Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 00:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe
-
Size
486KB
-
MD5
72c6b8155774f74f10d3e5a3907647a5
-
SHA1
926a95b16d685e3ea1197e14f313d9442f6ac8b0
-
SHA256
d1db7c4a27b1ba1fa4bb4ace7e596988e8b3d271f702cfa997f90b1571fa6278
-
SHA512
90f222f592e310781a274a346f905d776bc0c86dc1afb0b28a7bfc40a0e6a29b86ba9b09c25c327e870dd6090304486e32fad48858e2cb585dfe429f21bdc55f
-
SSDEEP
12288:/U5rCOTeiDiLrYGZxwqOiKTfVoX61UpNZ:/UQOJDCf1Oi7K1UpN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3108 6438.tmp 3172 64E4.tmp 4080 6571.tmp 2368 65EE.tmp 4524 665B.tmp 4792 6726.tmp 3944 67D2.tmp 2552 683F.tmp 3900 68CC.tmp 1908 6949.tmp 1588 69B6.tmp 2224 6A81.tmp 3412 6B0E.tmp 2612 6B8B.tmp 484 6C18.tmp 1572 6C95.tmp 1632 6CF2.tmp 2148 6D8F.tmp 5040 6E4A.tmp 3236 6F06.tmp 4872 6F92.tmp 2752 701F.tmp 216 709C.tmp 1384 7148.tmp 4244 71E4.tmp 2660 72BF.tmp 4564 733C.tmp 1148 73C8.tmp 3092 7445.tmp 4896 754F.tmp 3688 75CC.tmp 320 7668.tmp 4888 7724.tmp 1560 77A1.tmp 4352 781E.tmp 4400 789B.tmp 3628 7918.tmp 3720 7985.tmp 3592 7A21.tmp 4032 7A9E.tmp 1752 7B0C.tmp 3888 7B79.tmp 3064 7BF6.tmp 3624 7C73.tmp 2368 7D00.tmp 1728 7D8C.tmp 4904 7E19.tmp 2392 7F32.tmp 4832 802C.tmp 4868 80B9.tmp 5064 824F.tmp 1356 833A.tmp 3712 83B7.tmp 1908 8453.tmp 4952 84DF.tmp 2224 857C.tmp 4040 8608.tmp 4496 86A5.tmp 368 8731.tmp 484 87BE.tmp 3332 882B.tmp 3632 88B8.tmp 3368 8925.tmp 2520 8993.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3108 2548 2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe 85 PID 2548 wrote to memory of 3108 2548 2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe 85 PID 2548 wrote to memory of 3108 2548 2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe 85 PID 3108 wrote to memory of 3172 3108 6438.tmp 87 PID 3108 wrote to memory of 3172 3108 6438.tmp 87 PID 3108 wrote to memory of 3172 3108 6438.tmp 87 PID 3172 wrote to memory of 4080 3172 64E4.tmp 89 PID 3172 wrote to memory of 4080 3172 64E4.tmp 89 PID 3172 wrote to memory of 4080 3172 64E4.tmp 89 PID 4080 wrote to memory of 2368 4080 6571.tmp 90 PID 4080 wrote to memory of 2368 4080 6571.tmp 90 PID 4080 wrote to memory of 2368 4080 6571.tmp 90 PID 2368 wrote to memory of 4524 2368 65EE.tmp 92 PID 2368 wrote to memory of 4524 2368 65EE.tmp 92 PID 2368 wrote to memory of 4524 2368 65EE.tmp 92 PID 4524 wrote to memory of 4792 4524 665B.tmp 93 PID 4524 wrote to memory of 4792 4524 665B.tmp 93 PID 4524 wrote to memory of 4792 4524 665B.tmp 93 PID 4792 wrote to memory of 3944 4792 6726.tmp 94 PID 4792 wrote to memory of 3944 4792 6726.tmp 94 PID 4792 wrote to memory of 3944 4792 6726.tmp 94 PID 3944 wrote to memory of 2552 3944 67D2.tmp 95 PID 3944 wrote to memory of 2552 3944 67D2.tmp 95 PID 3944 wrote to memory of 2552 3944 67D2.tmp 95 PID 2552 wrote to memory of 3900 2552 683F.tmp 96 PID 2552 wrote to memory of 3900 2552 683F.tmp 96 PID 2552 wrote to memory of 3900 2552 683F.tmp 96 PID 3900 wrote to memory of 1908 3900 68CC.tmp 97 PID 3900 wrote to memory of 1908 3900 68CC.tmp 97 PID 3900 wrote to memory of 1908 3900 68CC.tmp 97 PID 1908 wrote to memory of 1588 1908 6949.tmp 98 PID 1908 wrote to memory of 1588 1908 6949.tmp 98 PID 1908 wrote to memory of 1588 1908 6949.tmp 98 PID 1588 wrote to memory of 2224 1588 69B6.tmp 99 PID 1588 wrote to memory of 2224 1588 69B6.tmp 99 PID 1588 wrote to memory of 2224 1588 69B6.tmp 99 PID 2224 wrote to memory of 3412 2224 6A81.tmp 100 PID 2224 wrote to memory of 3412 2224 6A81.tmp 100 PID 2224 wrote to memory of 3412 2224 6A81.tmp 100 PID 3412 wrote to memory of 2612 3412 6B0E.tmp 101 PID 3412 wrote to memory of 2612 3412 6B0E.tmp 101 PID 3412 wrote to memory of 2612 3412 6B0E.tmp 101 PID 2612 wrote to memory of 484 2612 6B8B.tmp 102 PID 2612 wrote to memory of 484 2612 6B8B.tmp 102 PID 2612 wrote to memory of 484 2612 6B8B.tmp 102 PID 484 wrote to memory of 1572 484 6C18.tmp 103 PID 484 wrote to memory of 1572 484 6C18.tmp 103 PID 484 wrote to memory of 1572 484 6C18.tmp 103 PID 1572 wrote to memory of 1632 1572 6C95.tmp 104 PID 1572 wrote to memory of 1632 1572 6C95.tmp 104 PID 1572 wrote to memory of 1632 1572 6C95.tmp 104 PID 1632 wrote to memory of 2148 1632 6CF2.tmp 105 PID 1632 wrote to memory of 2148 1632 6CF2.tmp 105 PID 1632 wrote to memory of 2148 1632 6CF2.tmp 105 PID 2148 wrote to memory of 5040 2148 6D8F.tmp 106 PID 2148 wrote to memory of 5040 2148 6D8F.tmp 106 PID 2148 wrote to memory of 5040 2148 6D8F.tmp 106 PID 5040 wrote to memory of 3236 5040 6E4A.tmp 107 PID 5040 wrote to memory of 3236 5040 6E4A.tmp 107 PID 5040 wrote to memory of 3236 5040 6E4A.tmp 107 PID 3236 wrote to memory of 4872 3236 6F06.tmp 108 PID 3236 wrote to memory of 4872 3236 6F06.tmp 108 PID 3236 wrote to memory of 4872 3236 6F06.tmp 108 PID 4872 wrote to memory of 2752 4872 6F92.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_72c6b8155774f74f10d3e5a3907647a5_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\6438.tmp"C:\Users\Admin\AppData\Local\Temp\6438.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\64E4.tmp"C:\Users\Admin\AppData\Local\Temp\64E4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\6571.tmp"C:\Users\Admin\AppData\Local\Temp\6571.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\665B.tmp"C:\Users\Admin\AppData\Local\Temp\665B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\6726.tmp"C:\Users\Admin\AppData\Local\Temp\6726.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\67D2.tmp"C:\Users\Admin\AppData\Local\Temp\67D2.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\683F.tmp"C:\Users\Admin\AppData\Local\Temp\683F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\68CC.tmp"C:\Users\Admin\AppData\Local\Temp\68CC.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\69B6.tmp"C:\Users\Admin\AppData\Local\Temp\69B6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\6A81.tmp"C:\Users\Admin\AppData\Local\Temp\6A81.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\6C18.tmp"C:\Users\Admin\AppData\Local\Temp\6C18.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\6E4A.tmp"C:\Users\Admin\AppData\Local\Temp\6E4A.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\6F06.tmp"C:\Users\Admin\AppData\Local\Temp\6F06.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"23⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\709C.tmp"C:\Users\Admin\AppData\Local\Temp\709C.tmp"24⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\7148.tmp"C:\Users\Admin\AppData\Local\Temp\7148.tmp"25⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\71E4.tmp"C:\Users\Admin\AppData\Local\Temp\71E4.tmp"26⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\72BF.tmp"C:\Users\Admin\AppData\Local\Temp\72BF.tmp"27⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\733C.tmp"C:\Users\Admin\AppData\Local\Temp\733C.tmp"28⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\73C8.tmp"C:\Users\Admin\AppData\Local\Temp\73C8.tmp"29⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\7445.tmp"C:\Users\Admin\AppData\Local\Temp\7445.tmp"30⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"31⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\75CC.tmp"C:\Users\Admin\AppData\Local\Temp\75CC.tmp"32⤵
- Executes dropped EXE
PID:3688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"1⤵
- Executes dropped EXE
PID:320 -
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"2⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"3⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"4⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp"5⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\7918.tmp"C:\Users\Admin\AppData\Local\Temp\7918.tmp"6⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"7⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\7A21.tmp"C:\Users\Admin\AppData\Local\Temp\7A21.tmp"8⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"9⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\7B0C.tmp"C:\Users\Admin\AppData\Local\Temp\7B0C.tmp"10⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"11⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"12⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"13⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\7D00.tmp"C:\Users\Admin\AppData\Local\Temp\7D00.tmp"14⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"15⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"16⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7F32.tmp"C:\Users\Admin\AppData\Local\Temp\7F32.tmp"17⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\802C.tmp"C:\Users\Admin\AppData\Local\Temp\802C.tmp"18⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"19⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\824F.tmp"C:\Users\Admin\AppData\Local\Temp\824F.tmp"20⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"21⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\83B7.tmp"C:\Users\Admin\AppData\Local\Temp\83B7.tmp"22⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\8453.tmp"C:\Users\Admin\AppData\Local\Temp\8453.tmp"23⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\84DF.tmp"C:\Users\Admin\AppData\Local\Temp\84DF.tmp"24⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"25⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"26⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"27⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\8731.tmp"C:\Users\Admin\AppData\Local\Temp\8731.tmp"28⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\87BE.tmp"C:\Users\Admin\AppData\Local\Temp\87BE.tmp"29⤵
- Executes dropped EXE
PID:484 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"30⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\88B8.tmp"C:\Users\Admin\AppData\Local\Temp\88B8.tmp"31⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"32⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\8993.tmp"C:\Users\Admin\AppData\Local\Temp\8993.tmp"33⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"34⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"35⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\8B38.tmp"C:\Users\Admin\AppData\Local\Temp\8B38.tmp"36⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"37⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\8C61.tmp"C:\Users\Admin\AppData\Local\Temp\8C61.tmp"38⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"39⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"40⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"41⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\8E17.tmp"C:\Users\Admin\AppData\Local\Temp\8E17.tmp"42⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\8E84.tmp"C:\Users\Admin\AppData\Local\Temp\8E84.tmp"43⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\8F11.tmp"C:\Users\Admin\AppData\Local\Temp\8F11.tmp"44⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"45⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\902A.tmp"C:\Users\Admin\AppData\Local\Temp\902A.tmp"46⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\90B7.tmp"C:\Users\Admin\AppData\Local\Temp\90B7.tmp"47⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\9153.tmp"C:\Users\Admin\AppData\Local\Temp\9153.tmp"48⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\91FF.tmp"C:\Users\Admin\AppData\Local\Temp\91FF.tmp"49⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\927C.tmp"C:\Users\Admin\AppData\Local\Temp\927C.tmp"50⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\92DA.tmp"C:\Users\Admin\AppData\Local\Temp\92DA.tmp"51⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\9357.tmp"C:\Users\Admin\AppData\Local\Temp\9357.tmp"52⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\93C4.tmp"C:\Users\Admin\AppData\Local\Temp\93C4.tmp"53⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\9431.tmp"C:\Users\Admin\AppData\Local\Temp\9431.tmp"54⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"55⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\956A.tmp"C:\Users\Admin\AppData\Local\Temp\956A.tmp"56⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\95E7.tmp"C:\Users\Admin\AppData\Local\Temp\95E7.tmp"57⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\9683.tmp"C:\Users\Admin\AppData\Local\Temp\9683.tmp"58⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"59⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\976D.tmp"C:\Users\Admin\AppData\Local\Temp\976D.tmp"60⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\97BC.tmp"C:\Users\Admin\AppData\Local\Temp\97BC.tmp"61⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\9848.tmp"C:\Users\Admin\AppData\Local\Temp\9848.tmp"62⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\98B6.tmp"C:\Users\Admin\AppData\Local\Temp\98B6.tmp"63⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\9904.tmp"C:\Users\Admin\AppData\Local\Temp\9904.tmp"64⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\9971.tmp"C:\Users\Admin\AppData\Local\Temp\9971.tmp"65⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\99EE.tmp"C:\Users\Admin\AppData\Local\Temp\99EE.tmp"66⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"67⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"68⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\9B94.tmp"C:\Users\Admin\AppData\Local\Temp\9B94.tmp"69⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"70⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\9D59.tmp"C:\Users\Admin\AppData\Local\Temp\9D59.tmp"71⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"72⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\9E72.tmp"C:\Users\Admin\AppData\Local\Temp\9E72.tmp"73⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"74⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"75⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\A066.tmp"C:\Users\Admin\AppData\Local\Temp\A066.tmp"76⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"77⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\A180.tmp"C:\Users\Admin\AppData\Local\Temp\A180.tmp"78⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"79⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\A289.tmp"C:\Users\Admin\AppData\Local\Temp\A289.tmp"80⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\A306.tmp"C:\Users\Admin\AppData\Local\Temp\A306.tmp"81⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\A393.tmp"C:\Users\Admin\AppData\Local\Temp\A393.tmp"82⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"83⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\A4BC.tmp"C:\Users\Admin\AppData\Local\Temp\A4BC.tmp"84⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\A529.tmp"C:\Users\Admin\AppData\Local\Temp\A529.tmp"85⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"86⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"87⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"88⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\A75C.tmp"C:\Users\Admin\AppData\Local\Temp\A75C.tmp"89⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\A807.tmp"C:\Users\Admin\AppData\Local\Temp\A807.tmp"90⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\A884.tmp"C:\Users\Admin\AppData\Local\Temp\A884.tmp"91⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\A911.tmp"C:\Users\Admin\AppData\Local\Temp\A911.tmp"92⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"93⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"94⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"95⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"96⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"97⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"98⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\AD47.tmp"C:\Users\Admin\AppData\Local\Temp\AD47.tmp"99⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"100⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\AE51.tmp"C:\Users\Admin\AppData\Local\Temp\AE51.tmp"101⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\AEED.tmp"C:\Users\Admin\AppData\Local\Temp\AEED.tmp"102⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"103⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\B006.tmp"C:\Users\Admin\AppData\Local\Temp\B006.tmp"104⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\B074.tmp"C:\Users\Admin\AppData\Local\Temp\B074.tmp"105⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"106⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"107⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"108⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"109⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"110⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"111⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"112⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"113⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\B556.tmp"C:\Users\Admin\AppData\Local\Temp\B556.tmp"114⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"115⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\B650.tmp"C:\Users\Admin\AppData\Local\Temp\B650.tmp"116⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"117⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"118⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\B824.tmp"C:\Users\Admin\AppData\Local\Temp\B824.tmp"119⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"120⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"121⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"122⤵PID:3180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-