Analysis
-
max time kernel
176s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 06:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe
-
Size
486KB
-
MD5
d2b92f8df59117218aec07ae267f46fc
-
SHA1
08d5b0bc4757f77328490fff0390680fed9094e1
-
SHA256
742e4d125d40f531b7c07ec1685ad46b97d0d6f5a583f8dbfeb51b35df8d32de
-
SHA512
e60aef1e6ad338e6e5fd95faab21ab1b3232fb0c48cebb5e0808c0e116fc9f6bb8d52760e1fb6f7a73153eef33c7a89ac85f41a7f53ce807e63447dfc54e689f
-
SSDEEP
12288:/U5rCOTeiDv8NsBhOUGYxk/RyHHNK1eMRUNZ:/UQOJDv8Nfl/mqaN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4864 DCC3.tmp 2236 DD50.tmp 3776 DE0C.tmp 3432 DE98.tmp 3424 EFBF.tmp 4220 DFD1.tmp 4644 E03E.tmp 2372 E0EA.tmp 1176 E167.tmp 1616 E1D4.tmp 3152 3F3.tmp 2244 E2CE.tmp 4360 F433.tmp 3092 svchost.exe 4664 470.tmp 3644 E4C2.tmp 1404 E520.tmp 4756 E58D.tmp 2044 E5EB.tmp 3784 E6F5.tmp 4764 E772.tmp 2424 E7EF.tmp 2852 F85A.tmp 4040 E8BA.tmp 2812 E927.tmp 2472 E9A4.tmp 2768 EA21.tmp 4572 EABE.tmp 1512 CCC.tmp 3288 EB98.tmp 4332 ECA2.tmp 5064 ED1F.tmp 3284 ED9C.tmp 2008 FEB3.tmp 1288 EEC5.tmp 1988 1018.tmp 3424 EFBF.tmp 3308 F02C.tmp 4996 F09A.tmp 3968 F126.tmp 4420 F1C2.tmp 2956 F23F.tmp 3584 328.tmp 4224 385.tmp 3152 3F3.tmp 4360 F433.tmp 788 F4A1.tmp 3636 F50E.tmp 4772 654.tmp 64 F5E9.tmp 1980 F666.tmp 2500 F712.tmp 3400 F77F.tmp 4948 F7FC.tmp 2852 F85A.tmp 2024 F8C7.tmp 1036 F935.tmp 1360 F9C1.tmp 1280 FA3E.tmp 3544 FABB.tmp 1768 FB38.tmp 4460 FBD5.tmp 1376 FC52.tmp 3280 D3A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 4864 4304 2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe 89 PID 4304 wrote to memory of 4864 4304 2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe 89 PID 4304 wrote to memory of 4864 4304 2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe 89 PID 4864 wrote to memory of 2236 4864 DCC3.tmp 90 PID 4864 wrote to memory of 2236 4864 DCC3.tmp 90 PID 4864 wrote to memory of 2236 4864 DCC3.tmp 90 PID 2236 wrote to memory of 3776 2236 DD50.tmp 91 PID 2236 wrote to memory of 3776 2236 DD50.tmp 91 PID 2236 wrote to memory of 3776 2236 DD50.tmp 91 PID 3776 wrote to memory of 3432 3776 DE0C.tmp 92 PID 3776 wrote to memory of 3432 3776 DE0C.tmp 92 PID 3776 wrote to memory of 3432 3776 DE0C.tmp 92 PID 3432 wrote to memory of 3424 3432 DE98.tmp 124 PID 3432 wrote to memory of 3424 3432 DE98.tmp 124 PID 3432 wrote to memory of 3424 3432 DE98.tmp 124 PID 3424 wrote to memory of 4220 3424 EFBF.tmp 95 PID 3424 wrote to memory of 4220 3424 EFBF.tmp 95 PID 3424 wrote to memory of 4220 3424 EFBF.tmp 95 PID 4220 wrote to memory of 4644 4220 DFD1.tmp 96 PID 4220 wrote to memory of 4644 4220 DFD1.tmp 96 PID 4220 wrote to memory of 4644 4220 DFD1.tmp 96 PID 4644 wrote to memory of 2372 4644 E03E.tmp 98 PID 4644 wrote to memory of 2372 4644 E03E.tmp 98 PID 4644 wrote to memory of 2372 4644 E03E.tmp 98 PID 2372 wrote to memory of 1176 2372 E0EA.tmp 97 PID 2372 wrote to memory of 1176 2372 E0EA.tmp 97 PID 2372 wrote to memory of 1176 2372 E0EA.tmp 97 PID 1176 wrote to memory of 1616 1176 E167.tmp 99 PID 1176 wrote to memory of 1616 1176 E167.tmp 99 PID 1176 wrote to memory of 1616 1176 E167.tmp 99 PID 1616 wrote to memory of 3152 1616 E1D4.tmp 178 PID 1616 wrote to memory of 3152 1616 E1D4.tmp 178 PID 1616 wrote to memory of 3152 1616 E1D4.tmp 178 PID 3152 wrote to memory of 2244 3152 3F3.tmp 105 PID 3152 wrote to memory of 2244 3152 3F3.tmp 105 PID 3152 wrote to memory of 2244 3152 3F3.tmp 105 PID 2244 wrote to memory of 4360 2244 E2CE.tmp 142 PID 2244 wrote to memory of 4360 2244 E2CE.tmp 142 PID 2244 wrote to memory of 4360 2244 E2CE.tmp 142 PID 4360 wrote to memory of 3092 4360 F433.tmp 140 PID 4360 wrote to memory of 3092 4360 F433.tmp 140 PID 4360 wrote to memory of 3092 4360 F433.tmp 140 PID 3092 wrote to memory of 4664 3092 svchost.exe 179 PID 3092 wrote to memory of 4664 3092 svchost.exe 179 PID 3092 wrote to memory of 4664 3092 svchost.exe 179 PID 4664 wrote to memory of 3644 4664 470.tmp 145 PID 4664 wrote to memory of 3644 4664 470.tmp 145 PID 4664 wrote to memory of 3644 4664 470.tmp 145 PID 3644 wrote to memory of 1404 3644 E4C2.tmp 136 PID 3644 wrote to memory of 1404 3644 E4C2.tmp 136 PID 3644 wrote to memory of 1404 3644 E4C2.tmp 136 PID 1404 wrote to memory of 4756 1404 E520.tmp 106 PID 1404 wrote to memory of 4756 1404 E520.tmp 106 PID 1404 wrote to memory of 4756 1404 E520.tmp 106 PID 4756 wrote to memory of 2044 4756 E58D.tmp 107 PID 4756 wrote to memory of 2044 4756 E58D.tmp 107 PID 4756 wrote to memory of 2044 4756 E58D.tmp 107 PID 2044 wrote to memory of 3784 2044 E5EB.tmp 133 PID 2044 wrote to memory of 3784 2044 E5EB.tmp 133 PID 2044 wrote to memory of 3784 2044 E5EB.tmp 133 PID 3784 wrote to memory of 4764 3784 E6F5.tmp 130 PID 3784 wrote to memory of 4764 3784 E6F5.tmp 130 PID 3784 wrote to memory of 4764 3784 E6F5.tmp 130 PID 4764 wrote to memory of 2424 4764 E772.tmp 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_d2b92f8df59117218aec07ae267f46fc_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\DD50.tmp"C:\Users\Admin\AppData\Local\Temp\DD50.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\DE98.tmp"C:\Users\Admin\AppData\Local\Temp\DE98.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"6⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\E261.tmp"C:\Users\Admin\AppData\Local\Temp\E261.tmp"3⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"1⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"2⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"2⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\F50E.tmp"C:\Users\Admin\AppData\Local\Temp\F50E.tmp"3⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\F57C.tmp"C:\Users\Admin\AppData\Local\Temp\F57C.tmp"4⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"5⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"6⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\F712.tmp"C:\Users\Admin\AppData\Local\Temp\F712.tmp"7⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"8⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"9⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"10⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"11⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"12⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"13⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"14⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"15⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"16⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"17⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"18⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"19⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\FD1D.tmp"C:\Users\Admin\AppData\Local\Temp\FD1D.tmp"20⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"21⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"22⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"23⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"24⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\FF30.tmp"C:\Users\Admin\AppData\Local\Temp\FF30.tmp"25⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"26⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"27⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"28⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\F5.tmp"C:\Users\Admin\AppData\Local\Temp\F5.tmp"29⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"30⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"31⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\23D.tmp"C:\Users\Admin\AppData\Local\Temp\23D.tmp"32⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"33⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"34⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\385.tmp"C:\Users\Admin\AppData\Local\Temp\385.tmp"35⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"36⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\470.tmp"C:\Users\Admin\AppData\Local\Temp\470.tmp"37⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"38⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\54A.tmp"C:\Users\Admin\AppData\Local\Temp\54A.tmp"39⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\5C7.tmp"C:\Users\Admin\AppData\Local\Temp\5C7.tmp"40⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"41⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"42⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"43⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\7CB.tmp"C:\Users\Admin\AppData\Local\Temp\7CB.tmp"44⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"45⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"46⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\913.tmp"C:\Users\Admin\AppData\Local\Temp\913.tmp"47⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\981.tmp"C:\Users\Admin\AppData\Local\Temp\981.tmp"48⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"49⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"50⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\AE8.tmp"C:\Users\Admin\AppData\Local\Temp\AE8.tmp"51⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"52⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"53⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"54⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"55⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\D3A.tmp"C:\Users\Admin\AppData\Local\Temp\D3A.tmp"56⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\DA7.tmp"C:\Users\Admin\AppData\Local\Temp\DA7.tmp"57⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"58⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"59⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\F4D.tmp"C:\Users\Admin\AppData\Local\Temp\F4D.tmp"60⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"61⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\1018.tmp"C:\Users\Admin\AppData\Local\Temp\1018.tmp"62⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"63⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"64⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"65⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\14DB.tmp"C:\Users\Admin\AppData\Local\Temp\14DB.tmp"66⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\1558.tmp"C:\Users\Admin\AppData\Local\Temp\1558.tmp"67⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\15D5.tmp"C:\Users\Admin\AppData\Local\Temp\15D5.tmp"68⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"69⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\178A.tmp"C:\Users\Admin\AppData\Local\Temp\178A.tmp"70⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\17F8.tmp"C:\Users\Admin\AppData\Local\Temp\17F8.tmp"71⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"72⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"73⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"74⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"75⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"76⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"77⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"78⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"79⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"80⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"81⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"82⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"83⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"84⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"85⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"86⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\5148.tmp"C:\Users\Admin\AppData\Local\Temp\5148.tmp"87⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"88⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"89⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\5F80.tmp"C:\Users\Admin\AppData\Local\Temp\5F80.tmp"90⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\6750.tmp"C:\Users\Admin\AppData\Local\Temp\6750.tmp"91⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"92⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\6B19.tmp"C:\Users\Admin\AppData\Local\Temp\6B19.tmp"93⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"94⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\72AA.tmp"C:\Users\Admin\AppData\Local\Temp\72AA.tmp"95⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\7664.tmp"C:\Users\Admin\AppData\Local\Temp\7664.tmp"96⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\77FA.tmp"C:\Users\Admin\AppData\Local\Temp\77FA.tmp"97⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\7961.tmp"C:\Users\Admin\AppData\Local\Temp\7961.tmp"98⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"99⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"100⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\80C4.tmp"C:\Users\Admin\AppData\Local\Temp\80C4.tmp"101⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\879A.tmp"C:\Users\Admin\AppData\Local\Temp\879A.tmp"102⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\8E60.tmp"C:\Users\Admin\AppData\Local\Temp\8E60.tmp"103⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\9575.tmp"C:\Users\Admin\AppData\Local\Temp\9575.tmp"104⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\9B60.tmp"C:\Users\Admin\AppData\Local\Temp\9B60.tmp"105⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"C:\Users\Admin\AppData\Local\Temp\A3FB.tmp"106⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\A4F5.tmp"C:\Users\Admin\AppData\Local\Temp\A4F5.tmp"107⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\A5FF.tmp"C:\Users\Admin\AppData\Local\Temp\A5FF.tmp"108⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\A6F9.tmp"C:\Users\Admin\AppData\Local\Temp\A6F9.tmp"109⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\A7C4.tmp"C:\Users\Admin\AppData\Local\Temp\A7C4.tmp"110⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\A880.tmp"C:\Users\Admin\AppData\Local\Temp\A880.tmp"111⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\A94B.tmp"C:\Users\Admin\AppData\Local\Temp\A94B.tmp"112⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\AA06.tmp"C:\Users\Admin\AppData\Local\Temp\AA06.tmp"113⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\AB20.tmp"C:\Users\Admin\AppData\Local\Temp\AB20.tmp"114⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\AC48.tmp"C:\Users\Admin\AppData\Local\Temp\AC48.tmp"115⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\ADDF.tmp"C:\Users\Admin\AppData\Local\Temp\ADDF.tmp"116⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\AF65.tmp"C:\Users\Admin\AppData\Local\Temp\AF65.tmp"117⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\AFD3.tmp"C:\Users\Admin\AppData\Local\Temp\AFD3.tmp"118⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"119⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\B179.tmp"C:\Users\Admin\AppData\Local\Temp\B179.tmp"120⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"121⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\B263.tmp"C:\Users\Admin\AppData\Local\Temp\B263.tmp"122⤵PID:1616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-