Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 12:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe
-
Size
520KB
-
MD5
5483274bf5cc7ac8b2a0eb3afe3c3668
-
SHA1
da5c0658bee15b7f6c4dcc8e2ecc0417bedf5945
-
SHA256
7264f1b37401d3542bbd956e2aa19b8fdccd8bc521fcca71c3995347eacddf20
-
SHA512
db4f16f68a5aa355391842309814f4433de2eac6f75e4b404a7bb97f5dfffaaeb152fff916f89c1392c7a1b967355f6a10f0da5b2f497fc7c188c116bed84b0d
-
SSDEEP
6144:pXT6Oq8HBh4huuAOBdRFyh1T55i8fkbM+p1y29sH3b3R13+1Db+ujM7wW76eELrZ:gj8fuxR21t5i8fQ62c3bf+sJ6zHpNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2216 7B36.tmp 4016 842F.tmp 1508 870D.tmp 3952 8901.tmp 924 8A0B.tmp 4424 8C5D.tmp 2820 8CE9.tmp 2756 8DB4.tmp 4088 8E51.tmp 720 8F79.tmp 3656 90E1.tmp 660 918D.tmp 3316 9277.tmp 3008 9584.tmp 2784 997C.tmp 4816 9B80.tmp 4116 9C2B.tmp 3544 9EDB.tmp 2152 9FC5.tmp 1944 A0A0.tmp 2080 A294.tmp 1364 A340.tmp 3188 A3DC.tmp 4280 A5C1.tmp 4916 A66C.tmp 1016 A8CE.tmp 3520 A999.tmp 3456 AC29.tmp 3700 AD81.tmp 2488 AE0E.tmp 228 AEE8.tmp 3324 AFA4.tmp 5008 B159.tmp 3304 B1D6.tmp 2952 B263.tmp 1176 B409.tmp 3000 B486.tmp 4056 B551.tmp 1564 B7B2.tmp 2660 B8EB.tmp 4452 B958.tmp 3148 BA52.tmp 2144 BACF.tmp 4436 BC17.tmp 4848 BD40.tmp 4908 BDAE.tmp 952 BE0B.tmp 3668 BE88.tmp 3608 BF15.tmp 4380 BF82.tmp 2248 BFFF.tmp 4464 C06D.tmp 4536 C0F9.tmp 936 C213.tmp 408 C29F.tmp 4128 C33B.tmp 3008 C3C8.tmp 2576 C464.tmp 1492 C4D2.tmp 208 C53F.tmp 1788 C5CC.tmp 732 C6B6.tmp 1280 C7CF.tmp 4008 C88B.tmp -
Loads dropped DLL 1 IoCs
pid Process 1080 B694.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 324 wrote to memory of 2216 324 2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe 93 PID 324 wrote to memory of 2216 324 2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe 93 PID 324 wrote to memory of 2216 324 2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe 93 PID 2216 wrote to memory of 4016 2216 7B36.tmp 94 PID 2216 wrote to memory of 4016 2216 7B36.tmp 94 PID 2216 wrote to memory of 4016 2216 7B36.tmp 94 PID 4016 wrote to memory of 1508 4016 842F.tmp 95 PID 4016 wrote to memory of 1508 4016 842F.tmp 95 PID 4016 wrote to memory of 1508 4016 842F.tmp 95 PID 1508 wrote to memory of 3952 1508 870D.tmp 96 PID 1508 wrote to memory of 3952 1508 870D.tmp 96 PID 1508 wrote to memory of 3952 1508 870D.tmp 96 PID 3952 wrote to memory of 924 3952 8901.tmp 97 PID 3952 wrote to memory of 924 3952 8901.tmp 97 PID 3952 wrote to memory of 924 3952 8901.tmp 97 PID 924 wrote to memory of 4424 924 8A0B.tmp 98 PID 924 wrote to memory of 4424 924 8A0B.tmp 98 PID 924 wrote to memory of 4424 924 8A0B.tmp 98 PID 4424 wrote to memory of 2820 4424 8C5D.tmp 100 PID 4424 wrote to memory of 2820 4424 8C5D.tmp 100 PID 4424 wrote to memory of 2820 4424 8C5D.tmp 100 PID 2820 wrote to memory of 2756 2820 8CE9.tmp 101 PID 2820 wrote to memory of 2756 2820 8CE9.tmp 101 PID 2820 wrote to memory of 2756 2820 8CE9.tmp 101 PID 2756 wrote to memory of 4088 2756 8DB4.tmp 102 PID 2756 wrote to memory of 4088 2756 8DB4.tmp 102 PID 2756 wrote to memory of 4088 2756 8DB4.tmp 102 PID 4088 wrote to memory of 720 4088 8E51.tmp 104 PID 4088 wrote to memory of 720 4088 8E51.tmp 104 PID 4088 wrote to memory of 720 4088 8E51.tmp 104 PID 720 wrote to memory of 3656 720 8F79.tmp 105 PID 720 wrote to memory of 3656 720 8F79.tmp 105 PID 720 wrote to memory of 3656 720 8F79.tmp 105 PID 3656 wrote to memory of 660 3656 90E1.tmp 106 PID 3656 wrote to memory of 660 3656 90E1.tmp 106 PID 3656 wrote to memory of 660 3656 90E1.tmp 106 PID 660 wrote to memory of 3316 660 918D.tmp 107 PID 660 wrote to memory of 3316 660 918D.tmp 107 PID 660 wrote to memory of 3316 660 918D.tmp 107 PID 3316 wrote to memory of 3008 3316 9277.tmp 108 PID 3316 wrote to memory of 3008 3316 9277.tmp 108 PID 3316 wrote to memory of 3008 3316 9277.tmp 108 PID 3008 wrote to memory of 2784 3008 9584.tmp 109 PID 3008 wrote to memory of 2784 3008 9584.tmp 109 PID 3008 wrote to memory of 2784 3008 9584.tmp 109 PID 2784 wrote to memory of 4816 2784 997C.tmp 110 PID 2784 wrote to memory of 4816 2784 997C.tmp 110 PID 2784 wrote to memory of 4816 2784 997C.tmp 110 PID 4816 wrote to memory of 4116 4816 9B80.tmp 111 PID 4816 wrote to memory of 4116 4816 9B80.tmp 111 PID 4816 wrote to memory of 4116 4816 9B80.tmp 111 PID 4116 wrote to memory of 3544 4116 9C2B.tmp 112 PID 4116 wrote to memory of 3544 4116 9C2B.tmp 112 PID 4116 wrote to memory of 3544 4116 9C2B.tmp 112 PID 3544 wrote to memory of 2152 3544 9EDB.tmp 113 PID 3544 wrote to memory of 2152 3544 9EDB.tmp 113 PID 3544 wrote to memory of 2152 3544 9EDB.tmp 113 PID 2152 wrote to memory of 1944 2152 9FC5.tmp 114 PID 2152 wrote to memory of 1944 2152 9FC5.tmp 114 PID 2152 wrote to memory of 1944 2152 9FC5.tmp 114 PID 1944 wrote to memory of 2080 1944 A0A0.tmp 115 PID 1944 wrote to memory of 2080 1944 A0A0.tmp 115 PID 1944 wrote to memory of 2080 1944 A0A0.tmp 115 PID 2080 wrote to memory of 1364 2080 A294.tmp 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_5483274bf5cc7ac8b2a0eb3afe3c3668_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\7B36.tmp"C:\Users\Admin\AppData\Local\Temp\7B36.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\842F.tmp"C:\Users\Admin\AppData\Local\Temp\842F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\870D.tmp"C:\Users\Admin\AppData\Local\Temp\870D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\8901.tmp"C:\Users\Admin\AppData\Local\Temp\8901.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\8A0B.tmp"C:\Users\Admin\AppData\Local\Temp\8A0B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\8CE9.tmp"C:\Users\Admin\AppData\Local\Temp\8CE9.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\8DB4.tmp"C:\Users\Admin\AppData\Local\Temp\8DB4.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\8E51.tmp"C:\Users\Admin\AppData\Local\Temp\8E51.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\8F79.tmp"C:\Users\Admin\AppData\Local\Temp\8F79.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\90E1.tmp"C:\Users\Admin\AppData\Local\Temp\90E1.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\918D.tmp"C:\Users\Admin\AppData\Local\Temp\918D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\9277.tmp"C:\Users\Admin\AppData\Local\Temp\9277.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\9584.tmp"C:\Users\Admin\AppData\Local\Temp\9584.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\997C.tmp"C:\Users\Admin\AppData\Local\Temp\997C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\9B80.tmp"C:\Users\Admin\AppData\Local\Temp\9B80.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\9EDB.tmp"C:\Users\Admin\AppData\Local\Temp\9EDB.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\A0A0.tmp"C:\Users\Admin\AppData\Local\Temp\A0A0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\A294.tmp"C:\Users\Admin\AppData\Local\Temp\A294.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\A340.tmp"C:\Users\Admin\AppData\Local\Temp\A340.tmp"23⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\A3DC.tmp"C:\Users\Admin\AppData\Local\Temp\A3DC.tmp"24⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\A5C1.tmp"C:\Users\Admin\AppData\Local\Temp\A5C1.tmp"25⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\A66C.tmp"C:\Users\Admin\AppData\Local\Temp\A66C.tmp"26⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\A8CE.tmp"C:\Users\Admin\AppData\Local\Temp\A8CE.tmp"27⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\A999.tmp"C:\Users\Admin\AppData\Local\Temp\A999.tmp"28⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\AC29.tmp"C:\Users\Admin\AppData\Local\Temp\AC29.tmp"29⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\AD81.tmp"C:\Users\Admin\AppData\Local\Temp\AD81.tmp"30⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\AE0E.tmp"C:\Users\Admin\AppData\Local\Temp\AE0E.tmp"31⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\AEE8.tmp"C:\Users\Admin\AppData\Local\Temp\AEE8.tmp"32⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\AFA4.tmp"C:\Users\Admin\AppData\Local\Temp\AFA4.tmp"33⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\B159.tmp"C:\Users\Admin\AppData\Local\Temp\B159.tmp"34⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"35⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\B263.tmp"C:\Users\Admin\AppData\Local\Temp\B263.tmp"36⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\B409.tmp"C:\Users\Admin\AppData\Local\Temp\B409.tmp"37⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\B486.tmp"C:\Users\Admin\AppData\Local\Temp\B486.tmp"38⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\B551.tmp"C:\Users\Admin\AppData\Local\Temp\B551.tmp"39⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\B7B2.tmp"C:\Users\Admin\AppData\Local\Temp\B7B2.tmp"40⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\B8EB.tmp"C:\Users\Admin\AppData\Local\Temp\B8EB.tmp"41⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\B958.tmp"C:\Users\Admin\AppData\Local\Temp\B958.tmp"42⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\BA52.tmp"C:\Users\Admin\AppData\Local\Temp\BA52.tmp"43⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\BACF.tmp"C:\Users\Admin\AppData\Local\Temp\BACF.tmp"44⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\BC17.tmp"C:\Users\Admin\AppData\Local\Temp\BC17.tmp"45⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\BD40.tmp"C:\Users\Admin\AppData\Local\Temp\BD40.tmp"46⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"47⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\BE0B.tmp"C:\Users\Admin\AppData\Local\Temp\BE0B.tmp"48⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\BE88.tmp"C:\Users\Admin\AppData\Local\Temp\BE88.tmp"49⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\BF15.tmp"C:\Users\Admin\AppData\Local\Temp\BF15.tmp"50⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\BF82.tmp"C:\Users\Admin\AppData\Local\Temp\BF82.tmp"51⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\BFFF.tmp"C:\Users\Admin\AppData\Local\Temp\BFFF.tmp"52⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\C06D.tmp"C:\Users\Admin\AppData\Local\Temp\C06D.tmp"53⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\C0F9.tmp"C:\Users\Admin\AppData\Local\Temp\C0F9.tmp"54⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\C213.tmp"C:\Users\Admin\AppData\Local\Temp\C213.tmp"55⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\C29F.tmp"C:\Users\Admin\AppData\Local\Temp\C29F.tmp"56⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\C33B.tmp"C:\Users\Admin\AppData\Local\Temp\C33B.tmp"57⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\C3C8.tmp"C:\Users\Admin\AppData\Local\Temp\C3C8.tmp"58⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\C464.tmp"C:\Users\Admin\AppData\Local\Temp\C464.tmp"59⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\C4D2.tmp"C:\Users\Admin\AppData\Local\Temp\C4D2.tmp"60⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\C53F.tmp"C:\Users\Admin\AppData\Local\Temp\C53F.tmp"61⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\C5CC.tmp"C:\Users\Admin\AppData\Local\Temp\C5CC.tmp"62⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\C6B6.tmp"C:\Users\Admin\AppData\Local\Temp\C6B6.tmp"63⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\C7CF.tmp"C:\Users\Admin\AppData\Local\Temp\C7CF.tmp"64⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\C88B.tmp"C:\Users\Admin\AppData\Local\Temp\C88B.tmp"65⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\C8F8.tmp"C:\Users\Admin\AppData\Local\Temp\C8F8.tmp"66⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\C975.tmp"C:\Users\Admin\AppData\Local\Temp\C975.tmp"67⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\CA11.tmp"C:\Users\Admin\AppData\Local\Temp\CA11.tmp"68⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\CA8E.tmp"C:\Users\Admin\AppData\Local\Temp\CA8E.tmp"69⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\CB2B.tmp"C:\Users\Admin\AppData\Local\Temp\CB2B.tmp"70⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"71⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\CD2E.tmp"C:\Users\Admin\AppData\Local\Temp\CD2E.tmp"72⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\CDCB.tmp"C:\Users\Admin\AppData\Local\Temp\CDCB.tmp"73⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\CE57.tmp"C:\Users\Admin\AppData\Local\Temp\CE57.tmp"74⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\CEC5.tmp"C:\Users\Admin\AppData\Local\Temp\CEC5.tmp"75⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\CF51.tmp"C:\Users\Admin\AppData\Local\Temp\CF51.tmp"76⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\D05B.tmp"C:\Users\Admin\AppData\Local\Temp\D05B.tmp"77⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\D193.tmp"C:\Users\Admin\AppData\Local\Temp\D193.tmp"78⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\D230.tmp"C:\Users\Admin\AppData\Local\Temp\D230.tmp"79⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\D2BC.tmp"C:\Users\Admin\AppData\Local\Temp\D2BC.tmp"80⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\D349.tmp"C:\Users\Admin\AppData\Local\Temp\D349.tmp"81⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"82⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\D54C.tmp"C:\Users\Admin\AppData\Local\Temp\D54C.tmp"83⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\D5BA.tmp"C:\Users\Admin\AppData\Local\Temp\D5BA.tmp"84⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\D6D3.tmp"C:\Users\Admin\AppData\Local\Temp\D6D3.tmp"85⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\D76F.tmp"C:\Users\Admin\AppData\Local\Temp\D76F.tmp"86⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\D85A.tmp"C:\Users\Admin\AppData\Local\Temp\D85A.tmp"87⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\D8F6.tmp"C:\Users\Admin\AppData\Local\Temp\D8F6.tmp"88⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\D992.tmp"C:\Users\Admin\AppData\Local\Temp\D992.tmp"89⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\DA3E.tmp"C:\Users\Admin\AppData\Local\Temp\DA3E.tmp"90⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\DACB.tmp"C:\Users\Admin\AppData\Local\Temp\DACB.tmp"91⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\DB67.tmp"C:\Users\Admin\AppData\Local\Temp\DB67.tmp"92⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\DC03.tmp"C:\Users\Admin\AppData\Local\Temp\DC03.tmp"93⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"94⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\DD2C.tmp"C:\Users\Admin\AppData\Local\Temp\DD2C.tmp"95⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\DDB9.tmp"C:\Users\Admin\AppData\Local\Temp\DDB9.tmp"96⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\DE55.tmp"C:\Users\Admin\AppData\Local\Temp\DE55.tmp"97⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\DEF1.tmp"C:\Users\Admin\AppData\Local\Temp\DEF1.tmp"98⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\DF8D.tmp"C:\Users\Admin\AppData\Local\Temp\DF8D.tmp"99⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\E059.tmp"C:\Users\Admin\AppData\Local\Temp\E059.tmp"100⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\E0E5.tmp"C:\Users\Admin\AppData\Local\Temp\E0E5.tmp"101⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\E172.tmp"C:\Users\Admin\AppData\Local\Temp\E172.tmp"102⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\E20E.tmp"C:\Users\Admin\AppData\Local\Temp\E20E.tmp"103⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\E3D3.tmp"C:\Users\Admin\AppData\Local\Temp\E3D3.tmp"104⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\E4CD.tmp"C:\Users\Admin\AppData\Local\Temp\E4CD.tmp"105⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\E53B.tmp"C:\Users\Admin\AppData\Local\Temp\E53B.tmp"106⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\E644.tmp"C:\Users\Admin\AppData\Local\Temp\E644.tmp"107⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\E6D1.tmp"C:\Users\Admin\AppData\Local\Temp\E6D1.tmp"108⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\E75D.tmp"C:\Users\Admin\AppData\Local\Temp\E75D.tmp"109⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\E903.tmp"C:\Users\Admin\AppData\Local\Temp\E903.tmp"110⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\E9A0.tmp"C:\Users\Admin\AppData\Local\Temp\E9A0.tmp"111⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\EAC8.tmp"C:\Users\Admin\AppData\Local\Temp\EAC8.tmp"112⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\EB45.tmp"C:\Users\Admin\AppData\Local\Temp\EB45.tmp"113⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\ECFB.tmp"C:\Users\Admin\AppData\Local\Temp\ECFB.tmp"114⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\ED88.tmp"C:\Users\Admin\AppData\Local\Temp\ED88.tmp"115⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\EF9B.tmp"C:\Users\Admin\AppData\Local\Temp\EF9B.tmp"116⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\F018.tmp"C:\Users\Admin\AppData\Local\Temp\F018.tmp"117⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\F19E.tmp"C:\Users\Admin\AppData\Local\Temp\F19E.tmp"118⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\F22B.tmp"C:\Users\Admin\AppData\Local\Temp\F22B.tmp"119⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\F2A8.tmp"C:\Users\Admin\AppData\Local\Temp\F2A8.tmp"120⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\F335.tmp"C:\Users\Admin\AppData\Local\Temp\F335.tmp"121⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\F49C.tmp"C:\Users\Admin\AppData\Local\Temp\F49C.tmp"122⤵PID:1624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-