Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 07:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe
-
Size
486KB
-
MD5
ac3ce33a30c52473a7a30938a90e5238
-
SHA1
1bc6532537b1ce633c596e2b1dedfbbc80b7af96
-
SHA256
d0f37a6b2a46d195b3d6aaf39e9da943eadabb27b85e439771af3bbd46063073
-
SHA512
044346f0db47f62dca371e213ee16f954bdd1bc47990412d4b9d131e8ea4e41f35d715a77068233949bd83941ab2f5ba2441acebb1c8967a412884ec7faff524
-
SSDEEP
12288:oU5rCOTeiDUL3K43MdxURDNI4M1Edsvh7VNZ:oUQOJD0MdxsI4MHphN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1524 4882.tmp 1200 wmiprvse.exe 248 492E.tmp 916 497C.tmp 1732 56BB.tmp 1504 4A28.tmp 3932 4A86.tmp 1836 4AD4.tmp 4792 4B22.tmp 4476 4B80.tmp 4256 4BCE.tmp 1052 4C2C.tmp 1316 4C7A.tmp 2032 4CD8.tmp 2740 4D35.tmp 3244 4D84.tmp 4192 4DD2.tmp 3316 4E2F.tmp 1468 4E7E.tmp 5060 4EEB.tmp 3192 4F39.tmp 1644 4F87.tmp 2060 4FD5.tmp 3668 5033.tmp 3652 5081.tmp 4344 50CF.tmp 2848 511D.tmp 4076 516C.tmp 1848 51BA.tmp 4884 5217.tmp 4688 5266.tmp 2748 52B4.tmp 4864 5302.tmp 4292 5350.tmp 3660 539E.tmp 2028 53EC.tmp 4360 542B.tmp 184 55A2.tmp 1308 55F0.tmp 2524 562E.tmp 1780 566D.tmp 1732 56BB.tmp 2544 5709.tmp 1740 5748.tmp 3064 5786.tmp 4836 57D4.tmp 212 5822.tmp 4212 5870.tmp 352 58BF.tmp 5080 590D.tmp 4744 594B.tmp 3536 598A.tmp 3648 59D8.tmp 776 5A26.tmp 32 5A64.tmp 1452 5AB3.tmp 1608 5AF1.tmp 4612 5B3F.tmp 2244 5B7E.tmp 5076 5BBC.tmp 3920 5C0A.tmp 3264 5C49.tmp 4932 5C87.tmp 2344 5CD5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1524 3444 2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe 87 PID 3444 wrote to memory of 1524 3444 2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe 87 PID 3444 wrote to memory of 1524 3444 2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe 87 PID 1524 wrote to memory of 1200 1524 4882.tmp 114 PID 1524 wrote to memory of 1200 1524 4882.tmp 114 PID 1524 wrote to memory of 1200 1524 4882.tmp 114 PID 1200 wrote to memory of 248 1200 wmiprvse.exe 91 PID 1200 wrote to memory of 248 1200 wmiprvse.exe 91 PID 1200 wrote to memory of 248 1200 wmiprvse.exe 91 PID 248 wrote to memory of 916 248 492E.tmp 92 PID 248 wrote to memory of 916 248 492E.tmp 92 PID 248 wrote to memory of 916 248 492E.tmp 92 PID 916 wrote to memory of 1732 916 497C.tmp 116 PID 916 wrote to memory of 1732 916 497C.tmp 116 PID 916 wrote to memory of 1732 916 497C.tmp 116 PID 1732 wrote to memory of 1504 1732 56BB.tmp 94 PID 1732 wrote to memory of 1504 1732 56BB.tmp 94 PID 1732 wrote to memory of 1504 1732 56BB.tmp 94 PID 1504 wrote to memory of 3932 1504 4A28.tmp 95 PID 1504 wrote to memory of 3932 1504 4A28.tmp 95 PID 1504 wrote to memory of 3932 1504 4A28.tmp 95 PID 3932 wrote to memory of 1836 3932 4A86.tmp 163 PID 3932 wrote to memory of 1836 3932 4A86.tmp 163 PID 3932 wrote to memory of 1836 3932 4A86.tmp 163 PID 1836 wrote to memory of 4792 1836 4AD4.tmp 96 PID 1836 wrote to memory of 4792 1836 4AD4.tmp 96 PID 1836 wrote to memory of 4792 1836 4AD4.tmp 96 PID 4792 wrote to memory of 4476 4792 4B22.tmp 162 PID 4792 wrote to memory of 4476 4792 4B22.tmp 162 PID 4792 wrote to memory of 4476 4792 4B22.tmp 162 PID 4476 wrote to memory of 4256 4476 4B80.tmp 161 PID 4476 wrote to memory of 4256 4476 4B80.tmp 161 PID 4476 wrote to memory of 4256 4476 4B80.tmp 161 PID 4256 wrote to memory of 1052 4256 4BCE.tmp 160 PID 4256 wrote to memory of 1052 4256 4BCE.tmp 160 PID 4256 wrote to memory of 1052 4256 4BCE.tmp 160 PID 1052 wrote to memory of 1316 1052 4C2C.tmp 159 PID 1052 wrote to memory of 1316 1052 4C2C.tmp 159 PID 1052 wrote to memory of 1316 1052 4C2C.tmp 159 PID 1316 wrote to memory of 2032 1316 4C7A.tmp 97 PID 1316 wrote to memory of 2032 1316 4C7A.tmp 97 PID 1316 wrote to memory of 2032 1316 4C7A.tmp 97 PID 2032 wrote to memory of 2740 2032 4CD8.tmp 158 PID 2032 wrote to memory of 2740 2032 4CD8.tmp 158 PID 2032 wrote to memory of 2740 2032 4CD8.tmp 158 PID 2740 wrote to memory of 3244 2740 4D35.tmp 101 PID 2740 wrote to memory of 3244 2740 4D35.tmp 101 PID 2740 wrote to memory of 3244 2740 4D35.tmp 101 PID 3244 wrote to memory of 4192 3244 4D84.tmp 100 PID 3244 wrote to memory of 4192 3244 4D84.tmp 100 PID 3244 wrote to memory of 4192 3244 4D84.tmp 100 PID 4192 wrote to memory of 3316 4192 4DD2.tmp 99 PID 4192 wrote to memory of 3316 4192 4DD2.tmp 99 PID 4192 wrote to memory of 3316 4192 4DD2.tmp 99 PID 3316 wrote to memory of 1468 3316 4E2F.tmp 157 PID 3316 wrote to memory of 1468 3316 4E2F.tmp 157 PID 3316 wrote to memory of 1468 3316 4E2F.tmp 157 PID 1468 wrote to memory of 5060 1468 4E7E.tmp 156 PID 1468 wrote to memory of 5060 1468 4E7E.tmp 156 PID 1468 wrote to memory of 5060 1468 4E7E.tmp 156 PID 5060 wrote to memory of 3192 5060 4EEB.tmp 155 PID 5060 wrote to memory of 3192 5060 4EEB.tmp 155 PID 5060 wrote to memory of 3192 5060 4EEB.tmp 155 PID 3192 wrote to memory of 1644 3192 4F39.tmp 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_ac3ce33a30c52473a7a30938a90e5238_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\4882.tmp"C:\Users\Admin\AppData\Local\Temp\4882.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\48E0.tmp"C:\Users\Admin\AppData\Local\Temp\48E0.tmp"3⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\492E.tmp"C:\Users\Admin\AppData\Local\Temp\492E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Users\Admin\AppData\Local\Temp\497C.tmp"C:\Users\Admin\AppData\Local\Temp\497C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\49CA.tmp"C:\Users\Admin\AppData\Local\Temp\49CA.tmp"6⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\4A28.tmp"C:\Users\Admin\AppData\Local\Temp\4A28.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\4A86.tmp"C:\Users\Admin\AppData\Local\Temp\4A86.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"C:\Users\Admin\AppData\Local\Temp\4AD4.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B22.tmp"C:\Users\Admin\AppData\Local\Temp\4B22.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\4B80.tmp"C:\Users\Admin\AppData\Local\Temp\4B80.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\4D35.tmp"C:\Users\Admin\AppData\Local\Temp\4D35.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192
-
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244
-
C:\Users\Admin\AppData\Local\Temp\511D.tmp"C:\Users\Admin\AppData\Local\Temp\511D.tmp"1⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\516C.tmp"C:\Users\Admin\AppData\Local\Temp\516C.tmp"2⤵
- Executes dropped EXE
PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"1⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\52B4.tmp"C:\Users\Admin\AppData\Local\Temp\52B4.tmp"2⤵
- Executes dropped EXE
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\5302.tmp"C:\Users\Admin\AppData\Local\Temp\5302.tmp"1⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"2⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"3⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"4⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\542B.tmp"C:\Users\Admin\AppData\Local\Temp\542B.tmp"5⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\55A2.tmp"C:\Users\Admin\AppData\Local\Temp\55A2.tmp"6⤵
- Executes dropped EXE
PID:184
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5217.tmp"C:\Users\Admin\AppData\Local\Temp\5217.tmp"1⤵
- Executes dropped EXE
PID:4884
-
C:\Users\Admin\AppData\Local\Temp\51BA.tmp"C:\Users\Admin\AppData\Local\Temp\51BA.tmp"1⤵
- Executes dropped EXE
PID:1848
-
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"1⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\562E.tmp"C:\Users\Admin\AppData\Local\Temp\562E.tmp"2⤵
- Executes dropped EXE
PID:2524
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200
-
C:\Users\Admin\AppData\Local\Temp\566D.tmp"C:\Users\Admin\AppData\Local\Temp\566D.tmp"1⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\56BB.tmp"C:\Users\Admin\AppData\Local\Temp\56BB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"3⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\5748.tmp"C:\Users\Admin\AppData\Local\Temp\5748.tmp"4⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\5786.tmp"C:\Users\Admin\AppData\Local\Temp\5786.tmp"5⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\57D4.tmp"C:\Users\Admin\AppData\Local\Temp\57D4.tmp"6⤵
- Executes dropped EXE
PID:4836
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5822.tmp"C:\Users\Admin\AppData\Local\Temp\5822.tmp"1⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\5870.tmp"C:\Users\Admin\AppData\Local\Temp\5870.tmp"2⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\58BF.tmp"C:\Users\Admin\AppData\Local\Temp\58BF.tmp"3⤵
- Executes dropped EXE
PID:352 -
C:\Users\Admin\AppData\Local\Temp\590D.tmp"C:\Users\Admin\AppData\Local\Temp\590D.tmp"4⤵
- Executes dropped EXE
PID:5080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\594B.tmp"C:\Users\Admin\AppData\Local\Temp\594B.tmp"1⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\598A.tmp"C:\Users\Admin\AppData\Local\Temp\598A.tmp"2⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\59D8.tmp"C:\Users\Admin\AppData\Local\Temp\59D8.tmp"3⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\5A26.tmp"C:\Users\Admin\AppData\Local\Temp\5A26.tmp"4⤵
- Executes dropped EXE
PID:776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A64.tmp"C:\Users\Admin\AppData\Local\Temp\5A64.tmp"1⤵
- Executes dropped EXE
PID:32 -
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"2⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"3⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"4⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"5⤵
- Executes dropped EXE
PID:2244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5BBC.tmp"C:\Users\Admin\AppData\Local\Temp\5BBC.tmp"1⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\5C0A.tmp"C:\Users\Admin\AppData\Local\Temp\5C0A.tmp"2⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\5C49.tmp"C:\Users\Admin\AppData\Local\Temp\5C49.tmp"3⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"4⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"5⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\5D14.tmp"C:\Users\Admin\AppData\Local\Temp\5D14.tmp"6⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\5D62.tmp"C:\Users\Admin\AppData\Local\Temp\5D62.tmp"7⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\5DB0.tmp"C:\Users\Admin\AppData\Local\Temp\5DB0.tmp"8⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"9⤵PID:2384
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"1⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"C:\Users\Admin\AppData\Local\Temp\5E7B.tmp"2⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"3⤵
- Executes dropped EXE
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\50CF.tmp"C:\Users\Admin\AppData\Local\Temp\50CF.tmp"1⤵
- Executes dropped EXE
PID:4344
-
C:\Users\Admin\AppData\Local\Temp\5081.tmp"C:\Users\Admin\AppData\Local\Temp\5081.tmp"1⤵
- Executes dropped EXE
PID:3652
-
C:\Users\Admin\AppData\Local\Temp\5033.tmp"C:\Users\Admin\AppData\Local\Temp\5033.tmp"1⤵
- Executes dropped EXE
PID:3668
-
C:\Users\Admin\AppData\Local\Temp\4F87.tmp"C:\Users\Admin\AppData\Local\Temp\4F87.tmp"1⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"2⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\5F27.tmp"C:\Users\Admin\AppData\Local\Temp\5F27.tmp"3⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"4⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"5⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\6189.tmp"C:\Users\Admin\AppData\Local\Temp\6189.tmp"6⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\61E6.tmp"C:\Users\Admin\AppData\Local\Temp\61E6.tmp"7⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\6263.tmp"C:\Users\Admin\AppData\Local\Temp\6263.tmp"8⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\634E.tmp"C:\Users\Admin\AppData\Local\Temp\634E.tmp"9⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"10⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\6486.tmp"C:\Users\Admin\AppData\Local\Temp\6486.tmp"11⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"12⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\6561.tmp"C:\Users\Admin\AppData\Local\Temp\6561.tmp"13⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\65AF.tmp"C:\Users\Admin\AppData\Local\Temp\65AF.tmp"14⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\65FD.tmp"C:\Users\Admin\AppData\Local\Temp\65FD.tmp"15⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"16⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\6699.tmp"C:\Users\Admin\AppData\Local\Temp\6699.tmp"17⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\66E8.tmp"C:\Users\Admin\AppData\Local\Temp\66E8.tmp"18⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"19⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\6784.tmp"C:\Users\Admin\AppData\Local\Temp\6784.tmp"20⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\67D2.tmp"C:\Users\Admin\AppData\Local\Temp\67D2.tmp"21⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\6830.tmp"C:\Users\Admin\AppData\Local\Temp\6830.tmp"22⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\687E.tmp"C:\Users\Admin\AppData\Local\Temp\687E.tmp"23⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\68CC.tmp"C:\Users\Admin\AppData\Local\Temp\68CC.tmp"24⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\691A.tmp"C:\Users\Admin\AppData\Local\Temp\691A.tmp"25⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\6968.tmp"C:\Users\Admin\AppData\Local\Temp\6968.tmp"26⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\69B6.tmp"C:\Users\Admin\AppData\Local\Temp\69B6.tmp"27⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\6A14.tmp"C:\Users\Admin\AppData\Local\Temp\6A14.tmp"28⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\6A62.tmp"C:\Users\Admin\AppData\Local\Temp\6A62.tmp"29⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"30⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"31⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"32⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"33⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"34⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\6C56.tmp"C:\Users\Admin\AppData\Local\Temp\6C56.tmp"35⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"36⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"37⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"38⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"39⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"C:\Users\Admin\AppData\Local\Temp\6DEC.tmp"40⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"41⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\6E98.tmp"C:\Users\Admin\AppData\Local\Temp\6E98.tmp"42⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"C:\Users\Admin\AppData\Local\Temp\6EE6.tmp"43⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\6F35.tmp"C:\Users\Admin\AppData\Local\Temp\6F35.tmp"44⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\6F83.tmp"C:\Users\Admin\AppData\Local\Temp\6F83.tmp"45⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"46⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"47⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\707D.tmp"C:\Users\Admin\AppData\Local\Temp\707D.tmp"48⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\70CB.tmp"C:\Users\Admin\AppData\Local\Temp\70CB.tmp"49⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"50⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"51⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\71D4.tmp"C:\Users\Admin\AppData\Local\Temp\71D4.tmp"52⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\7223.tmp"C:\Users\Admin\AppData\Local\Temp\7223.tmp"53⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\7271.tmp"C:\Users\Admin\AppData\Local\Temp\7271.tmp"54⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\72BF.tmp"C:\Users\Admin\AppData\Local\Temp\72BF.tmp"55⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\730D.tmp"C:\Users\Admin\AppData\Local\Temp\730D.tmp"56⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp"57⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\73A9.tmp"C:\Users\Admin\AppData\Local\Temp\73A9.tmp"58⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\73F7.tmp"C:\Users\Admin\AppData\Local\Temp\73F7.tmp"59⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\7455.tmp"C:\Users\Admin\AppData\Local\Temp\7455.tmp"60⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\74A3.tmp"C:\Users\Admin\AppData\Local\Temp\74A3.tmp"61⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"62⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"63⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\758E.tmp"C:\Users\Admin\AppData\Local\Temp\758E.tmp"64⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\75DC.tmp"C:\Users\Admin\AppData\Local\Temp\75DC.tmp"65⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\762A.tmp"C:\Users\Admin\AppData\Local\Temp\762A.tmp"66⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"67⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"68⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"69⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\7772.tmp"C:\Users\Admin\AppData\Local\Temp\7772.tmp"70⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"71⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\780E.tmp"C:\Users\Admin\AppData\Local\Temp\780E.tmp"72⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\785C.tmp"C:\Users\Admin\AppData\Local\Temp\785C.tmp"73⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\78AA.tmp"C:\Users\Admin\AppData\Local\Temp\78AA.tmp"74⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\78F9.tmp"C:\Users\Admin\AppData\Local\Temp\78F9.tmp"75⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\7947.tmp"C:\Users\Admin\AppData\Local\Temp\7947.tmp"76⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\7995.tmp"C:\Users\Admin\AppData\Local\Temp\7995.tmp"77⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\79E3.tmp"C:\Users\Admin\AppData\Local\Temp\79E3.tmp"78⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\7A31.tmp"C:\Users\Admin\AppData\Local\Temp\7A31.tmp"79⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"80⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"81⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"82⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"83⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"84⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\7C15.tmp"C:\Users\Admin\AppData\Local\Temp\7C15.tmp"85⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"86⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"87⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\7D00.tmp"C:\Users\Admin\AppData\Local\Temp\7D00.tmp"88⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\7D5E.tmp"C:\Users\Admin\AppData\Local\Temp\7D5E.tmp"89⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"90⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"91⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"92⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\7EA6.tmp"C:\Users\Admin\AppData\Local\Temp\7EA6.tmp"93⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\7EF4.tmp"C:\Users\Admin\AppData\Local\Temp\7EF4.tmp"94⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"95⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"96⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"97⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\803C.tmp"C:\Users\Admin\AppData\Local\Temp\803C.tmp"98⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\809A.tmp"C:\Users\Admin\AppData\Local\Temp\809A.tmp"99⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"100⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\8146.tmp"C:\Users\Admin\AppData\Local\Temp\8146.tmp"101⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"102⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\8201.tmp"C:\Users\Admin\AppData\Local\Temp\8201.tmp"103⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\825F.tmp"C:\Users\Admin\AppData\Local\Temp\825F.tmp"104⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\82BD.tmp"C:\Users\Admin\AppData\Local\Temp\82BD.tmp"105⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"106⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\8359.tmp"C:\Users\Admin\AppData\Local\Temp\8359.tmp"107⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\83B7.tmp"C:\Users\Admin\AppData\Local\Temp\83B7.tmp"108⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"109⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\8453.tmp"C:\Users\Admin\AppData\Local\Temp\8453.tmp"110⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\84A1.tmp"C:\Users\Admin\AppData\Local\Temp\84A1.tmp"111⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\84EF.tmp"C:\Users\Admin\AppData\Local\Temp\84EF.tmp"112⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\853D.tmp"C:\Users\Admin\AppData\Local\Temp\853D.tmp"113⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\858B.tmp"C:\Users\Admin\AppData\Local\Temp\858B.tmp"114⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\85E9.tmp"C:\Users\Admin\AppData\Local\Temp\85E9.tmp"115⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\8637.tmp"C:\Users\Admin\AppData\Local\Temp\8637.tmp"116⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\8695.tmp"C:\Users\Admin\AppData\Local\Temp\8695.tmp"117⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\86E3.tmp"C:\Users\Admin\AppData\Local\Temp\86E3.tmp"118⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\8731.tmp"C:\Users\Admin\AppData\Local\Temp\8731.tmp"119⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\877F.tmp"C:\Users\Admin\AppData\Local\Temp\877F.tmp"120⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\87CD.tmp"C:\Users\Admin\AppData\Local\Temp\87CD.tmp"121⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\881C.tmp"C:\Users\Admin\AppData\Local\Temp\881C.tmp"122⤵PID:2408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-