Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 05:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe
-
Size
529KB
-
MD5
b351ab0ee8cffb63e3a931386c89df70
-
SHA1
c2e0ad483477902e2da864b1dd995a528975bc16
-
SHA256
85b12409272c0dd96e5f53356dea847cd48fbb20fa2195b71bbb6bdc1c84a3a5
-
SHA512
2cb3917bb7528c61e069569908d6ce79ce58485643b71c7bc377928231dbaae1870d06c794d24b2ea13735d627a2a7ca31f57e9bb652d03a7ce7460e31617201
-
SSDEEP
12288:NU5rCOTeijPZxLSrzUANmtv61uCxzP6kTZwlH4Hp:NUQOJjPZx2XwtyoCxzPPTSlH4Hp
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2292 85D9.tmp 828 8656.tmp 2140 86D3.tmp 3952 8770.tmp 2684 8889.tmp 3236 8916.tmp 4680 89C1.tmp 4360 8A8D.tmp 3936 8B19.tmp 1864 8B96.tmp 4032 8C23.tmp 3084 8CEE.tmp 3104 8D5B.tmp 4660 8DE8.tmp 4340 8E75.tmp 1716 8ED2.tmp 4428 8FBD.tmp 332 9FF9.tmp 756 90D6.tmp 3356 A122.tmp 3432 91C0.tmp 4652 922E.tmp 4524 92BA.tmp 4328 9328.tmp 3880 93D4.tmp 520 948F.tmp 2484 A4CB.tmp 2784 9589.tmp 1680 9606.tmp 4304 9710.tmp 4364 977D.tmp 1740 9848.tmp 2084 98B6.tmp 1784 svchost.exe 4436 99BF.tmp 2540 9A5B.tmp 2224 9AC9.tmp 3968 9B65.tmp 4360 8A8D.tmp 3936 8B19.tmp 760 9CBD.tmp 4708 9D2A.tmp 3628 9D88.tmp 2692 9E24.tmp 4940 9E92.tmp 1884 9EEF.tmp 3368 9F4D.tmp 3156 9F9B.tmp 332 9FF9.tmp 4764 A0C4.tmp 3356 A122.tmp 3152 A180.tmp 228 A1DD.tmp 4376 A23B.tmp 2744 A299.tmp 1012 A2F7.tmp 2256 A374.tmp 4416 A3E1.tmp 4348 A44E.tmp 2484 A4CB.tmp 2592 A539.tmp 4104 A5C5.tmp 4608 A642.tmp 116 A6BF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2292 1324 2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe 87 PID 1324 wrote to memory of 2292 1324 2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe 87 PID 1324 wrote to memory of 2292 1324 2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe 87 PID 2292 wrote to memory of 828 2292 85D9.tmp 88 PID 2292 wrote to memory of 828 2292 85D9.tmp 88 PID 2292 wrote to memory of 828 2292 85D9.tmp 88 PID 828 wrote to memory of 2140 828 8656.tmp 90 PID 828 wrote to memory of 2140 828 8656.tmp 90 PID 828 wrote to memory of 2140 828 8656.tmp 90 PID 2140 wrote to memory of 3952 2140 86D3.tmp 92 PID 2140 wrote to memory of 3952 2140 86D3.tmp 92 PID 2140 wrote to memory of 3952 2140 86D3.tmp 92 PID 3952 wrote to memory of 2684 3952 8770.tmp 93 PID 3952 wrote to memory of 2684 3952 8770.tmp 93 PID 3952 wrote to memory of 2684 3952 8770.tmp 93 PID 2684 wrote to memory of 3236 2684 8889.tmp 94 PID 2684 wrote to memory of 3236 2684 8889.tmp 94 PID 2684 wrote to memory of 3236 2684 8889.tmp 94 PID 3236 wrote to memory of 4680 3236 8916.tmp 95 PID 3236 wrote to memory of 4680 3236 8916.tmp 95 PID 3236 wrote to memory of 4680 3236 8916.tmp 95 PID 4680 wrote to memory of 4360 4680 89C1.tmp 138 PID 4680 wrote to memory of 4360 4680 89C1.tmp 138 PID 4680 wrote to memory of 4360 4680 89C1.tmp 138 PID 4360 wrote to memory of 3936 4360 8A8D.tmp 136 PID 4360 wrote to memory of 3936 4360 8A8D.tmp 136 PID 4360 wrote to memory of 3936 4360 8A8D.tmp 136 PID 3936 wrote to memory of 1864 3936 8B19.tmp 134 PID 3936 wrote to memory of 1864 3936 8B19.tmp 134 PID 3936 wrote to memory of 1864 3936 8B19.tmp 134 PID 1864 wrote to memory of 4032 1864 8B96.tmp 97 PID 1864 wrote to memory of 4032 1864 8B96.tmp 97 PID 1864 wrote to memory of 4032 1864 8B96.tmp 97 PID 4032 wrote to memory of 3084 4032 8C23.tmp 132 PID 4032 wrote to memory of 3084 4032 8C23.tmp 132 PID 4032 wrote to memory of 3084 4032 8C23.tmp 132 PID 3084 wrote to memory of 3104 3084 8CEE.tmp 98 PID 3084 wrote to memory of 3104 3084 8CEE.tmp 98 PID 3084 wrote to memory of 3104 3084 8CEE.tmp 98 PID 3104 wrote to memory of 4660 3104 8D5B.tmp 101 PID 3104 wrote to memory of 4660 3104 8D5B.tmp 101 PID 3104 wrote to memory of 4660 3104 8D5B.tmp 101 PID 4660 wrote to memory of 4340 4660 8DE8.tmp 100 PID 4660 wrote to memory of 4340 4660 8DE8.tmp 100 PID 4660 wrote to memory of 4340 4660 8DE8.tmp 100 PID 4340 wrote to memory of 1716 4340 8E75.tmp 99 PID 4340 wrote to memory of 1716 4340 8E75.tmp 99 PID 4340 wrote to memory of 1716 4340 8E75.tmp 99 PID 1716 wrote to memory of 4428 1716 8ED2.tmp 128 PID 1716 wrote to memory of 4428 1716 8ED2.tmp 128 PID 1716 wrote to memory of 4428 1716 8ED2.tmp 128 PID 4428 wrote to memory of 332 4428 8FBD.tmp 143 PID 4428 wrote to memory of 332 4428 8FBD.tmp 143 PID 4428 wrote to memory of 332 4428 8FBD.tmp 143 PID 332 wrote to memory of 756 332 9FF9.tmp 125 PID 332 wrote to memory of 756 332 9FF9.tmp 125 PID 332 wrote to memory of 756 332 9FF9.tmp 125 PID 756 wrote to memory of 3356 756 90D6.tmp 145 PID 756 wrote to memory of 3356 756 90D6.tmp 145 PID 756 wrote to memory of 3356 756 90D6.tmp 145 PID 3356 wrote to memory of 3432 3356 A122.tmp 102 PID 3356 wrote to memory of 3432 3356 A122.tmp 102 PID 3356 wrote to memory of 3432 3356 A122.tmp 102 PID 3432 wrote to memory of 4652 3432 91C0.tmp 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_b351ab0ee8cffb63e3a931386c89df70_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\85D9.tmp"C:\Users\Admin\AppData\Local\Temp\85D9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\86D3.tmp"C:\Users\Admin\AppData\Local\Temp\86D3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\8770.tmp"C:\Users\Admin\AppData\Local\Temp\8770.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\8916.tmp"C:\Users\Admin\AppData\Local\Temp\8916.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\89C1.tmp"C:\Users\Admin\AppData\Local\Temp\89C1.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8C23.tmp"C:\Users\Admin\AppData\Local\Temp\8C23.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\8CEE.tmp"C:\Users\Admin\AppData\Local\Temp\8CEE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\8ED2.tmp"C:\Users\Admin\AppData\Local\Temp\8ED2.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\8FBD.tmp"C:\Users\Admin\AppData\Local\Temp\8FBD.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\8E75.tmp"C:\Users\Admin\AppData\Local\Temp\8E75.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340
-
C:\Users\Admin\AppData\Local\Temp\91C0.tmp"C:\Users\Admin\AppData\Local\Temp\91C0.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"2⤵
- Executes dropped EXE
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\9163.tmp"C:\Users\Admin\AppData\Local\Temp\9163.tmp"1⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"1⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\9328.tmp"C:\Users\Admin\AppData\Local\Temp\9328.tmp"2⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\93D4.tmp"C:\Users\Admin\AppData\Local\Temp\93D4.tmp"3⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\948F.tmp"C:\Users\Admin\AppData\Local\Temp\948F.tmp"4⤵
- Executes dropped EXE
PID:520 -
C:\Users\Admin\AppData\Local\Temp\951C.tmp"C:\Users\Admin\AppData\Local\Temp\951C.tmp"5⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"6⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\9606.tmp"C:\Users\Admin\AppData\Local\Temp\9606.tmp"7⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\9710.tmp"C:\Users\Admin\AppData\Local\Temp\9710.tmp"8⤵
- Executes dropped EXE
PID:4304
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\977D.tmp"C:\Users\Admin\AppData\Local\Temp\977D.tmp"1⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\9848.tmp"C:\Users\Admin\AppData\Local\Temp\9848.tmp"2⤵
- Executes dropped EXE
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\98B6.tmp"C:\Users\Admin\AppData\Local\Temp\98B6.tmp"1⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\9923.tmp"C:\Users\Admin\AppData\Local\Temp\9923.tmp"2⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\99BF.tmp"C:\Users\Admin\AppData\Local\Temp\99BF.tmp"3⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"4⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"5⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\9B65.tmp"C:\Users\Admin\AppData\Local\Temp\9B65.tmp"6⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"7⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"8⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\9CBD.tmp"C:\Users\Admin\AppData\Local\Temp\9CBD.tmp"9⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"10⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\9D88.tmp"C:\Users\Admin\AppData\Local\Temp\9D88.tmp"11⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\9E24.tmp"C:\Users\Admin\AppData\Local\Temp\9E24.tmp"12⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"13⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"14⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"15⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"16⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"18⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\A122.tmp"C:\Users\Admin\AppData\Local\Temp\A122.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\A180.tmp"C:\Users\Admin\AppData\Local\Temp\A180.tmp"20⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"21⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\A23B.tmp"C:\Users\Admin\AppData\Local\Temp\A23B.tmp"22⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"23⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\A2F7.tmp"C:\Users\Admin\AppData\Local\Temp\A2F7.tmp"24⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\A374.tmp"C:\Users\Admin\AppData\Local\Temp\A374.tmp"25⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"26⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\A44E.tmp"C:\Users\Admin\AppData\Local\Temp\A44E.tmp"27⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"28⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\A539.tmp"C:\Users\Admin\AppData\Local\Temp\A539.tmp"29⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"30⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"31⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"32⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\A72D.tmp"C:\Users\Admin\AppData\Local\Temp\A72D.tmp"33⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"34⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"35⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"36⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"37⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"38⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\CC29.tmp"C:\Users\Admin\AppData\Local\Temp\CC29.tmp"39⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\CC87.tmp"C:\Users\Admin\AppData\Local\Temp\CC87.tmp"40⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"41⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"42⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"43⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"44⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"45⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"46⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"47⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"48⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"49⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"50⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"51⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"52⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\E474.tmp"C:\Users\Admin\AppData\Local\Temp\E474.tmp"53⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"54⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"55⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"56⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"57⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"58⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\11FC.tmp"C:\Users\Admin\AppData\Local\Temp\11FC.tmp"59⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"60⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"61⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\2006.tmp"C:\Users\Admin\AppData\Local\Temp\2006.tmp"62⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2390.tmp"C:\Users\Admin\AppData\Local\Temp\2390.tmp"63⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"64⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"65⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"66⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"67⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"68⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"69⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\35E0.tmp"C:\Users\Admin\AppData\Local\Temp\35E0.tmp"70⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\363E.tmp"C:\Users\Admin\AppData\Local\Temp\363E.tmp"71⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\36CA.tmp"C:\Users\Admin\AppData\Local\Temp\36CA.tmp"72⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"73⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"74⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\38CE.tmp"C:\Users\Admin\AppData\Local\Temp\38CE.tmp"75⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"76⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"77⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"78⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"79⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"80⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"81⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"82⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"83⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"84⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"85⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\3F94.tmp"C:\Users\Admin\AppData\Local\Temp\3F94.tmp"86⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"87⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"88⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"89⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\4179.tmp"C:\Users\Admin\AppData\Local\Temp\4179.tmp"90⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\41D6.tmp"C:\Users\Admin\AppData\Local\Temp\41D6.tmp"91⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\4273.tmp"C:\Users\Admin\AppData\Local\Temp\4273.tmp"92⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"93⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"94⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"95⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\4496.tmp"C:\Users\Admin\AppData\Local\Temp\4496.tmp"96⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\4580.tmp"C:\Users\Admin\AppData\Local\Temp\4580.tmp"97⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"98⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\465B.tmp"C:\Users\Admin\AppData\Local\Temp\465B.tmp"99⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"100⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"101⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"102⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\482F.tmp"C:\Users\Admin\AppData\Local\Temp\482F.tmp"103⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\488D.tmp"C:\Users\Admin\AppData\Local\Temp\488D.tmp"104⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"105⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"106⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"107⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\4A72.tmp"C:\Users\Admin\AppData\Local\Temp\4A72.tmp"108⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"109⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"110⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"111⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"112⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"113⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\4D40.tmp"C:\Users\Admin\AppData\Local\Temp\4D40.tmp"114⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"115⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"116⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"117⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"118⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"119⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\5196.tmp"C:\Users\Admin\AppData\Local\Temp\5196.tmp"120⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"121⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"122⤵PID:2624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-