Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 00:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe
-
Size
488KB
-
MD5
530ea3ff96d0abe7c7fcc029f7b61dd6
-
SHA1
ec31566ee250be0a0f682e1f3c79fface1828e0e
-
SHA256
1834a93526f9ea9eb402ca68ac4a28c7fb1eea174c60c66ad7da81674c0da27f
-
SHA512
e8d61fc864d81b86d99bf9897d60bd49cc91139b8685fbc83780e7a2851515a50e41c1189892dbfab70fae34497ee836e4093a6b2066fe9241d167c0696624d7
-
SSDEEP
12288:/U5rCOTeiDrEB7BtVk2jo1kamsPbGEtPNZ:/UQOJDrEBXVkGLahKQPN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1828 8201.tmp 2908 828E.tmp 4688 833A.tmp 3680 8482.tmp 3104 85AB.tmp 3148 8618.tmp 4292 A940.tmp 4820 86F3.tmp 4772 878F.tmp 2108 AC9B.tmp 2352 8899.tmp 4100 8FCC.tmp 660 902A.tmp 2976 B0A3.tmp 2900 B268.tmp 4740 9163.tmp 1800 B47B.tmp 988 926C.tmp 4984 92F9.tmp 5116 93A5.tmp 4396 9402.tmp 3008 B6DC.tmp 788 953B.tmp 760 98F4.tmp 4900 9AB9.tmp 4200 9DD6.tmp 2904 9E53.tmp 1888 9EC0.tmp 4492 A0A5.tmp 1792 A112.tmp 1508 A1AE.tmp 2908 A21C.tmp 872 A299.tmp 924 A306.tmp 2092 A364.tmp 2152 A3E1.tmp 2164 A7F8.tmp 3244 A865.tmp 3860 A8D3.tmp 4292 A940.tmp 1140 A9DC.tmp 4676 AA4A.tmp 3200 AAB7.tmp 2884 AB24.tmp 1780 AB92.tmp 1920 AC0F.tmp 2108 AC9B.tmp 3952 AD18.tmp 2636 AD95.tmp 1612 AE03.tmp 2144 AE8F.tmp 4536 AF2C.tmp 4296 AFC8.tmp 2292 B035.tmp 2976 B0A3.tmp 4384 B110.tmp 2472 B1DB.tmp 2900 B268.tmp 3076 B304.tmp 4392 B371.tmp 1608 B3EE.tmp 1800 B47B.tmp 2440 B4E8.tmp 3972 B565.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1828 2868 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 85 PID 2868 wrote to memory of 1828 2868 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 85 PID 2868 wrote to memory of 1828 2868 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 85 PID 1828 wrote to memory of 2908 1828 8201.tmp 87 PID 1828 wrote to memory of 2908 1828 8201.tmp 87 PID 1828 wrote to memory of 2908 1828 8201.tmp 87 PID 2908 wrote to memory of 4688 2908 A21C.tmp 88 PID 2908 wrote to memory of 4688 2908 A21C.tmp 88 PID 2908 wrote to memory of 4688 2908 A21C.tmp 88 PID 4688 wrote to memory of 3680 4688 833A.tmp 90 PID 4688 wrote to memory of 3680 4688 833A.tmp 90 PID 4688 wrote to memory of 3680 4688 833A.tmp 90 PID 3680 wrote to memory of 3104 3680 8482.tmp 91 PID 3680 wrote to memory of 3104 3680 8482.tmp 91 PID 3680 wrote to memory of 3104 3680 8482.tmp 91 PID 3104 wrote to memory of 3148 3104 85AB.tmp 92 PID 3104 wrote to memory of 3148 3104 85AB.tmp 92 PID 3104 wrote to memory of 3148 3104 85AB.tmp 92 PID 3148 wrote to memory of 4292 3148 8618.tmp 131 PID 3148 wrote to memory of 4292 3148 8618.tmp 131 PID 3148 wrote to memory of 4292 3148 8618.tmp 131 PID 4292 wrote to memory of 4820 4292 A940.tmp 94 PID 4292 wrote to memory of 4820 4292 A940.tmp 94 PID 4292 wrote to memory of 4820 4292 A940.tmp 94 PID 4820 wrote to memory of 4772 4820 86F3.tmp 95 PID 4820 wrote to memory of 4772 4820 86F3.tmp 95 PID 4820 wrote to memory of 4772 4820 86F3.tmp 95 PID 4772 wrote to memory of 2108 4772 878F.tmp 139 PID 4772 wrote to memory of 2108 4772 878F.tmp 139 PID 4772 wrote to memory of 2108 4772 878F.tmp 139 PID 2108 wrote to memory of 2352 2108 AC9B.tmp 97 PID 2108 wrote to memory of 2352 2108 AC9B.tmp 97 PID 2108 wrote to memory of 2352 2108 AC9B.tmp 97 PID 2352 wrote to memory of 4100 2352 8899.tmp 99 PID 2352 wrote to memory of 4100 2352 8899.tmp 99 PID 2352 wrote to memory of 4100 2352 8899.tmp 99 PID 4100 wrote to memory of 660 4100 8FCC.tmp 100 PID 4100 wrote to memory of 660 4100 8FCC.tmp 100 PID 4100 wrote to memory of 660 4100 8FCC.tmp 100 PID 660 wrote to memory of 2976 660 902A.tmp 147 PID 660 wrote to memory of 2976 660 902A.tmp 147 PID 660 wrote to memory of 2976 660 902A.tmp 147 PID 2976 wrote to memory of 2900 2976 B0A3.tmp 150 PID 2976 wrote to memory of 2900 2976 B0A3.tmp 150 PID 2976 wrote to memory of 2900 2976 B0A3.tmp 150 PID 2900 wrote to memory of 4740 2900 B268.tmp 103 PID 2900 wrote to memory of 4740 2900 B268.tmp 103 PID 2900 wrote to memory of 4740 2900 B268.tmp 103 PID 4740 wrote to memory of 1800 4740 9163.tmp 154 PID 4740 wrote to memory of 1800 4740 9163.tmp 154 PID 4740 wrote to memory of 1800 4740 9163.tmp 154 PID 1800 wrote to memory of 988 1800 B47B.tmp 105 PID 1800 wrote to memory of 988 1800 B47B.tmp 105 PID 1800 wrote to memory of 988 1800 B47B.tmp 105 PID 988 wrote to memory of 4984 988 926C.tmp 106 PID 988 wrote to memory of 4984 988 926C.tmp 106 PID 988 wrote to memory of 4984 988 926C.tmp 106 PID 4984 wrote to memory of 5116 4984 92F9.tmp 107 PID 4984 wrote to memory of 5116 4984 92F9.tmp 107 PID 4984 wrote to memory of 5116 4984 92F9.tmp 107 PID 5116 wrote to memory of 4396 5116 93A5.tmp 108 PID 5116 wrote to memory of 4396 5116 93A5.tmp 108 PID 5116 wrote to memory of 4396 5116 93A5.tmp 108 PID 4396 wrote to memory of 3008 4396 9402.tmp 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\8201.tmp"C:\Users\Admin\AppData\Local\Temp\8201.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"3⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\85AB.tmp"C:\Users\Admin\AppData\Local\Temp\85AB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\8618.tmp"C:\Users\Admin\AppData\Local\Temp\8618.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\8685.tmp"C:\Users\Admin\AppData\Local\Temp\8685.tmp"8⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"11⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\8899.tmp"C:\Users\Admin\AppData\Local\Temp\8899.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\902A.tmp"C:\Users\Admin\AppData\Local\Temp\902A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\9088.tmp"C:\Users\Admin\AppData\Local\Temp\9088.tmp"15⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\90F5.tmp"C:\Users\Admin\AppData\Local\Temp\90F5.tmp"16⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\9163.tmp"C:\Users\Admin\AppData\Local\Temp\9163.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"18⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\926C.tmp"C:\Users\Admin\AppData\Local\Temp\926C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\93A5.tmp"C:\Users\Admin\AppData\Local\Temp\93A5.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\9402.tmp"C:\Users\Admin\AppData\Local\Temp\9402.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\947F.tmp"C:\Users\Admin\AppData\Local\Temp\947F.tmp"23⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\953B.tmp"C:\Users\Admin\AppData\Local\Temp\953B.tmp"24⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\98F4.tmp"C:\Users\Admin\AppData\Local\Temp\98F4.tmp"25⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"26⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"27⤵
- Executes dropped EXE
PID:4200
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9E53.tmp"C:\Users\Admin\AppData\Local\Temp\9E53.tmp"1⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"2⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"3⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\A112.tmp"C:\Users\Admin\AppData\Local\Temp\A112.tmp"4⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"5⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"7⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\A306.tmp"C:\Users\Admin\AppData\Local\Temp\A306.tmp"8⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"9⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"10⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"11⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\A865.tmp"C:\Users\Admin\AppData\Local\Temp\A865.tmp"12⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"13⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"15⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"16⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"17⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"18⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"19⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"20⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"22⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\AD95.tmp"C:\Users\Admin\AppData\Local\Temp\AD95.tmp"23⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"24⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"25⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"26⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"27⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"28⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"29⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\B110.tmp"C:\Users\Admin\AppData\Local\Temp\B110.tmp"30⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"31⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\B268.tmp"C:\Users\Admin\AppData\Local\Temp\B268.tmp"32⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"33⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"34⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"35⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"36⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"37⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\B565.tmp"C:\Users\Admin\AppData\Local\Temp\B565.tmp"38⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"39⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\B630.tmp"C:\Users\Admin\AppData\Local\Temp\B630.tmp"40⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\B67F.tmp"C:\Users\Admin\AppData\Local\Temp\B67F.tmp"41⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"42⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\B779.tmp"C:\Users\Admin\AppData\Local\Temp\B779.tmp"43⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"44⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"45⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"46⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\B94D.tmp"C:\Users\Admin\AppData\Local\Temp\B94D.tmp"47⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"48⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"49⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"50⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"51⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"52⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\C302.tmp"C:\Users\Admin\AppData\Local\Temp\C302.tmp"53⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"54⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"55⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\C544.tmp"C:\Users\Admin\AppData\Local\Temp\C544.tmp"56⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\C61F.tmp"C:\Users\Admin\AppData\Local\Temp\C61F.tmp"57⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"58⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"59⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\C786.tmp"C:\Users\Admin\AppData\Local\Temp\C786.tmp"60⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\C803.tmp"C:\Users\Admin\AppData\Local\Temp\C803.tmp"61⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"62⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\C98A.tmp"C:\Users\Admin\AppData\Local\Temp\C98A.tmp"63⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\CA26.tmp"C:\Users\Admin\AppData\Local\Temp\CA26.tmp"64⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\CA93.tmp"C:\Users\Admin\AppData\Local\Temp\CA93.tmp"65⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"66⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"67⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\CCA6.tmp"C:\Users\Admin\AppData\Local\Temp\CCA6.tmp"68⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"69⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"70⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"71⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"72⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"73⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"74⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"75⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"76⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\D188.tmp"C:\Users\Admin\AppData\Local\Temp\D188.tmp"77⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\D205.tmp"C:\Users\Admin\AppData\Local\Temp\D205.tmp"78⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\D282.tmp"C:\Users\Admin\AppData\Local\Temp\D282.tmp"79⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"80⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"81⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"82⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"83⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"84⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"85⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"86⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"87⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"88⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"89⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"90⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"91⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"92⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"93⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"94⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"95⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"96⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"97⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"98⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"99⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"100⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"101⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"102⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"103⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\E261.tmp"C:\Users\Admin\AppData\Local\Temp\E261.tmp"104⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"105⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"106⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"107⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\E54F.tmp"C:\Users\Admin\AppData\Local\Temp\E54F.tmp"108⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"109⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\E659.tmp"C:\Users\Admin\AppData\Local\Temp\E659.tmp"110⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"111⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"112⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"113⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"114⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\E956.tmp"C:\Users\Admin\AppData\Local\Temp\E956.tmp"115⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"116⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\EA60.tmp"C:\Users\Admin\AppData\Local\Temp\EA60.tmp"117⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"118⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"119⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"120⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\EC44.tmp"C:\Users\Admin\AppData\Local\Temp\EC44.tmp"121⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"122⤵PID:3200
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-