Analysis
-
max time kernel
169s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 22:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe
-
Size
486KB
-
MD5
411a92054963897bb57a1b8dbc9ba50e
-
SHA1
f28cf814f8cd632188f48b854a2dc480f637e684
-
SHA256
529520b9ac1251c3f1b0522badfefd926ce131f91a39a370ce339878d401d103
-
SHA512
0460541b862fe03bbb7b042602a25bdb996383a343ef57c021cd2e1250dcce535e7bda9d52eb920409ad5df86f81da154dad996c371d49f840c8c016c60615d9
-
SSDEEP
12288:/U5rCOTeiDeJQrbS9KuhPOKjPJBw8WlU/8FpNZ:/UQOJDePMu/Sx2sN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4356 343A.tmp 4812 34F6.tmp 2128 35C1.tmp 760 3709.tmp 4168 397A.tmp 4676 3BCC.tmp 4912 3DEE.tmp 1700 3FE2.tmp 3600 4169.tmp 544 435D.tmp 4896 4457.tmp 3280 44E4.tmp 2012 463B.tmp 2384 4716.tmp 112 48FB.tmp 4088 4AC0.tmp 2632 4D8E.tmp 1856 4E5A.tmp 4916 4F15.tmp 3348 4FB1.tmp 996 5176.tmp 2196 52DE.tmp 4852 53D8.tmp 3308 560A.tmp 4880 56A7.tmp 4752 5772.tmp 4312 58AA.tmp 3164 59A4.tmp 2424 5A9E.tmp 1464 5BC7.tmp 4044 5C92.tmp 1660 5D3E.tmp 1972 5EC5.tmp 1484 5F51.tmp 2028 5FCE.tmp 2192 605B.tmp 3980 60F7.tmp 452 6230.tmp 4528 6462.tmp 4776 6741.tmp 4308 67CD.tmp 1936 68A8.tmp 2472 6935.tmp 4900 69D1.tmp 1112 6A6D.tmp 5088 6B09.tmp 380 6B77.tmp 4496 6D1D.tmp 3644 6DE8.tmp 2104 700B.tmp 1452 7088.tmp 1632 71EF.tmp 1344 752B.tmp 2616 7C6E.tmp 4080 7CEB.tmp 3392 7D78.tmp 4200 7DE5.tmp 2808 7FAB.tmp 4688 8037.tmp 2784 80A5.tmp 8 8112.tmp 2584 8383.tmp 2736 8BEF.tmp 4664 8D95.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4356 3380 2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe 88 PID 3380 wrote to memory of 4356 3380 2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe 88 PID 3380 wrote to memory of 4356 3380 2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe 88 PID 4356 wrote to memory of 4812 4356 343A.tmp 89 PID 4356 wrote to memory of 4812 4356 343A.tmp 89 PID 4356 wrote to memory of 4812 4356 343A.tmp 89 PID 4812 wrote to memory of 2128 4812 34F6.tmp 90 PID 4812 wrote to memory of 2128 4812 34F6.tmp 90 PID 4812 wrote to memory of 2128 4812 34F6.tmp 90 PID 2128 wrote to memory of 760 2128 35C1.tmp 91 PID 2128 wrote to memory of 760 2128 35C1.tmp 91 PID 2128 wrote to memory of 760 2128 35C1.tmp 91 PID 760 wrote to memory of 4168 760 3709.tmp 92 PID 760 wrote to memory of 4168 760 3709.tmp 92 PID 760 wrote to memory of 4168 760 3709.tmp 92 PID 4168 wrote to memory of 4676 4168 397A.tmp 93 PID 4168 wrote to memory of 4676 4168 397A.tmp 93 PID 4168 wrote to memory of 4676 4168 397A.tmp 93 PID 4676 wrote to memory of 4912 4676 3BCC.tmp 94 PID 4676 wrote to memory of 4912 4676 3BCC.tmp 94 PID 4676 wrote to memory of 4912 4676 3BCC.tmp 94 PID 4912 wrote to memory of 1700 4912 3DEE.tmp 95 PID 4912 wrote to memory of 1700 4912 3DEE.tmp 95 PID 4912 wrote to memory of 1700 4912 3DEE.tmp 95 PID 1700 wrote to memory of 3600 1700 3FE2.tmp 96 PID 1700 wrote to memory of 3600 1700 3FE2.tmp 96 PID 1700 wrote to memory of 3600 1700 3FE2.tmp 96 PID 3600 wrote to memory of 544 3600 4169.tmp 97 PID 3600 wrote to memory of 544 3600 4169.tmp 97 PID 3600 wrote to memory of 544 3600 4169.tmp 97 PID 544 wrote to memory of 4896 544 435D.tmp 98 PID 544 wrote to memory of 4896 544 435D.tmp 98 PID 544 wrote to memory of 4896 544 435D.tmp 98 PID 4896 wrote to memory of 3280 4896 4457.tmp 99 PID 4896 wrote to memory of 3280 4896 4457.tmp 99 PID 4896 wrote to memory of 3280 4896 4457.tmp 99 PID 3280 wrote to memory of 2012 3280 44E4.tmp 100 PID 3280 wrote to memory of 2012 3280 44E4.tmp 100 PID 3280 wrote to memory of 2012 3280 44E4.tmp 100 PID 2012 wrote to memory of 2384 2012 463B.tmp 101 PID 2012 wrote to memory of 2384 2012 463B.tmp 101 PID 2012 wrote to memory of 2384 2012 463B.tmp 101 PID 2384 wrote to memory of 112 2384 4716.tmp 102 PID 2384 wrote to memory of 112 2384 4716.tmp 102 PID 2384 wrote to memory of 112 2384 4716.tmp 102 PID 112 wrote to memory of 4088 112 48FB.tmp 103 PID 112 wrote to memory of 4088 112 48FB.tmp 103 PID 112 wrote to memory of 4088 112 48FB.tmp 103 PID 4088 wrote to memory of 2632 4088 4AC0.tmp 104 PID 4088 wrote to memory of 2632 4088 4AC0.tmp 104 PID 4088 wrote to memory of 2632 4088 4AC0.tmp 104 PID 2632 wrote to memory of 1856 2632 4D8E.tmp 105 PID 2632 wrote to memory of 1856 2632 4D8E.tmp 105 PID 2632 wrote to memory of 1856 2632 4D8E.tmp 105 PID 1856 wrote to memory of 4916 1856 4E5A.tmp 106 PID 1856 wrote to memory of 4916 1856 4E5A.tmp 106 PID 1856 wrote to memory of 4916 1856 4E5A.tmp 106 PID 4916 wrote to memory of 3348 4916 4F15.tmp 107 PID 4916 wrote to memory of 3348 4916 4F15.tmp 107 PID 4916 wrote to memory of 3348 4916 4F15.tmp 107 PID 3348 wrote to memory of 996 3348 4FB1.tmp 108 PID 3348 wrote to memory of 996 3348 4FB1.tmp 108 PID 3348 wrote to memory of 996 3348 4FB1.tmp 108 PID 996 wrote to memory of 2196 996 5176.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_411a92054963897bb57a1b8dbc9ba50e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\34F6.tmp"C:\Users\Admin\AppData\Local\Temp\34F6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\397A.tmp"C:\Users\Admin\AppData\Local\Temp\397A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\435D.tmp"C:\Users\Admin\AppData\Local\Temp\435D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\4457.tmp"C:\Users\Admin\AppData\Local\Temp\4457.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\44E4.tmp"C:\Users\Admin\AppData\Local\Temp\44E4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\463B.tmp"C:\Users\Admin\AppData\Local\Temp\463B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\4FB1.tmp"C:\Users\Admin\AppData\Local\Temp\4FB1.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\5176.tmp"C:\Users\Admin\AppData\Local\Temp\5176.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"23⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"24⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\560A.tmp"C:\Users\Admin\AppData\Local\Temp\560A.tmp"25⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"26⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"27⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\58AA.tmp"C:\Users\Admin\AppData\Local\Temp\58AA.tmp"28⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\59A4.tmp"C:\Users\Admin\AppData\Local\Temp\59A4.tmp"29⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"30⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"31⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"32⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"33⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"34⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"35⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"36⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"37⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\60F7.tmp"C:\Users\Admin\AppData\Local\Temp\60F7.tmp"38⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"39⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\6462.tmp"C:\Users\Admin\AppData\Local\Temp\6462.tmp"40⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\6741.tmp"C:\Users\Admin\AppData\Local\Temp\6741.tmp"41⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\67CD.tmp"C:\Users\Admin\AppData\Local\Temp\67CD.tmp"42⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\68A8.tmp"C:\Users\Admin\AppData\Local\Temp\68A8.tmp"43⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"44⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\69D1.tmp"C:\Users\Admin\AppData\Local\Temp\69D1.tmp"45⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"46⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"47⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"48⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"49⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"50⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\700B.tmp"C:\Users\Admin\AppData\Local\Temp\700B.tmp"51⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"52⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\71EF.tmp"C:\Users\Admin\AppData\Local\Temp\71EF.tmp"53⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\752B.tmp"C:\Users\Admin\AppData\Local\Temp\752B.tmp"54⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"55⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"56⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\7D78.tmp"C:\Users\Admin\AppData\Local\Temp\7D78.tmp"57⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\7DE5.tmp"C:\Users\Admin\AppData\Local\Temp\7DE5.tmp"58⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"59⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\8037.tmp"C:\Users\Admin\AppData\Local\Temp\8037.tmp"60⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\80A5.tmp"C:\Users\Admin\AppData\Local\Temp\80A5.tmp"61⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\8112.tmp"C:\Users\Admin\AppData\Local\Temp\8112.tmp"62⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\8383.tmp"C:\Users\Admin\AppData\Local\Temp\8383.tmp"63⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"64⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\8D95.tmp"C:\Users\Admin\AppData\Local\Temp\8D95.tmp"65⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\8E12.tmp"C:\Users\Admin\AppData\Local\Temp\8E12.tmp"66⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\9025.tmp"C:\Users\Admin\AppData\Local\Temp\9025.tmp"67⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\9083.tmp"C:\Users\Admin\AppData\Local\Temp\9083.tmp"68⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\90F0.tmp"C:\Users\Admin\AppData\Local\Temp\90F0.tmp"69⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\918D.tmp"C:\Users\Admin\AppData\Local\Temp\918D.tmp"70⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\9277.tmp"C:\Users\Admin\AppData\Local\Temp\9277.tmp"71⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\92F4.tmp"C:\Users\Admin\AppData\Local\Temp\92F4.tmp"72⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\9381.tmp"C:\Users\Admin\AppData\Local\Temp\9381.tmp"73⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\93EE.tmp"C:\Users\Admin\AppData\Local\Temp\93EE.tmp"74⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\964F.tmp"C:\Users\Admin\AppData\Local\Temp\964F.tmp"75⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\96BD.tmp"C:\Users\Admin\AppData\Local\Temp\96BD.tmp"76⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\972A.tmp"C:\Users\Admin\AppData\Local\Temp\972A.tmp"77⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\9798.tmp"C:\Users\Admin\AppData\Local\Temp\9798.tmp"78⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\9824.tmp"C:\Users\Admin\AppData\Local\Temp\9824.tmp"79⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\98B1.tmp"C:\Users\Admin\AppData\Local\Temp\98B1.tmp"80⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\9CD7.tmp"C:\Users\Admin\AppData\Local\Temp\9CD7.tmp"81⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\9D64.tmp"C:\Users\Admin\AppData\Local\Temp\9D64.tmp"82⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\9DD1.tmp"C:\Users\Admin\AppData\Local\Temp\9DD1.tmp"83⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"C:\Users\Admin\AppData\Local\Temp\9E3F.tmp"84⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\9ECB.tmp"C:\Users\Admin\AppData\Local\Temp\9ECB.tmp"85⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\9F39.tmp"C:\Users\Admin\AppData\Local\Temp\9F39.tmp"86⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"87⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\A217.tmp"C:\Users\Admin\AppData\Local\Temp\A217.tmp"88⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\A294.tmp"C:\Users\Admin\AppData\Local\Temp\A294.tmp"89⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\A321.tmp"C:\Users\Admin\AppData\Local\Temp\A321.tmp"90⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"91⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\A43A.tmp"C:\Users\Admin\AppData\Local\Temp\A43A.tmp"92⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\A4B7.tmp"C:\Users\Admin\AppData\Local\Temp\A4B7.tmp"93⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\A534.tmp"C:\Users\Admin\AppData\Local\Temp\A534.tmp"94⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"95⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\A60F.tmp"C:\Users\Admin\AppData\Local\Temp\A60F.tmp"96⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\A67C.tmp"C:\Users\Admin\AppData\Local\Temp\A67C.tmp"97⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\A6DA.tmp"C:\Users\Admin\AppData\Local\Temp\A6DA.tmp"98⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\A999.tmp"C:\Users\Admin\AppData\Local\Temp\A999.tmp"99⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\AAA3.tmp"C:\Users\Admin\AppData\Local\Temp\AAA3.tmp"100⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\B30F.tmp"C:\Users\Admin\AppData\Local\Temp\B30F.tmp"101⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\B428.tmp"C:\Users\Admin\AppData\Local\Temp\B428.tmp"102⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\B716.tmp"C:\Users\Admin\AppData\Local\Temp\B716.tmp"103⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\B783.tmp"C:\Users\Admin\AppData\Local\Temp\B783.tmp"104⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\B7F1.tmp"C:\Users\Admin\AppData\Local\Temp\B7F1.tmp"105⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\B87D.tmp"C:\Users\Admin\AppData\Local\Temp\B87D.tmp"106⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\B8FA.tmp"C:\Users\Admin\AppData\Local\Temp\B8FA.tmp"107⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\B977.tmp"C:\Users\Admin\AppData\Local\Temp\B977.tmp"108⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\BA04.tmp"C:\Users\Admin\AppData\Local\Temp\BA04.tmp"109⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\BA91.tmp"C:\Users\Admin\AppData\Local\Temp\BA91.tmp"110⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\BB0E.tmp"C:\Users\Admin\AppData\Local\Temp\BB0E.tmp"111⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\BB7B.tmp"C:\Users\Admin\AppData\Local\Temp\BB7B.tmp"112⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\BFF0.tmp"C:\Users\Admin\AppData\Local\Temp\BFF0.tmp"113⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\C05D.tmp"C:\Users\Admin\AppData\Local\Temp\C05D.tmp"114⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\C147.tmp"C:\Users\Admin\AppData\Local\Temp\C147.tmp"115⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\C639.tmp"C:\Users\Admin\AppData\Local\Temp\C639.tmp"116⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\C927.tmp"C:\Users\Admin\AppData\Local\Temp\C927.tmp"117⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\C994.tmp"C:\Users\Admin\AppData\Local\Temp\C994.tmp"118⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\CA50.tmp"C:\Users\Admin\AppData\Local\Temp\CA50.tmp"119⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\CABD.tmp"C:\Users\Admin\AppData\Local\Temp\CABD.tmp"120⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\CB5A.tmp"C:\Users\Admin\AppData\Local\Temp\CB5A.tmp"121⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\CCB1.tmp"C:\Users\Admin\AppData\Local\Temp\CCB1.tmp"122⤵PID:4844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-