PID 1832 wrote to memory of 3820 1832 89B2.tmp 86 PID 1832 wrote to memory of 3820 1832 89B2.tmp 86 PID 1832 wrote to memory of 3820 1832 89B2.tmp 86 PID 3820 wrote to memory of 3508 3820 8A3E.tmp 88 PID 3820 wrote to memory of 3508 3820 8A3E.tmp 88 PID 3820 wrote to memory of 3508 3820 8A3E.tmp 88 PID 3508 wrote to memory of 1248 3508 8B19.tmp 89 PID 3508 wrote to memory of 1248 3508 8B19.tmp 89 PID 3508 wrote to memory of 1248 3508 8B19.tmp 89 PID 1248 wrote to memory of 4948 1248 8BC5.tmp 90 PID 1248 wrote to memory of 4948 1248 8BC5.tmp 90 PID 1248 wrote to memory of 4948 1248 8BC5.tmp 90 PID 4948 wrote to memory of 2012 4948 8C52.tmp 91 PID 4948 wrote to memory of 2012 4948 8C52.tmp 91 PID 4948 wrote to memory of 2012 4948 8C52.tmp 91 PID 2012 wrote to memory of 3252 2012 8CBF.tmp 92 PID 2012 wrote to memory of 3252 2012 8CBF.tmp 92 PID 2012 wrote to memory of 3252 2012 8CBF.tmp 92 PID 3252 wrote to memory of 1804 3252 8D3C.tmp 93 PID 3252 wrote to memory of 1804 3252 8D3C.tmp 93 PID 3252 wrote to memory of 1804 3252 8D3C.tmp 93 PID 1804 wrote to memory of 1688 1804 8DA9.tmp 94 PID 1804 wrote to memory of 1688 1804 8DA9.tmp 94 PID 1804 wrote to memory of 1688 1804 8DA9.tmp 94 PID 1688 wrote to memory of 2356 1688 8E36.tmp 95 PID 1688 wrote to memory of 2356 1688 8E36.tmp 95 PID 1688 wrote to memory of 2356 1688 8E36.tmp 95 PID 2356 wrote to memory of 2600 2356 8E94.tmp 96 PID 2356 wrote to memory of 2600 2356 8E94.tmp 96 PID 2356 wrote to memory of 2600 2356 8E94.tmp 96 PID 2600 wrote to memory of 2424 2600 8F01.tmp 97 PID 2600 wrote to memory of 2424 2600 8F01.tmp 97 PID 2600 wrote to memory of 2424 2600 8F01.tmp 97 PID 2424 wrote to memory of 1224 2424 8F6F.tmp 98 PID 2424 wrote to memory of 1224 2424 8F6F.tmp 98 PID 2424 wrote to memory of 1224 2424 8F6F.tmp 98 PID 1224 wrote to memory of 1340 1224 8FEC.tmp 99 PID 1224 wrote to memory of 1340 1224 8FEC.tmp 99 PID 1224 wrote to memory of 1340 1224 8FEC.tmp 99 PID 1340 wrote to memory of 828 1340 9097.tmp 100 PID 1340 wrote to memory of 828 1340 9097.tmp 100 PID 1340 wrote to memory of 828 1340 9097.tmp 100 PID 828 wrote to memory of 4804 828 9114.tmp 101 PID 828 wrote to memory of 4804 828 9114.tmp 101 PID 828 wrote to memory of 4804 828 9114.tmp 101 PID 4804 wrote to memory of 3344 4804 9182.tmp 102 PID 4804 wrote to memory of 3344 4804 9182.tmp 102 PID 4804 wrote to memory of 3344 4804 9182.tmp 102 PID 3344 wrote to memory of 664 3344 923D.tmp 103 PID 3344 wrote to memory of 664 3344 923D.tmp 103 PID 3344 wrote to memory of 664 3344 923D.tmp 103 PID 664 wrote to memory of 2820 664 92BA.tmp 104 PID 664 wrote to memory of 2820 664 92BA.tmp 104 PID 664 wrote to memory of 2820 664 92BA.tmp 104 PID 2820 wrote to memory of 4616 2820 9347.tmp 105 PID 2820 wrote to memory of 4616 2820 9347.tmp 105 PID 2820 wrote to memory of 4616 2820 9347.tmp 105 PID 4616 wrote to memory of 2852 4616 93D4.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-09_c8ca6bbb4898016a4d62495a1e594c5f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\89B2.tmp"C:\Users\Admin\AppData\Local\Temp\89B2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\8B19.tmp"C:\Users\Admin\AppData\Local\Temp\8B19.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\8C52.tmp"C:\Users\Admin\AppData\Local\Temp\8C52.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\8F01.tmp"C:\Users\Admin\AppData\Local\Temp\8F01.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\9097.tmp"C:\Users\Admin\AppData\Local\Temp\9097.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\9114.tmp"C:\Users\Admin\AppData\Local\Temp\9114.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\9182.tmp"C:\Users\Admin\AppData\Local\Temp\9182.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\923D.tmp"C:\Users\Admin\AppData\Local\Temp\923D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\9347.tmp"C:\Users\Admin\AppData\Local\Temp\9347.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\93D4.tmp"C:\Users\Admin\AppData\Local\Temp\93D4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\9451.tmp"C:\Users\Admin\AppData\Local\Temp\9451.tmp"23⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\951C.tmp"C:\Users\Admin\AppData\Local\Temp\951C.tmp"24⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\95A8.tmp"C:\Users\Admin\AppData\Local\Temp\95A8.tmp"25⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\9645.tmp"C:\Users\Admin\AppData\Local\Temp\9645.tmp"26⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\96D1.tmp"C:\Users\Admin\AppData\Local\Temp\96D1.tmp"27⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\973F.tmp"C:\Users\Admin\AppData\Local\Temp\973F.tmp"28⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\97FA.tmp"C:\Users\Admin\AppData\Local\Temp\97FA.tmp"29⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"30⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\9904.tmp"C:\Users\Admin\AppData\Local\Temp\9904.tmp"31⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\9971.tmp"C:\Users\Admin\AppData\Local\Temp\9971.tmp"32⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\99FE.tmp"C:\Users\Admin\AppData\Local\Temp\99FE.tmp"33⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"34⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"35⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"36⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\9B75.tmp"C:\Users\Admin\AppData\Local\Temp\9B75.tmp"37⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"38⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\9C21.tmp"C:\Users\Admin\AppData\Local\Temp\9C21.tmp"39⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"40⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"41⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"42⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\9D78.tmp"C:\Users\Admin\AppData\Local\Temp\9D78.tmp"43⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"44⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\9E24.tmp"C:\Users\Admin\AppData\Local\Temp\9E24.tmp"45⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\9E82.tmp"C:\Users\Admin\AppData\Local\Temp\9E82.tmp"46⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"47⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"48⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"49⤵
- Executes dropped EXE
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"50⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\A037.tmp"C:\Users\Admin\AppData\Local\Temp\A037.tmp"51⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\A095.tmp"C:\Users\Admin\AppData\Local\Temp\A095.tmp"52⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"53⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\A151.tmp"C:\Users\Admin\AppData\Local\Temp\A151.tmp"54⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"55⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\A20C.tmp"C:\Users\Admin\AppData\Local\Temp\A20C.tmp"56⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\A27A.tmp"C:\Users\Admin\AppData\Local\Temp\A27A.tmp"57⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"58⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\A325.tmp"C:\Users\Admin\AppData\Local\Temp\A325.tmp"59⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\A383.tmp"C:\Users\Admin\AppData\Local\Temp\A383.tmp"60⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"61⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"62⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\A47D.tmp"C:\Users\Admin\AppData\Local\Temp\A47D.tmp"63⤵
- Executes dropped EXE
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"64⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\A529.tmp"C:\Users\Admin\AppData\Local\Temp\A529.tmp"65⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\A587.tmp"C:\Users\Admin\AppData\Local\Temp\A587.tmp"66⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\A5E5.tmp"C:\Users\Admin\AppData\Local\Temp\A5E5.tmp"67⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"68⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\A6A0.tmp"C:\Users\Admin\AppData\Local\Temp\A6A0.tmp"69⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"70⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"71⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"72⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\A807.tmp"C:\Users\Admin\AppData\Local\Temp\A807.tmp"73⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\A865.tmp"C:\Users\Admin\AppData\Local\Temp\A865.tmp"74⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"75⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\A911.tmp"C:\Users\Admin\AppData\Local\Temp\A911.tmp"76⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"77⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"78⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"79⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\AA88.tmp"C:\Users\Admin\AppData\Local\Temp\AA88.tmp"80⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"81⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\AB34.tmp"C:\Users\Admin\AppData\Local\Temp\AB34.tmp"82⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"83⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\AC1E.tmp"C:\Users\Admin\AppData\Local\Temp\AC1E.tmp"84⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\AC6C.tmp"C:\Users\Admin\AppData\Local\Temp\AC6C.tmp"85⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"86⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\AD28.tmp"C:\Users\Admin\AppData\Local\Temp\AD28.tmp"87⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\AD86.tmp"C:\Users\Admin\AppData\Local\Temp\AD86.tmp"88⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"89⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\AE32.tmp"C:\Users\Admin\AppData\Local\Temp\AE32.tmp"90⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"91⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"92⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"93⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"94⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"95⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"96⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\B083.tmp"C:\Users\Admin\AppData\Local\Temp\B083.tmp"97⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"98⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"99⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"100⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"101⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\B248.tmp"C:\Users\Admin\AppData\Local\Temp\B248.tmp"102⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"103⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"104⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"105⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"106⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"107⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"108⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\B4B9.tmp"C:\Users\Admin\AppData\Local\Temp\B4B9.tmp"109⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\B517.tmp"C:\Users\Admin\AppData\Local\Temp\B517.tmp"110⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"111⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"112⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\B630.tmp"C:\Users\Admin\AppData\Local\Temp\B630.tmp"113⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"114⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"115⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\B73A.tmp"C:\Users\Admin\AppData\Local\Temp\B73A.tmp"116⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"117⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"118⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"119⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"120⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"121⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\B96D.tmp"C:\Users\Admin\AppData\Local\Temp\B96D.tmp"122⤵PID:4240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-