Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 06:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe
-
Size
486KB
-
MD5
cd520523214deeb7a20a8cbbc745f7d1
-
SHA1
f5e6f8e6de9a52b6c49a3c7a11d2a7dd9c6399ab
-
SHA256
14f8a70a27ef1f1fab32227b5cae9cb4ca20e48028d27549dc9ecdfc8afc9ded
-
SHA512
70aa737a02b678fb61a1909be27c58f4b005f3cb8581c5bd6c494410f517dc738b54949dfdf2096f3a63625047bd968a3035ae2440fa3087fee7da4db6f2fcee
-
SSDEEP
12288:/U5rCOTeiD0Lnmk0gt9WT6yrLvxe4pyOdRNZ:/UQOJD0Lmk0KiPv8IdRN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4944 F211.tmp 376 F349.tmp 4956 F3E5.tmp 464 F4A1.tmp 3768 F54D.tmp 3316 F5F9.tmp 1952 F6B4.tmp 1156 F760.tmp 2212 FEB3.tmp 4616 68.tmp 1632 162.tmp 4172 25C.tmp 2408 308.tmp 1284 48F.tmp 1404 589.tmp 4028 673.tmp 3252 819.tmp 684 971.tmp 1764 A2C.tmp 2368 B84.tmp 4588 C4F.tmp 1908 D69.tmp 888 E72.tmp 380 F1E.tmp 1260 FF9.tmp 2144 1095.tmp 5036 118F.tmp 1144 1289.tmp 2808 1364.tmp 2976 1410.tmp 4952 14FA.tmp 3920 15C5.tmp 4692 16CF.tmp 3560 177B.tmp 3272 1846.tmp 4728 18E2.tmp 3116 199E.tmp 4836 1A1B.tmp 4580 1AF5.tmp 4796 1B72.tmp 3188 1C1E.tmp 1796 1CAB.tmp 4332 1DF3.tmp 4392 1E9F.tmp 1444 1F2B.tmp 4720 1F99.tmp 3960 20D1.tmp 3344 217D.tmp 1196 220A.tmp 3160 22C5.tmp 3544 23A0.tmp 3768 242D.tmp 116 24E8.tmp 2100 2556.tmp 2116 25F2.tmp 4396 26AD.tmp 1732 274A.tmp 3024 27B7.tmp 416 2834.tmp 4336 290F.tmp 1284 29F9.tmp 1812 2A95.tmp 5032 2B51.tmp 3424 2C0C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4944 3076 2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe 86 PID 3076 wrote to memory of 4944 3076 2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe 86 PID 3076 wrote to memory of 4944 3076 2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe 86 PID 4944 wrote to memory of 376 4944 F211.tmp 88 PID 4944 wrote to memory of 376 4944 F211.tmp 88 PID 4944 wrote to memory of 376 4944 F211.tmp 88 PID 376 wrote to memory of 4956 376 F349.tmp 89 PID 376 wrote to memory of 4956 376 F349.tmp 89 PID 376 wrote to memory of 4956 376 F349.tmp 89 PID 4956 wrote to memory of 464 4956 F3E5.tmp 90 PID 4956 wrote to memory of 464 4956 F3E5.tmp 90 PID 4956 wrote to memory of 464 4956 F3E5.tmp 90 PID 464 wrote to memory of 3768 464 F4A1.tmp 91 PID 464 wrote to memory of 3768 464 F4A1.tmp 91 PID 464 wrote to memory of 3768 464 F4A1.tmp 91 PID 3768 wrote to memory of 3316 3768 F54D.tmp 92 PID 3768 wrote to memory of 3316 3768 F54D.tmp 92 PID 3768 wrote to memory of 3316 3768 F54D.tmp 92 PID 3316 wrote to memory of 1952 3316 F5F9.tmp 93 PID 3316 wrote to memory of 1952 3316 F5F9.tmp 93 PID 3316 wrote to memory of 1952 3316 F5F9.tmp 93 PID 1952 wrote to memory of 1156 1952 F6B4.tmp 94 PID 1952 wrote to memory of 1156 1952 F6B4.tmp 94 PID 1952 wrote to memory of 1156 1952 F6B4.tmp 94 PID 1156 wrote to memory of 2212 1156 F760.tmp 95 PID 1156 wrote to memory of 2212 1156 F760.tmp 95 PID 1156 wrote to memory of 2212 1156 F760.tmp 95 PID 2212 wrote to memory of 4616 2212 FEB3.tmp 96 PID 2212 wrote to memory of 4616 2212 FEB3.tmp 96 PID 2212 wrote to memory of 4616 2212 FEB3.tmp 96 PID 4616 wrote to memory of 1632 4616 68.tmp 97 PID 4616 wrote to memory of 1632 4616 68.tmp 97 PID 4616 wrote to memory of 1632 4616 68.tmp 97 PID 1632 wrote to memory of 4172 1632 162.tmp 98 PID 1632 wrote to memory of 4172 1632 162.tmp 98 PID 1632 wrote to memory of 4172 1632 162.tmp 98 PID 4172 wrote to memory of 2408 4172 25C.tmp 99 PID 4172 wrote to memory of 2408 4172 25C.tmp 99 PID 4172 wrote to memory of 2408 4172 25C.tmp 99 PID 2408 wrote to memory of 1284 2408 308.tmp 100 PID 2408 wrote to memory of 1284 2408 308.tmp 100 PID 2408 wrote to memory of 1284 2408 308.tmp 100 PID 1284 wrote to memory of 1404 1284 48F.tmp 101 PID 1284 wrote to memory of 1404 1284 48F.tmp 101 PID 1284 wrote to memory of 1404 1284 48F.tmp 101 PID 1404 wrote to memory of 4028 1404 589.tmp 102 PID 1404 wrote to memory of 4028 1404 589.tmp 102 PID 1404 wrote to memory of 4028 1404 589.tmp 102 PID 4028 wrote to memory of 3252 4028 673.tmp 103 PID 4028 wrote to memory of 3252 4028 673.tmp 103 PID 4028 wrote to memory of 3252 4028 673.tmp 103 PID 3252 wrote to memory of 684 3252 819.tmp 104 PID 3252 wrote to memory of 684 3252 819.tmp 104 PID 3252 wrote to memory of 684 3252 819.tmp 104 PID 684 wrote to memory of 1764 684 971.tmp 105 PID 684 wrote to memory of 1764 684 971.tmp 105 PID 684 wrote to memory of 1764 684 971.tmp 105 PID 1764 wrote to memory of 2368 1764 A2C.tmp 106 PID 1764 wrote to memory of 2368 1764 A2C.tmp 106 PID 1764 wrote to memory of 2368 1764 A2C.tmp 106 PID 2368 wrote to memory of 4588 2368 B84.tmp 107 PID 2368 wrote to memory of 4588 2368 B84.tmp 107 PID 2368 wrote to memory of 4588 2368 B84.tmp 107 PID 4588 wrote to memory of 1908 4588 C4F.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_cd520523214deeb7a20a8cbbc745f7d1_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\F349.tmp"C:\Users\Admin\AppData\Local\Temp\F349.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\F760.tmp"C:\Users\Admin\AppData\Local\Temp\F760.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\68.tmp"C:\Users\Admin\AppData\Local\Temp\68.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\25C.tmp"C:\Users\Admin\AppData\Local\Temp\25C.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\308.tmp"C:\Users\Admin\AppData\Local\Temp\308.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\48F.tmp"C:\Users\Admin\AppData\Local\Temp\48F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\589.tmp"C:\Users\Admin\AppData\Local\Temp\589.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\673.tmp"C:\Users\Admin\AppData\Local\Temp\673.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\819.tmp"C:\Users\Admin\AppData\Local\Temp\819.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\971.tmp"C:\Users\Admin\AppData\Local\Temp\971.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"23⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"24⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"25⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"26⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"27⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\118F.tmp"C:\Users\Admin\AppData\Local\Temp\118F.tmp"28⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"29⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"30⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"31⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"32⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"33⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\16CF.tmp"C:\Users\Admin\AppData\Local\Temp\16CF.tmp"34⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"35⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\1846.tmp"C:\Users\Admin\AppData\Local\Temp\1846.tmp"36⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"37⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"38⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"39⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"40⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"41⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"42⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"43⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"44⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"45⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"46⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"47⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"48⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"49⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"50⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"51⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\23A0.tmp"C:\Users\Admin\AppData\Local\Temp\23A0.tmp"52⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"53⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\24E8.tmp"C:\Users\Admin\AppData\Local\Temp\24E8.tmp"54⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\2556.tmp"C:\Users\Admin\AppData\Local\Temp\2556.tmp"55⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"56⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"57⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"58⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"59⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\2834.tmp"C:\Users\Admin\AppData\Local\Temp\2834.tmp"60⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\290F.tmp"C:\Users\Admin\AppData\Local\Temp\290F.tmp"61⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"62⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"63⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"64⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"65⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"66⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"67⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"68⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"69⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"70⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"71⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"72⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\30FE.tmp"C:\Users\Admin\AppData\Local\Temp\30FE.tmp"73⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"74⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"75⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"76⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"77⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"78⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"79⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"80⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"81⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\35B1.tmp"C:\Users\Admin\AppData\Local\Temp\35B1.tmp"82⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"83⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"84⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"85⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\38BE.tmp"C:\Users\Admin\AppData\Local\Temp\38BE.tmp"86⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\393B.tmp"C:\Users\Admin\AppData\Local\Temp\393B.tmp"87⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\39D8.tmp"C:\Users\Admin\AppData\Local\Temp\39D8.tmp"88⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\3C39.tmp"C:\Users\Admin\AppData\Local\Temp\3C39.tmp"89⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"90⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"91⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"92⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"93⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"94⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"95⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"96⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"97⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\4198.tmp"C:\Users\Admin\AppData\Local\Temp\4198.tmp"98⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\4205.tmp"C:\Users\Admin\AppData\Local\Temp\4205.tmp"99⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\4292.tmp"C:\Users\Admin\AppData\Local\Temp\4292.tmp"100⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"101⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"102⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"103⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\4522.tmp"C:\Users\Admin\AppData\Local\Temp\4522.tmp"104⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"105⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"106⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\47E1.tmp"C:\Users\Admin\AppData\Local\Temp\47E1.tmp"107⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"108⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"109⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"110⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"111⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"112⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"113⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"114⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"115⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\5251.tmp"C:\Users\Admin\AppData\Local\Temp\5251.tmp"116⤵PID:496
-
C:\Users\Admin\AppData\Local\Temp\530D.tmp"C:\Users\Admin\AppData\Local\Temp\530D.tmp"117⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"118⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\557E.tmp"C:\Users\Admin\AppData\Local\Temp\557E.tmp"119⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\562A.tmp"C:\Users\Admin\AppData\Local\Temp\562A.tmp"120⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"121⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\57C0.tmp"C:\Users\Admin\AppData\Local\Temp\57C0.tmp"122⤵PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-