Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 00:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe
-
Size
486KB
-
MD5
d8fe79714f97c38f65fd3c02e5cebdaf
-
SHA1
a1fdfa380107269ec4f80a156833fe76b0816cf3
-
SHA256
b6701dc29ad91ca7f4f1b5c9eeac24603df66f06b68ffa9cde7aa87128757c97
-
SHA512
3e2a0bcbf8f56bc0274e8c969e58f756bb3bfddb951355b5345a40614e264d985ac634f31c6f9c7bcdc57f1861ea6a2e3a6bbc7863e635f40c6b8abaf55804bf
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7rDTpv7LhW6ujmolebSzWyW2uewiGJ25R/zWr:/U5rCOTeiDzpv795ujmPbGN9hWaMfNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3516 590D.tmp 792 598A.tmp 4272 59E7.tmp 4912 5A45.tmp 4884 5A93.tmp 3924 5AF1.tmp 4300 5B3F.tmp 4000 5B8D.tmp 3108 5BEB.tmp 4280 5C39.tmp 4732 5C97.tmp 4016 5CE5.tmp 4064 5D43.tmp 4920 5D91.tmp 4696 6C37.tmp 1716 5E2D.tmp 748 6D41.tmp 2624 5EE9.tmp 5000 5F46.tmp 2936 5FA4.tmp 4408 5FF2.tmp 1848 6040.tmp 3588 608F.tmp 3572 60EC.tmp 2240 614A.tmp 4960 6198.tmp 5016 61E6.tmp 2380 6234.tmp 3676 6283.tmp 4700 62E0.tmp 4600 632E.tmp 3312 637D.tmp 5104 63CB.tmp 2296 6419.tmp 4264 6467.tmp 2892 64B5.tmp 1712 6503.tmp 3476 6551.tmp 632 659F.tmp 3292 65EE.tmp 4032 663C.tmp 4692 668A.tmp 712 66F7.tmp 2712 6745.tmp 668 6793.tmp 1128 67E2.tmp 5056 6830.tmp 4860 687E.tmp 452 68DC.tmp 3480 692A.tmp 4744 6978.tmp 4212 69C6.tmp 4568 6A14.tmp 1852 6A62.tmp 1996 6AB0.tmp 2740 6AFE.tmp 3600 6B4D.tmp 2596 6B9B.tmp 3716 6BE9.tmp 4696 6C37.tmp 4668 6C95.tmp 4404 6CF2.tmp 748 6D41.tmp 4780 6DBE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 3516 964 2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe 87 PID 964 wrote to memory of 3516 964 2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe 87 PID 964 wrote to memory of 3516 964 2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe 87 PID 3516 wrote to memory of 792 3516 590D.tmp 89 PID 3516 wrote to memory of 792 3516 590D.tmp 89 PID 3516 wrote to memory of 792 3516 590D.tmp 89 PID 792 wrote to memory of 4272 792 598A.tmp 93 PID 792 wrote to memory of 4272 792 598A.tmp 93 PID 792 wrote to memory of 4272 792 598A.tmp 93 PID 4272 wrote to memory of 4912 4272 59E7.tmp 91 PID 4272 wrote to memory of 4912 4272 59E7.tmp 91 PID 4272 wrote to memory of 4912 4272 59E7.tmp 91 PID 4912 wrote to memory of 4884 4912 5A45.tmp 92 PID 4912 wrote to memory of 4884 4912 5A45.tmp 92 PID 4912 wrote to memory of 4884 4912 5A45.tmp 92 PID 4884 wrote to memory of 3924 4884 5A93.tmp 94 PID 4884 wrote to memory of 3924 4884 5A93.tmp 94 PID 4884 wrote to memory of 3924 4884 5A93.tmp 94 PID 3924 wrote to memory of 4300 3924 5AF1.tmp 96 PID 3924 wrote to memory of 4300 3924 5AF1.tmp 96 PID 3924 wrote to memory of 4300 3924 5AF1.tmp 96 PID 4300 wrote to memory of 4000 4300 5B3F.tmp 95 PID 4300 wrote to memory of 4000 4300 5B3F.tmp 95 PID 4300 wrote to memory of 4000 4300 5B3F.tmp 95 PID 4000 wrote to memory of 3108 4000 5B8D.tmp 149 PID 4000 wrote to memory of 3108 4000 5B8D.tmp 149 PID 4000 wrote to memory of 3108 4000 5B8D.tmp 149 PID 3108 wrote to memory of 4280 3108 5BEB.tmp 148 PID 3108 wrote to memory of 4280 3108 5BEB.tmp 148 PID 3108 wrote to memory of 4280 3108 5BEB.tmp 148 PID 4280 wrote to memory of 4732 4280 5C39.tmp 147 PID 4280 wrote to memory of 4732 4280 5C39.tmp 147 PID 4280 wrote to memory of 4732 4280 5C39.tmp 147 PID 4732 wrote to memory of 4016 4732 5C97.tmp 100 PID 4732 wrote to memory of 4016 4732 5C97.tmp 100 PID 4732 wrote to memory of 4016 4732 5C97.tmp 100 PID 4016 wrote to memory of 4064 4016 5CE5.tmp 97 PID 4016 wrote to memory of 4064 4016 5CE5.tmp 97 PID 4016 wrote to memory of 4064 4016 5CE5.tmp 97 PID 4064 wrote to memory of 4920 4064 5D43.tmp 99 PID 4064 wrote to memory of 4920 4064 5D43.tmp 99 PID 4064 wrote to memory of 4920 4064 5D43.tmp 99 PID 4920 wrote to memory of 4696 4920 5D91.tmp 152 PID 4920 wrote to memory of 4696 4920 5D91.tmp 152 PID 4920 wrote to memory of 4696 4920 5D91.tmp 152 PID 4696 wrote to memory of 1716 4696 6C37.tmp 146 PID 4696 wrote to memory of 1716 4696 6C37.tmp 146 PID 4696 wrote to memory of 1716 4696 6C37.tmp 146 PID 1716 wrote to memory of 748 1716 5E2D.tmp 155 PID 1716 wrote to memory of 748 1716 5E2D.tmp 155 PID 1716 wrote to memory of 748 1716 5E2D.tmp 155 PID 748 wrote to memory of 2624 748 6D41.tmp 144 PID 748 wrote to memory of 2624 748 6D41.tmp 144 PID 748 wrote to memory of 2624 748 6D41.tmp 144 PID 2624 wrote to memory of 5000 2624 5EE9.tmp 143 PID 2624 wrote to memory of 5000 2624 5EE9.tmp 143 PID 2624 wrote to memory of 5000 2624 5EE9.tmp 143 PID 5000 wrote to memory of 2936 5000 5F46.tmp 102 PID 5000 wrote to memory of 2936 5000 5F46.tmp 102 PID 5000 wrote to memory of 2936 5000 5F46.tmp 102 PID 2936 wrote to memory of 4408 2936 5FA4.tmp 101 PID 2936 wrote to memory of 4408 2936 5FA4.tmp 101 PID 2936 wrote to memory of 4408 2936 5FA4.tmp 101 PID 4408 wrote to memory of 1848 4408 5FF2.tmp 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_d8fe79714f97c38f65fd3c02e5cebdaf_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\590D.tmp"C:\Users\Admin\AppData\Local\Temp\590D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\598A.tmp"C:\Users\Admin\AppData\Local\Temp\598A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\59E7.tmp"C:\Users\Admin\AppData\Local\Temp\59E7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A45.tmp"C:\Users\Admin\AppData\Local\Temp\5A45.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\5A93.tmp"C:\Users\Admin\AppData\Local\Temp\5A93.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\5D43.tmp"C:\Users\Admin\AppData\Local\Temp\5D43.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\5D91.tmp"C:\Users\Admin\AppData\Local\Temp\5D91.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"C:\Users\Admin\AppData\Local\Temp\5DDF.tmp"1⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"C:\Users\Admin\AppData\Local\Temp\5E2D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016
-
C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\6040.tmp"C:\Users\Admin\AppData\Local\Temp\6040.tmp"2⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"1⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\62E0.tmp"C:\Users\Admin\AppData\Local\Temp\62E0.tmp"2⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\632E.tmp"C:\Users\Admin\AppData\Local\Temp\632E.tmp"3⤵
- Executes dropped EXE
PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\63CB.tmp"C:\Users\Admin\AppData\Local\Temp\63CB.tmp"1⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"2⤵
- Executes dropped EXE
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\6467.tmp"C:\Users\Admin\AppData\Local\Temp\6467.tmp"1⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\64B5.tmp"C:\Users\Admin\AppData\Local\Temp\64B5.tmp"2⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"3⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"4⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"5⤵
- Executes dropped EXE
PID:632 -
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"6⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\663C.tmp"C:\Users\Admin\AppData\Local\Temp\663C.tmp"7⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\668A.tmp"C:\Users\Admin\AppData\Local\Temp\668A.tmp"8⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\66F7.tmp"C:\Users\Admin\AppData\Local\Temp\66F7.tmp"9⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\6745.tmp"C:\Users\Admin\AppData\Local\Temp\6745.tmp"10⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\6793.tmp"C:\Users\Admin\AppData\Local\Temp\6793.tmp"11⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\67E2.tmp"C:\Users\Admin\AppData\Local\Temp\67E2.tmp"12⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\6830.tmp"C:\Users\Admin\AppData\Local\Temp\6830.tmp"13⤵
- Executes dropped EXE
PID:5056
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\637D.tmp"C:\Users\Admin\AppData\Local\Temp\637D.tmp"1⤵
- Executes dropped EXE
PID:3312
-
C:\Users\Admin\AppData\Local\Temp\687E.tmp"C:\Users\Admin\AppData\Local\Temp\687E.tmp"1⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\68DC.tmp"C:\Users\Admin\AppData\Local\Temp\68DC.tmp"2⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\692A.tmp"C:\Users\Admin\AppData\Local\Temp\692A.tmp"3⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\6978.tmp"C:\Users\Admin\AppData\Local\Temp\6978.tmp"4⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\69C6.tmp"C:\Users\Admin\AppData\Local\Temp\69C6.tmp"5⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\6A14.tmp"C:\Users\Admin\AppData\Local\Temp\6A14.tmp"6⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\6A62.tmp"C:\Users\Admin\AppData\Local\Temp\6A62.tmp"7⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\6AB0.tmp"C:\Users\Admin\AppData\Local\Temp\6AB0.tmp"8⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"9⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"10⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"11⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"12⤵
- Executes dropped EXE
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"14⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"15⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\6D41.tmp"C:\Users\Admin\AppData\Local\Temp\6D41.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\6DBE.tmp"C:\Users\Admin\AppData\Local\Temp\6DBE.tmp"17⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"18⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\6ED7.tmp"C:\Users\Admin\AppData\Local\Temp\6ED7.tmp"19⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\6F63.tmp"C:\Users\Admin\AppData\Local\Temp\6F63.tmp"20⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\6FF0.tmp"C:\Users\Admin\AppData\Local\Temp\6FF0.tmp"21⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"22⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\7148.tmp"C:\Users\Admin\AppData\Local\Temp\7148.tmp"23⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\71B5.tmp"C:\Users\Admin\AppData\Local\Temp\71B5.tmp"24⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\7251.tmp"C:\Users\Admin\AppData\Local\Temp\7251.tmp"25⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\72AF.tmp"C:\Users\Admin\AppData\Local\Temp\72AF.tmp"26⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\730D.tmp"C:\Users\Admin\AppData\Local\Temp\730D.tmp"27⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\736B.tmp"C:\Users\Admin\AppData\Local\Temp\736B.tmp"28⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\73C8.tmp"C:\Users\Admin\AppData\Local\Temp\73C8.tmp"29⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"30⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"31⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"32⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"33⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\75AD.tmp"C:\Users\Admin\AppData\Local\Temp\75AD.tmp"34⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"35⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"36⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"37⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"38⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\7782.tmp"C:\Users\Admin\AppData\Local\Temp\7782.tmp"39⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\77D0.tmp"C:\Users\Admin\AppData\Local\Temp\77D0.tmp"40⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\781E.tmp"C:\Users\Admin\AppData\Local\Temp\781E.tmp"41⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\786C.tmp"C:\Users\Admin\AppData\Local\Temp\786C.tmp"42⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"43⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\78F9.tmp"C:\Users\Admin\AppData\Local\Temp\78F9.tmp"44⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\7956.tmp"C:\Users\Admin\AppData\Local\Temp\7956.tmp"45⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"46⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\79F3.tmp"C:\Users\Admin\AppData\Local\Temp\79F3.tmp"47⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\7A41.tmp"C:\Users\Admin\AppData\Local\Temp\7A41.tmp"48⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"49⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"50⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"51⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"52⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"53⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\7C15.tmp"C:\Users\Admin\AppData\Local\Temp\7C15.tmp"54⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"55⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"56⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"57⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"58⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"59⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"60⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\7E38.tmp"C:\Users\Admin\AppData\Local\Temp\7E38.tmp"61⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\7E86.tmp"C:\Users\Admin\AppData\Local\Temp\7E86.tmp"62⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"63⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\7F23.tmp"C:\Users\Admin\AppData\Local\Temp\7F23.tmp"64⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\7F80.tmp"C:\Users\Admin\AppData\Local\Temp\7F80.tmp"65⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"66⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"67⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\806B.tmp"C:\Users\Admin\AppData\Local\Temp\806B.tmp"68⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"69⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\8107.tmp"C:\Users\Admin\AppData\Local\Temp\8107.tmp"70⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"71⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"72⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\81F1.tmp"C:\Users\Admin\AppData\Local\Temp\81F1.tmp"73⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"74⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\82DC.tmp"C:\Users\Admin\AppData\Local\Temp\82DC.tmp"75⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\8349.tmp"C:\Users\Admin\AppData\Local\Temp\8349.tmp"76⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\83B7.tmp"C:\Users\Admin\AppData\Local\Temp\83B7.tmp"77⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\8424.tmp"C:\Users\Admin\AppData\Local\Temp\8424.tmp"78⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"79⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\84D0.tmp"C:\Users\Admin\AppData\Local\Temp\84D0.tmp"80⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\851E.tmp"C:\Users\Admin\AppData\Local\Temp\851E.tmp"81⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"82⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\85BA.tmp"C:\Users\Admin\AppData\Local\Temp\85BA.tmp"83⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"84⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\8666.tmp"C:\Users\Admin\AppData\Local\Temp\8666.tmp"85⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"86⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\8702.tmp"C:\Users\Admin\AppData\Local\Temp\8702.tmp"87⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\8760.tmp"C:\Users\Admin\AppData\Local\Temp\8760.tmp"88⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"89⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"90⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"91⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\88E7.tmp"C:\Users\Admin\AppData\Local\Temp\88E7.tmp"92⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\8935.tmp"C:\Users\Admin\AppData\Local\Temp\8935.tmp"93⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\8983.tmp"C:\Users\Admin\AppData\Local\Temp\8983.tmp"94⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"95⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"96⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\8A7D.tmp"C:\Users\Admin\AppData\Local\Temp\8A7D.tmp"97⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\8ACB.tmp"C:\Users\Admin\AppData\Local\Temp\8ACB.tmp"98⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\8B19.tmp"C:\Users\Admin\AppData\Local\Temp\8B19.tmp"99⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\8B77.tmp"C:\Users\Admin\AppData\Local\Temp\8B77.tmp"100⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"101⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\8C13.tmp"C:\Users\Admin\AppData\Local\Temp\8C13.tmp"102⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\8C71.tmp"C:\Users\Admin\AppData\Local\Temp\8C71.tmp"103⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"104⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"105⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"106⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"107⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\8DF8.tmp"C:\Users\Admin\AppData\Local\Temp\8DF8.tmp"108⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\8E46.tmp"C:\Users\Admin\AppData\Local\Temp\8E46.tmp"109⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"110⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"111⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\8F40.tmp"C:\Users\Admin\AppData\Local\Temp\8F40.tmp"112⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"113⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"114⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\9049.tmp"C:\Users\Admin\AppData\Local\Temp\9049.tmp"115⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\9097.tmp"C:\Users\Admin\AppData\Local\Temp\9097.tmp"116⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\90E6.tmp"C:\Users\Admin\AppData\Local\Temp\90E6.tmp"117⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\9143.tmp"C:\Users\Admin\AppData\Local\Temp\9143.tmp"118⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\9191.tmp"C:\Users\Admin\AppData\Local\Temp\9191.tmp"119⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"120⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"121⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\928B.tmp"C:\Users\Admin\AppData\Local\Temp\928B.tmp"122⤵PID:64
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-