Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 22:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-18_5b47c3d64c50051a40adef425ac4e79e_mafia.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-18_5b47c3d64c50051a40adef425ac4e79e_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-18_5b47c3d64c50051a40adef425ac4e79e_mafia.exe
-
Size
486KB
-
MD5
5b47c3d64c50051a40adef425ac4e79e
-
SHA1
80fcada2a50fbc715cb1d810b33925f8b543ee20
-
SHA256
d283ffed635a1e84de005314190b930eabd0eca857f805a5fdc97dbd4dd8c2d4
-
SHA512
c80a0d4ea0ff98a41367bd08e37e0ec286a43deebd7f565620d632cbbd0ddbfe107c8dd0c352e70f375f4b4add21c188ec0e6097eb4582a75a9aa28260bb7f3a
-
SSDEEP
12288:/U5rCOTeiDVsLcdek3T0+IIuW/ISB3W1El0NZ:/UQOJD+aeSQcPTzl0N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3420 4A86.tmp 3476 4AE4.tmp 3380 E2BF.tmp 4688 4B90.tmp 552 4BED.tmp 3872 A335.tmp 4272 700F.tmp 372 9088.tmp 4948 B258.tmp 2872 C19A.tmp 1632 B1CB.tmp 3496 C469.tmp 1676 4E6E.tmp 3280 82FB.tmp 3592 E937.tmp 2796 C5F0.tmp 1296 C68C.tmp 4076 D958.tmp 5100 5091.tmp 3472 50DF.tmp 4336 mousocoreworker.exe 4164 518B.tmp 4532 51D9.tmp 2308 5227.tmp 4776 A6DF.tmp 1680 52C3.tmp 4100 5321.tmp 2080 DAEF.tmp 2720 53DD.tmp 4144 A807.tmp 3444 ABB1.tmp 3216 B9CA.tmp 1128 5525.tmp 4760 9877.tmp 2476 D476.tmp 2372 D38C.tmp 3748 D3DA.tmp 4888 6A24.tmp 3940 BB9F.tmp 1316 8A7D.tmp 1804 6B5C.tmp 4804 9A4C.tmp 4928 51C.tmp 1980 9CBD.tmp 4188 BEEB.tmp 2044 ADD4.tmp 1212 svchost.exe 744 5BCC.tmp 3832 5C1A.tmp 3500 wmiprvse.exe 4648 5CC6.tmp 4332 CF27.tmp 3236 5D62.tmp 3380 E2BF.tmp 3432 E3B9.tmp 844 961.tmp 4788 9EEF.tmp 636 9FE.tmp 4656 8FEC.tmp 2068 F721.tmp 4444 C285.tmp 1196 E7FE.tmp 4296 608F.tmp 432 60DD.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 3420 744 5BCC.tmp 23 PID 744 wrote to memory of 3420 744 5BCC.tmp 23 PID 744 wrote to memory of 3420 744 5BCC.tmp 23 PID 3420 wrote to memory of 3476 3420 4A86.tmp 25 PID 3420 wrote to memory of 3476 3420 4A86.tmp 25 PID 3420 wrote to memory of 3476 3420 4A86.tmp 25 PID 3476 wrote to memory of 3380 3476 4AE4.tmp 587 PID 3476 wrote to memory of 3380 3476 4AE4.tmp 587 PID 3476 wrote to memory of 3380 3476 4AE4.tmp 587 PID 3380 wrote to memory of 4688 3380 E2BF.tmp 26 PID 3380 wrote to memory of 4688 3380 E2BF.tmp 26 PID 3380 wrote to memory of 4688 3380 E2BF.tmp 26 PID 4688 wrote to memory of 552 4688 4B90.tmp 173 PID 4688 wrote to memory of 552 4688 4B90.tmp 173 PID 4688 wrote to memory of 552 4688 4B90.tmp 173 PID 552 wrote to memory of 3872 552 4BED.tmp 377 PID 552 wrote to memory of 3872 552 4BED.tmp 377 PID 552 wrote to memory of 3872 552 4BED.tmp 377 PID 3872 wrote to memory of 4272 3872 A335.tmp 111 PID 3872 wrote to memory of 4272 3872 A335.tmp 111 PID 3872 wrote to memory of 4272 3872 A335.tmp 111 PID 4272 wrote to memory of 372 4272 700F.tmp 315 PID 4272 wrote to memory of 372 4272 700F.tmp 315 PID 4272 wrote to memory of 372 4272 700F.tmp 315 PID 372 wrote to memory of 4948 372 9088.tmp 427 PID 372 wrote to memory of 4948 372 9088.tmp 427 PID 372 wrote to memory of 4948 372 9088.tmp 427 PID 4948 wrote to memory of 2872 4948 B258.tmp 479 PID 4948 wrote to memory of 2872 4948 B258.tmp 479 PID 4948 wrote to memory of 2872 4948 B258.tmp 479 PID 2872 wrote to memory of 1632 2872 C19A.tmp 426 PID 2872 wrote to memory of 1632 2872 C19A.tmp 426 PID 2872 wrote to memory of 1632 2872 C19A.tmp 426 PID 1632 wrote to memory of 3496 1632 B1CB.tmp 488 PID 1632 wrote to memory of 3496 1632 B1CB.tmp 488 PID 1632 wrote to memory of 3496 1632 B1CB.tmp 488 PID 3496 wrote to memory of 1676 3496 C469.tmp 162 PID 3496 wrote to memory of 1676 3496 C469.tmp 162 PID 3496 wrote to memory of 1676 3496 C469.tmp 162 PID 1676 wrote to memory of 3280 1676 4E6E.tmp 247 PID 1676 wrote to memory of 3280 1676 4E6E.tmp 247 PID 1676 wrote to memory of 3280 1676 4E6E.tmp 247 PID 3280 wrote to memory of 3592 3280 82FB.tmp 608 PID 3280 wrote to memory of 3592 3280 82FB.tmp 608 PID 3280 wrote to memory of 3592 3280 82FB.tmp 608 PID 3592 wrote to memory of 2796 3592 E937.tmp 493 PID 3592 wrote to memory of 2796 3592 E937.tmp 493 PID 3592 wrote to memory of 2796 3592 E937.tmp 493 PID 2796 wrote to memory of 1296 2796 C5F0.tmp 495 PID 2796 wrote to memory of 1296 2796 C5F0.tmp 495 PID 2796 wrote to memory of 1296 2796 C5F0.tmp 495 PID 1296 wrote to memory of 4076 1296 C68C.tmp 557 PID 1296 wrote to memory of 4076 1296 C68C.tmp 557 PID 1296 wrote to memory of 4076 1296 C68C.tmp 557 PID 4076 wrote to memory of 5100 4076 D958.tmp 153 PID 4076 wrote to memory of 5100 4076 D958.tmp 153 PID 4076 wrote to memory of 5100 4076 D958.tmp 153 PID 5100 wrote to memory of 3472 5100 5091.tmp 152 PID 5100 wrote to memory of 3472 5100 5091.tmp 152 PID 5100 wrote to memory of 3472 5100 5091.tmp 152 PID 3472 wrote to memory of 4336 3472 50DF.tmp 265 PID 3472 wrote to memory of 4336 3472 50DF.tmp 265 PID 3472 wrote to memory of 4336 3472 50DF.tmp 265 PID 4336 wrote to memory of 4164 4336 mousocoreworker.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_5b47c3d64c50051a40adef425ac4e79e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_5b47c3d64c50051a40adef425ac4e79e_mafia.exe"1⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\4A86.tmp"C:\Users\Admin\AppData\Local\Temp\4A86.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"C:\Users\Admin\AppData\Local\Temp\4AE4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\4B32.tmp"C:\Users\Admin\AppData\Local\Temp\4B32.tmp"4⤵PID:3380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B90.tmp"C:\Users\Admin\AppData\Local\Temp\4B90.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\4BED.tmp"C:\Users\Admin\AppData\Local\Temp\4BED.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"1⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\4F78.tmp"C:\Users\Admin\AppData\Local\Temp\4F78.tmp"1⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"2⤵PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\54C7.tmp"C:\Users\Admin\AppData\Local\Temp\54C7.tmp"1⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\5525.tmp"C:\Users\Admin\AppData\Local\Temp\5525.tmp"2⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\5573.tmp"C:\Users\Admin\AppData\Local\Temp\5573.tmp"3⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\55C1.tmp"C:\Users\Admin\AppData\Local\Temp\55C1.tmp"4⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\563E.tmp"C:\Users\Admin\AppData\Local\Temp\563E.tmp"5⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp"6⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\56DA.tmp"C:\Users\Admin\AppData\Local\Temp\56DA.tmp"7⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\5728.tmp"C:\Users\Admin\AppData\Local\Temp\5728.tmp"8⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\5776.tmp"C:\Users\Admin\AppData\Local\Temp\5776.tmp"9⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"9⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"10⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"11⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"12⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"13⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"14⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"15⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\BE10.tmp"C:\Users\Admin\AppData\Local\Temp\BE10.tmp"16⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"17⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\BEAC.tmp"C:\Users\Admin\AppData\Local\Temp\BEAC.tmp"18⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"19⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"20⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"21⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"22⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"23⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"24⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\C0B0.tmp"C:\Users\Admin\AppData\Local\Temp\C0B0.tmp"25⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"26⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"27⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"28⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"29⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"30⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"31⤵
- Executes dropped EXE
PID:4444
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"27⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"28⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\D33E.tmp"C:\Users\Admin\AppData\Local\Temp\D33E.tmp"29⤵PID:4524
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1E41.tmp"C:\Users\Admin\AppData\Local\Temp\1E41.tmp"23⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"24⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"25⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"26⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"27⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"28⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\2016.tmp"C:\Users\Admin\AppData\Local\Temp\2016.tmp"29⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2064.tmp"C:\Users\Admin\AppData\Local\Temp\2064.tmp"30⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\20B2.tmp"C:\Users\Admin\AppData\Local\Temp\20B2.tmp"31⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\2100.tmp"C:\Users\Admin\AppData\Local\Temp\2100.tmp"32⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"33⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"34⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\21EB.tmp"C:\Users\Admin\AppData\Local\Temp\21EB.tmp"35⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2229.tmp"C:\Users\Admin\AppData\Local\Temp\2229.tmp"36⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2277.tmp"C:\Users\Admin\AppData\Local\Temp\2277.tmp"37⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"38⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\2313.tmp"C:\Users\Admin\AppData\Local\Temp\2313.tmp"39⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"40⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\23B0.tmp"C:\Users\Admin\AppData\Local\Temp\23B0.tmp"41⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"42⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"43⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"44⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\24E8.tmp"C:\Users\Admin\AppData\Local\Temp\24E8.tmp"45⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"46⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"47⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\25D3.tmp"C:\Users\Admin\AppData\Local\Temp\25D3.tmp"48⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"49⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\266F.tmp"C:\Users\Admin\AppData\Local\Temp\266F.tmp"50⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"51⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"52⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"53⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\27A7.tmp"C:\Users\Admin\AppData\Local\Temp\27A7.tmp"54⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"55⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"56⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"57⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"58⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\292E.tmp"C:\Users\Admin\AppData\Local\Temp\292E.tmp"59⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"60⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"61⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\2A18.tmp"C:\Users\Admin\AppData\Local\Temp\2A18.tmp"62⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"63⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"64⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2B03.tmp"C:\Users\Admin\AppData\Local\Temp\2B03.tmp"65⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"66⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"67⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"68⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"69⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"70⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"71⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"72⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2D74.tmp"C:\Users\Admin\AppData\Local\Temp\2D74.tmp"73⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"74⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"75⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"76⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"77⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"78⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2F48.tmp"C:\Users\Admin\AppData\Local\Temp\2F48.tmp"79⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"80⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"81⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\3033.tmp"C:\Users\Admin\AppData\Local\Temp\3033.tmp"82⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"83⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\30CF.tmp"C:\Users\Admin\AppData\Local\Temp\30CF.tmp"84⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"85⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\316B.tmp"C:\Users\Admin\AppData\Local\Temp\316B.tmp"86⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\31B9.tmp"C:\Users\Admin\AppData\Local\Temp\31B9.tmp"87⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"88⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\3256.tmp"C:\Users\Admin\AppData\Local\Temp\3256.tmp"89⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\32B3.tmp"C:\Users\Admin\AppData\Local\Temp\32B3.tmp"90⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"91⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"92⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"93⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"94⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"95⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"96⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"97⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"98⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\3573.tmp"C:\Users\Admin\AppData\Local\Temp\3573.tmp"99⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"100⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\360F.tmp"C:\Users\Admin\AppData\Local\Temp\360F.tmp"101⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"102⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\36EA.tmp"C:\Users\Admin\AppData\Local\Temp\36EA.tmp"103⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3757.tmp"C:\Users\Admin\AppData\Local\Temp\3757.tmp"104⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\37A5.tmp"C:\Users\Admin\AppData\Local\Temp\37A5.tmp"105⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"106⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"107⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\389F.tmp"C:\Users\Admin\AppData\Local\Temp\389F.tmp"108⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"109⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\393B.tmp"C:\Users\Admin\AppData\Local\Temp\393B.tmp"110⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"111⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"112⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"113⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\3A93.tmp"C:\Users\Admin\AppData\Local\Temp\3A93.tmp"114⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"115⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"116⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"117⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"118⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"119⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"120⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"121⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"122⤵PID:5012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-