Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 17:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe
-
Size
486KB
-
MD5
c9bd2a28f72621f08e45e64cc9567c38
-
SHA1
c938626d749b48aa708f82292383a46982fbf46f
-
SHA256
ae056b14ec7bd4f6d0ae478e1650d87559849862f596c324025e1d98700abd51
-
SHA512
8c54be794d800bf04250118a21d3b141d1784556aeda6ee26b965dbffe4f64e25b875adcae7f8e86f450b832e276d66da076e34870281ddf6a647935ed25ca91
-
SSDEEP
12288:/U5rCOTeiDyWLqhGChyO7PbGeojTyO18cNPoVNZ:/UQOJDgwN9bjBteVN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3484 97DB.tmp 3940 AC9B.tmp 4700 ADE3.tmp 2064 99B0.tmp 216 9A5B.tmp 4056 9AD8.tmp 3956 B110.tmp 1424 9C01.tmp 3924 9CAD.tmp 1400 9D0B.tmp 804 9D98.tmp 844 9E15.tmp 2508 9E92.tmp 3096 9F5D.tmp 2172 A009.tmp 4948 A076.tmp 2176 A0F3.tmp 412 A1BE.tmp 3032 A299.tmp 820 A306.tmp 4528 A393.tmp 3192 A400.tmp 5060 A46E.tmp 4020 A4FA.tmp 4116 A596.tmp 1452 A623.tmp 4472 A6BF.tmp 4124 A78A.tmp 3056 A836.tmp 4996 A8B3.tmp 3800 A930.tmp 2232 AA1B.tmp 1052 AAA7.tmp 3636 AB82.tmp 556 AC0F.tmp 3940 AC9B.tmp 1068 AD09.tmp 2768 AD76.tmp 4700 ADE3.tmp 1600 AE70.tmp 1980 AEFD.tmp 4944 AFC8.tmp 4408 B074.tmp 3956 B110.tmp 3416 B1AC.tmp 2884 B239.tmp 4364 B2C5.tmp 804 B3FE.tmp 4448 B508.tmp 368 B640.tmp 4224 B6BD.tmp 3096 B74A.tmp 3640 B7D6.tmp 3292 B863.tmp 4688 B8D0.tmp 1560 B95D.tmp 4832 BAA5.tmp 2740 BBED.tmp 4560 BD06.tmp 4904 BDD2.tmp 3032 BE8D.tmp 4732 BF1A.tmp 5008 BF87.tmp 5060 C014.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 3484 3616 2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe 87 PID 3616 wrote to memory of 3484 3616 2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe 87 PID 3616 wrote to memory of 3484 3616 2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe 87 PID 3484 wrote to memory of 3940 3484 97DB.tmp 128 PID 3484 wrote to memory of 3940 3484 97DB.tmp 128 PID 3484 wrote to memory of 3940 3484 97DB.tmp 128 PID 3940 wrote to memory of 4700 3940 AC9B.tmp 131 PID 3940 wrote to memory of 4700 3940 AC9B.tmp 131 PID 3940 wrote to memory of 4700 3940 AC9B.tmp 131 PID 4700 wrote to memory of 2064 4700 ADE3.tmp 91 PID 4700 wrote to memory of 2064 4700 ADE3.tmp 91 PID 4700 wrote to memory of 2064 4700 ADE3.tmp 91 PID 2064 wrote to memory of 216 2064 99B0.tmp 92 PID 2064 wrote to memory of 216 2064 99B0.tmp 92 PID 2064 wrote to memory of 216 2064 99B0.tmp 92 PID 216 wrote to memory of 4056 216 9A5B.tmp 93 PID 216 wrote to memory of 4056 216 9A5B.tmp 93 PID 216 wrote to memory of 4056 216 9A5B.tmp 93 PID 4056 wrote to memory of 3956 4056 9AD8.tmp 136 PID 4056 wrote to memory of 3956 4056 9AD8.tmp 136 PID 4056 wrote to memory of 3956 4056 9AD8.tmp 136 PID 3956 wrote to memory of 1424 3956 B110.tmp 95 PID 3956 wrote to memory of 1424 3956 B110.tmp 95 PID 3956 wrote to memory of 1424 3956 B110.tmp 95 PID 1424 wrote to memory of 3924 1424 9C01.tmp 96 PID 1424 wrote to memory of 3924 1424 9C01.tmp 96 PID 1424 wrote to memory of 3924 1424 9C01.tmp 96 PID 3924 wrote to memory of 1400 3924 9CAD.tmp 97 PID 3924 wrote to memory of 1400 3924 9CAD.tmp 97 PID 3924 wrote to memory of 1400 3924 9CAD.tmp 97 PID 1400 wrote to memory of 804 1400 9D0B.tmp 98 PID 1400 wrote to memory of 804 1400 9D0B.tmp 98 PID 1400 wrote to memory of 804 1400 9D0B.tmp 98 PID 804 wrote to memory of 844 804 9D98.tmp 99 PID 804 wrote to memory of 844 804 9D98.tmp 99 PID 804 wrote to memory of 844 804 9D98.tmp 99 PID 844 wrote to memory of 2508 844 9E15.tmp 100 PID 844 wrote to memory of 2508 844 9E15.tmp 100 PID 844 wrote to memory of 2508 844 9E15.tmp 100 PID 2508 wrote to memory of 3096 2508 9E92.tmp 101 PID 2508 wrote to memory of 3096 2508 9E92.tmp 101 PID 2508 wrote to memory of 3096 2508 9E92.tmp 101 PID 3096 wrote to memory of 2172 3096 9F5D.tmp 102 PID 3096 wrote to memory of 2172 3096 9F5D.tmp 102 PID 3096 wrote to memory of 2172 3096 9F5D.tmp 102 PID 2172 wrote to memory of 4948 2172 A009.tmp 103 PID 2172 wrote to memory of 4948 2172 A009.tmp 103 PID 2172 wrote to memory of 4948 2172 A009.tmp 103 PID 4948 wrote to memory of 2176 4948 A076.tmp 104 PID 4948 wrote to memory of 2176 4948 A076.tmp 104 PID 4948 wrote to memory of 2176 4948 A076.tmp 104 PID 2176 wrote to memory of 412 2176 A0F3.tmp 105 PID 2176 wrote to memory of 412 2176 A0F3.tmp 105 PID 2176 wrote to memory of 412 2176 A0F3.tmp 105 PID 412 wrote to memory of 3032 412 A1BE.tmp 108 PID 412 wrote to memory of 3032 412 A1BE.tmp 108 PID 412 wrote to memory of 3032 412 A1BE.tmp 108 PID 3032 wrote to memory of 820 3032 A299.tmp 111 PID 3032 wrote to memory of 820 3032 A299.tmp 111 PID 3032 wrote to memory of 820 3032 A299.tmp 111 PID 820 wrote to memory of 4528 820 A306.tmp 110 PID 820 wrote to memory of 4528 820 A306.tmp 110 PID 820 wrote to memory of 4528 820 A306.tmp 110 PID 4528 wrote to memory of 3192 4528 A393.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-22_c9bd2a28f72621f08e45e64cc9567c38_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\97DB.tmp"C:\Users\Admin\AppData\Local\Temp\97DB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\9858.tmp"C:\Users\Admin\AppData\Local\Temp\9858.tmp"3⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\9904.tmp"C:\Users\Admin\AppData\Local\Temp\9904.tmp"4⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\9B65.tmp"C:\Users\Admin\AppData\Local\Temp\9B65.tmp"8⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\9C01.tmp"C:\Users\Admin\AppData\Local\Temp\9C01.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\9E15.tmp"C:\Users\Admin\AppData\Local\Temp\9E15.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\A009.tmp"C:\Users\Admin\AppData\Local\Temp\A009.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\A076.tmp"C:\Users\Admin\AppData\Local\Temp\A076.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\A1BE.tmp"C:\Users\Admin\AppData\Local\Temp\A1BE.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\A306.tmp"C:\Users\Admin\AppData\Local\Temp\A306.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A400.tmp"C:\Users\Admin\AppData\Local\Temp\A400.tmp"1⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\A46E.tmp"C:\Users\Admin\AppData\Local\Temp\A46E.tmp"2⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"3⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\A596.tmp"C:\Users\Admin\AppData\Local\Temp\A596.tmp"4⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"5⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"6⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\A78A.tmp"C:\Users\Admin\AppData\Local\Temp\A78A.tmp"7⤵
- Executes dropped EXE
PID:4124
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A393.tmp"C:\Users\Admin\AppData\Local\Temp\A393.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528
-
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"1⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"2⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\A930.tmp"C:\Users\Admin\AppData\Local\Temp\A930.tmp"3⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"4⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"5⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"6⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"7⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"9⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\AD76.tmp"C:\Users\Admin\AppData\Local\Temp\AD76.tmp"10⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\AE70.tmp"C:\Users\Admin\AppData\Local\Temp\AE70.tmp"12⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"13⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"14⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\B074.tmp"C:\Users\Admin\AppData\Local\Temp\B074.tmp"15⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\B110.tmp"C:\Users\Admin\AppData\Local\Temp\B110.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"17⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"18⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\B2C5.tmp"C:\Users\Admin\AppData\Local\Temp\B2C5.tmp"19⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"20⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"21⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"22⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\B6BD.tmp"C:\Users\Admin\AppData\Local\Temp\B6BD.tmp"23⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"24⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"25⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"26⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"27⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\B95D.tmp"C:\Users\Admin\AppData\Local\Temp\B95D.tmp"28⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"29⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"30⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\BD06.tmp"C:\Users\Admin\AppData\Local\Temp\BD06.tmp"31⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"32⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\BE8D.tmp"C:\Users\Admin\AppData\Local\Temp\BE8D.tmp"33⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"34⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"35⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"36⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"37⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"38⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"39⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\C256.tmp"C:\Users\Admin\AppData\Local\Temp\C256.tmp"40⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\C2D3.tmp"C:\Users\Admin\AppData\Local\Temp\C2D3.tmp"41⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"42⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"43⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\C488.tmp"C:\Users\Admin\AppData\Local\Temp\C488.tmp"44⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\C505.tmp"C:\Users\Admin\AppData\Local\Temp\C505.tmp"45⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"46⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"47⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"48⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\C728.tmp"C:\Users\Admin\AppData\Local\Temp\C728.tmp"49⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"50⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\C861.tmp"C:\Users\Admin\AppData\Local\Temp\C861.tmp"51⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"52⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"53⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"54⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\CA16.tmp"C:\Users\Admin\AppData\Local\Temp\CA16.tmp"55⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"56⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"57⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"58⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"59⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\CD14.tmp"C:\Users\Admin\AppData\Local\Temp\CD14.tmp"60⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"61⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"62⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\CE6C.tmp"C:\Users\Admin\AppData\Local\Temp\CE6C.tmp"63⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"64⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\CF85.tmp"C:\Users\Admin\AppData\Local\Temp\CF85.tmp"65⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"66⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\D07F.tmp"C:\Users\Admin\AppData\Local\Temp\D07F.tmp"67⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"68⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\D198.tmp"C:\Users\Admin\AppData\Local\Temp\D198.tmp"69⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\D225.tmp"C:\Users\Admin\AppData\Local\Temp\D225.tmp"70⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\D2C1.tmp"C:\Users\Admin\AppData\Local\Temp\D2C1.tmp"71⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\D33E.tmp"C:\Users\Admin\AppData\Local\Temp\D33E.tmp"72⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"73⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\D448.tmp"C:\Users\Admin\AppData\Local\Temp\D448.tmp"74⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"75⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\D59F.tmp"C:\Users\Admin\AppData\Local\Temp\D59F.tmp"76⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"77⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"78⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"79⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"80⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\D86E.tmp"C:\Users\Admin\AppData\Local\Temp\D86E.tmp"81⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"82⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\D997.tmp"C:\Users\Admin\AppData\Local\Temp\D997.tmp"83⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"84⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"85⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"86⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"87⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"88⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"89⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"90⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"91⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\DF06.tmp"C:\Users\Admin\AppData\Local\Temp\DF06.tmp"92⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"93⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"94⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"95⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"96⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"97⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"98⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\E30D.tmp"C:\Users\Admin\AppData\Local\Temp\E30D.tmp"99⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"100⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\E436.tmp"C:\Users\Admin\AppData\Local\Temp\E436.tmp"101⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\E501.tmp"C:\Users\Admin\AppData\Local\Temp\E501.tmp"102⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"103⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"104⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"105⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\E772.tmp"C:\Users\Admin\AppData\Local\Temp\E772.tmp"106⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"107⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\E89B.tmp"C:\Users\Admin\AppData\Local\Temp\E89B.tmp"108⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\E937.tmp"C:\Users\Admin\AppData\Local\Temp\E937.tmp"109⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"110⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"111⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"112⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"113⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"114⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"115⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"116⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"117⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"118⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"119⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"120⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"121⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"122⤵PID:3912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-