Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 12:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe
-
Size
486KB
-
MD5
f29c9c9e5ee16c2f587602b1af8f01fd
-
SHA1
b0382b875206f36984d3c069a6fb0ed81ea0fd70
-
SHA256
7a0758c4366a2a72486854999a9a810561c6f10d81464e01274ae1af7c81b378
-
SHA512
a3dc52adbd96fe731a0ca49fc59357065e2a21c3c11fb03caf873c31fad00cb3953cbab32dcfc030fbc7ab50c8b67ec796303574ba87ea5242bc7547e3aefac5
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7DAQlK8byTgv1h9QeSZ01rYoHpW7QiWTSNCdG:/U5rCOTeiDDycyC9fSWYo47QZ2Cd4NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4948 754F.tmp 1160 761A.tmp 3884 wmiprvse.exe 4372 7724.tmp 3588 7ACD.tmp 4840 7B3B.tmp 4876 7BA8.tmp 3420 7C44.tmp 1104 7CC1.tmp 5004 921E.tmp 4668 927C.tmp 5112 7DFA.tmp 4776 7E86.tmp 2648 7F03.tmp 2764 7F80.tmp 1552 7FEE.tmp 4044 809A.tmp 4984 8117.tmp 1504 8174.tmp 1472 8201.tmp 4976 828E.tmp 2820 831A.tmp 5084 8388.tmp 1348 8434.tmp 4508 84FF.tmp 872 856C.tmp 1588 85F9.tmp 3412 8676.tmp 3680 8702.tmp 2688 878F.tmp 4008 882B.tmp 3604 8906.tmp 2992 8964.tmp 3252 89D1.tmp 3332 8A8D.tmp 3572 8B38.tmp 1012 8BB5.tmp 4304 8C32.tmp 4392 8CAF.tmp 4356 8D2C.tmp 4664 8DA9.tmp 4744 8E17.tmp 1148 8E94.tmp 2292 8F5F.tmp 3464 8FCC.tmp 3644 9049.tmp 444 90C6.tmp 3148 9143.tmp 852 91B1.tmp 5004 921E.tmp 4668 927C.tmp 1544 92F9.tmp 2776 9376.tmp 5080 9402.tmp 656 94AE.tmp 700 952B.tmp 2696 95A8.tmp 2644 9625.tmp 4788 96A2.tmp 1608 9710.tmp 456 979C.tmp 3868 980A.tmp 2964 9887.tmp 1584 9961.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4948 4356 2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe 85 PID 4356 wrote to memory of 4948 4356 2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe 85 PID 4356 wrote to memory of 4948 4356 2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe 85 PID 4948 wrote to memory of 1160 4948 754F.tmp 87 PID 4948 wrote to memory of 1160 4948 754F.tmp 87 PID 4948 wrote to memory of 1160 4948 754F.tmp 87 PID 1160 wrote to memory of 3884 1160 761A.tmp 133 PID 1160 wrote to memory of 3884 1160 761A.tmp 133 PID 1160 wrote to memory of 3884 1160 761A.tmp 133 PID 3884 wrote to memory of 4372 3884 wmiprvse.exe 90 PID 3884 wrote to memory of 4372 3884 wmiprvse.exe 90 PID 3884 wrote to memory of 4372 3884 wmiprvse.exe 90 PID 4372 wrote to memory of 3588 4372 7724.tmp 91 PID 4372 wrote to memory of 3588 4372 7724.tmp 91 PID 4372 wrote to memory of 3588 4372 7724.tmp 91 PID 3588 wrote to memory of 4840 3588 7ACD.tmp 92 PID 3588 wrote to memory of 4840 3588 7ACD.tmp 92 PID 3588 wrote to memory of 4840 3588 7ACD.tmp 92 PID 4840 wrote to memory of 4876 4840 7B3B.tmp 93 PID 4840 wrote to memory of 4876 4840 7B3B.tmp 93 PID 4840 wrote to memory of 4876 4840 7B3B.tmp 93 PID 4876 wrote to memory of 3420 4876 7BA8.tmp 94 PID 4876 wrote to memory of 3420 4876 7BA8.tmp 94 PID 4876 wrote to memory of 3420 4876 7BA8.tmp 94 PID 3420 wrote to memory of 1104 3420 7C44.tmp 128 PID 3420 wrote to memory of 1104 3420 7C44.tmp 128 PID 3420 wrote to memory of 1104 3420 7C44.tmp 128 PID 1104 wrote to memory of 5004 1104 7CC1.tmp 141 PID 1104 wrote to memory of 5004 1104 7CC1.tmp 141 PID 1104 wrote to memory of 5004 1104 7CC1.tmp 141 PID 5004 wrote to memory of 4668 5004 921E.tmp 142 PID 5004 wrote to memory of 4668 5004 921E.tmp 142 PID 5004 wrote to memory of 4668 5004 921E.tmp 142 PID 4668 wrote to memory of 5112 4668 927C.tmp 96 PID 4668 wrote to memory of 5112 4668 927C.tmp 96 PID 4668 wrote to memory of 5112 4668 927C.tmp 96 PID 5112 wrote to memory of 4776 5112 7DFA.tmp 97 PID 5112 wrote to memory of 4776 5112 7DFA.tmp 97 PID 5112 wrote to memory of 4776 5112 7DFA.tmp 97 PID 4776 wrote to memory of 2648 4776 7E86.tmp 124 PID 4776 wrote to memory of 2648 4776 7E86.tmp 124 PID 4776 wrote to memory of 2648 4776 7E86.tmp 124 PID 2648 wrote to memory of 2764 2648 7F03.tmp 100 PID 2648 wrote to memory of 2764 2648 7F03.tmp 100 PID 2648 wrote to memory of 2764 2648 7F03.tmp 100 PID 2764 wrote to memory of 1552 2764 7F80.tmp 99 PID 2764 wrote to memory of 1552 2764 7F80.tmp 99 PID 2764 wrote to memory of 1552 2764 7F80.tmp 99 PID 1552 wrote to memory of 4044 1552 7FEE.tmp 122 PID 1552 wrote to memory of 4044 1552 7FEE.tmp 122 PID 1552 wrote to memory of 4044 1552 7FEE.tmp 122 PID 4044 wrote to memory of 4984 4044 809A.tmp 120 PID 4044 wrote to memory of 4984 4044 809A.tmp 120 PID 4044 wrote to memory of 4984 4044 809A.tmp 120 PID 4984 wrote to memory of 1504 4984 8117.tmp 101 PID 4984 wrote to memory of 1504 4984 8117.tmp 101 PID 4984 wrote to memory of 1504 4984 8117.tmp 101 PID 1504 wrote to memory of 1472 1504 8174.tmp 102 PID 1504 wrote to memory of 1472 1504 8174.tmp 102 PID 1504 wrote to memory of 1472 1504 8174.tmp 102 PID 1472 wrote to memory of 4976 1472 8201.tmp 103 PID 1472 wrote to memory of 4976 1472 8201.tmp 103 PID 1472 wrote to memory of 4976 1472 8201.tmp 103 PID 4976 wrote to memory of 2820 4976 828E.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_f29c9c9e5ee16c2f587602b1af8f01fd_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\7697.tmp"C:\Users\Admin\AppData\Local\Temp\7697.tmp"4⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\7ACD.tmp"C:\Users\Admin\AppData\Local\Temp\7ACD.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\7C44.tmp"C:\Users\Admin\AppData\Local\Temp\7C44.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"1⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"2⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\7E86.tmp"C:\Users\Admin\AppData\Local\Temp\7E86.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\7F03.tmp"C:\Users\Admin\AppData\Local\Temp\7F03.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\809A.tmp"C:\Users\Admin\AppData\Local\Temp\809A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\7F80.tmp"C:\Users\Admin\AppData\Local\Temp\7F80.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764
-
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\8201.tmp"C:\Users\Admin\AppData\Local\Temp\8201.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\831A.tmp"C:\Users\Admin\AppData\Local\Temp\831A.tmp"4⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\8388.tmp"C:\Users\Admin\AppData\Local\Temp\8388.tmp"5⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\8434.tmp"C:\Users\Admin\AppData\Local\Temp\8434.tmp"6⤵
- Executes dropped EXE
PID:1348
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"1⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"2⤵
- Executes dropped EXE
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"1⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"2⤵
- Executes dropped EXE
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\8702.tmp"C:\Users\Admin\AppData\Local\Temp\8702.tmp"1⤵
- Executes dropped EXE
PID:3680
-
C:\Users\Admin\AppData\Local\Temp\8676.tmp"C:\Users\Admin\AppData\Local\Temp\8676.tmp"1⤵
- Executes dropped EXE
PID:3412
-
C:\Users\Admin\AppData\Local\Temp\85F9.tmp"C:\Users\Admin\AppData\Local\Temp\85F9.tmp"1⤵
- Executes dropped EXE
PID:1588
-
C:\Users\Admin\AppData\Local\Temp\8964.tmp"C:\Users\Admin\AppData\Local\Temp\8964.tmp"1⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"2⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"3⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\8B38.tmp"C:\Users\Admin\AppData\Local\Temp\8B38.tmp"4⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\8BB5.tmp"C:\Users\Admin\AppData\Local\Temp\8BB5.tmp"5⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\8C32.tmp"C:\Users\Admin\AppData\Local\Temp\8C32.tmp"6⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"7⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"8⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"9⤵
- Executes dropped EXE
PID:4664
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8906.tmp"C:\Users\Admin\AppData\Local\Temp\8906.tmp"1⤵
- Executes dropped EXE
PID:3604
-
C:\Users\Admin\AppData\Local\Temp\8117.tmp"C:\Users\Admin\AppData\Local\Temp\8117.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984
-
C:\Users\Admin\AppData\Local\Temp\8E17.tmp"C:\Users\Admin\AppData\Local\Temp\8E17.tmp"1⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"2⤵
- Executes dropped EXE
PID:1148
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884
-
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"1⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"2⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\9049.tmp"C:\Users\Admin\AppData\Local\Temp\9049.tmp"3⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\90C6.tmp"C:\Users\Admin\AppData\Local\Temp\90C6.tmp"4⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\9143.tmp"C:\Users\Admin\AppData\Local\Temp\9143.tmp"5⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\91B1.tmp"C:\Users\Admin\AppData\Local\Temp\91B1.tmp"6⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\921E.tmp"C:\Users\Admin\AppData\Local\Temp\921E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\927C.tmp"C:\Users\Admin\AppData\Local\Temp\927C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"9⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"10⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\9402.tmp"C:\Users\Admin\AppData\Local\Temp\9402.tmp"11⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\94AE.tmp"C:\Users\Admin\AppData\Local\Temp\94AE.tmp"12⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\952B.tmp"C:\Users\Admin\AppData\Local\Temp\952B.tmp"13⤵
- Executes dropped EXE
PID:700 -
C:\Users\Admin\AppData\Local\Temp\95A8.tmp"C:\Users\Admin\AppData\Local\Temp\95A8.tmp"14⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\9625.tmp"C:\Users\Admin\AppData\Local\Temp\9625.tmp"15⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\96A2.tmp"C:\Users\Admin\AppData\Local\Temp\96A2.tmp"16⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\9710.tmp"C:\Users\Admin\AppData\Local\Temp\9710.tmp"17⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\979C.tmp"C:\Users\Admin\AppData\Local\Temp\979C.tmp"18⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\980A.tmp"C:\Users\Admin\AppData\Local\Temp\980A.tmp"19⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\9887.tmp"C:\Users\Admin\AppData\Local\Temp\9887.tmp"20⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\9961.tmp"C:\Users\Admin\AppData\Local\Temp\9961.tmp"21⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\99DE.tmp"C:\Users\Admin\AppData\Local\Temp\99DE.tmp"22⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"23⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"24⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"25⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"C:\Users\Admin\AppData\Local\Temp\9CEC.tmp"26⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\9E43.tmp"C:\Users\Admin\AppData\Local\Temp\9E43.tmp"27⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"28⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"29⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\A086.tmp"C:\Users\Admin\AppData\Local\Temp\A086.tmp"30⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"31⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"32⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"33⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\A568.tmp"C:\Users\Admin\AppData\Local\Temp\A568.tmp"34⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"35⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\A652.tmp"C:\Users\Admin\AppData\Local\Temp\A652.tmp"36⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\A6B0.tmp"C:\Users\Admin\AppData\Local\Temp\A6B0.tmp"37⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\A72D.tmp"C:\Users\Admin\AppData\Local\Temp\A72D.tmp"38⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\A77B.tmp"C:\Users\Admin\AppData\Local\Temp\A77B.tmp"39⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"40⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\A894.tmp"C:\Users\Admin\AppData\Local\Temp\A894.tmp"41⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\A921.tmp"C:\Users\Admin\AppData\Local\Temp\A921.tmp"42⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"43⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"44⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\AB05.tmp"C:\Users\Admin\AppData\Local\Temp\AB05.tmp"45⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"46⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\AC1E.tmp"C:\Users\Admin\AppData\Local\Temp\AC1E.tmp"47⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"48⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"49⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\AD76.tmp"C:\Users\Admin\AppData\Local\Temp\AD76.tmp"50⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"51⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\AE70.tmp"C:\Users\Admin\AppData\Local\Temp\AE70.tmp"52⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"53⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"54⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"55⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"56⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"57⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"58⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"59⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\B258.tmp"C:\Users\Admin\AppData\Local\Temp\B258.tmp"60⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"61⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"62⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\B381.tmp"C:\Users\Admin\AppData\Local\Temp\B381.tmp"63⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"64⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"65⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"66⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\B594.tmp"C:\Users\Admin\AppData\Local\Temp\B594.tmp"67⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\B611.tmp"C:\Users\Admin\AppData\Local\Temp\B611.tmp"68⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"69⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"70⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"71⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\B844.tmp"C:\Users\Admin\AppData\Local\Temp\B844.tmp"72⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"73⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\B93E.tmp"C:\Users\Admin\AppData\Local\Temp\B93E.tmp"74⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\B9DA.tmp"C:\Users\Admin\AppData\Local\Temp\B9DA.tmp"75⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"76⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"77⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"78⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"79⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"80⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"81⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"82⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\BDF1.tmp"C:\Users\Admin\AppData\Local\Temp\BDF1.tmp"83⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"84⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\BEFA.tmp"C:\Users\Admin\AppData\Local\Temp\BEFA.tmp"85⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\BF77.tmp"C:\Users\Admin\AppData\Local\Temp\BF77.tmp"86⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"87⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\C062.tmp"C:\Users\Admin\AppData\Local\Temp\C062.tmp"88⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"89⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"90⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"91⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\C275.tmp"C:\Users\Admin\AppData\Local\Temp\C275.tmp"92⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"93⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\C38E.tmp"C:\Users\Admin\AppData\Local\Temp\C38E.tmp"94⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\C41B.tmp"C:\Users\Admin\AppData\Local\Temp\C41B.tmp"95⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\C498.tmp"C:\Users\Admin\AppData\Local\Temp\C498.tmp"96⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"97⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"98⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\C63E.tmp"C:\Users\Admin\AppData\Local\Temp\C63E.tmp"99⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"100⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\C747.tmp"C:\Users\Admin\AppData\Local\Temp\C747.tmp"101⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"102⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\C870.tmp"C:\Users\Admin\AppData\Local\Temp\C870.tmp"103⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"104⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"105⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\CA16.tmp"C:\Users\Admin\AppData\Local\Temp\CA16.tmp"106⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"107⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"108⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"109⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"110⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"111⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\CD33.tmp"C:\Users\Admin\AppData\Local\Temp\CD33.tmp"112⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\CDCF.tmp"C:\Users\Admin\AppData\Local\Temp\CDCF.tmp"113⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"114⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\CEE9.tmp"C:\Users\Admin\AppData\Local\Temp\CEE9.tmp"115⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"116⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"117⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"118⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"119⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"120⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"121⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"122⤵PID:3508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-