Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe
-
Size
486KB
-
MD5
9c6b6503742f45843719fc6382df13c9
-
SHA1
f33720c249005c8d6e640f55bf44b1590f8b82b5
-
SHA256
5e1f16e949b802ee3bc9f6d7cb306bad66858c8c754cbcda13d23225d67a98cc
-
SHA512
f4f5f506c7c11d13e5b086e77020cfd20f170eca5a04c71d3f1f5aa4e53a4e74de10f43c0b99454fd95c53b983a7a1e77d8878391bdf7c6de500caeb71caa063
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7YgZ8QKfYi3I3I1QWFzVujgbOVN5igaSS7sHT:/U5rCOTeiDYRYelVZbOVsSSANZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5028 517B.tmp 1200 51F8.tmp 2580 5266.tmp 2132 52D3.tmp 1708 wmiprvse.exe 3644 537F.tmp 2220 53EC.tmp 1892 543A.tmp 4236 5488.tmp 4936 54E6.tmp 1520 5534.tmp 3776 5592.tmp 2036 633E.tmp 3868 564E.tmp 3196 63DA.tmp 2352 56F9.tmp 2680 5748.tmp 3736 5796.tmp 4744 57E4.tmp 2784 5842.tmp 1716 5890.tmp 4688 58DE.tmp 4716 592C.tmp 1188 598A.tmp 1028 59D8.tmp 2488 5A26.tmp 4280 5A84.tmp 3028 5AE1.tmp 4476 5B30.tmp 3160 5B7E.tmp 1980 5BDB.tmp 4860 5C39.tmp 1216 5C87.tmp 1764 5CD5.tmp 3528 5D24.tmp 1628 5D72.tmp 4288 5DC0.tmp 4308 5E0E.tmp 3784 5E6C.tmp 2704 5EBA.tmp 2172 5F08.tmp 4336 5F56.tmp 4520 5FA4.tmp 2908 5FF2.tmp 2660 6040.tmp 2308 608F.tmp 2228 60DD.tmp 4388 612B.tmp 4564 6169.tmp 4240 61B7.tmp 4012 6206.tmp 4984 6254.tmp 1972 62A2.tmp 316 62F0.tmp 2036 633E.tmp 1252 638C.tmp 3196 63DA.tmp 3040 6477.tmp 4652 64E4.tmp 4576 6551.tmp 3572 659F.tmp 4124 660D.tmp 4680 668A.tmp 4132 6716.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 5028 3784 2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe 89 PID 3784 wrote to memory of 5028 3784 2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe 89 PID 3784 wrote to memory of 5028 3784 2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe 89 PID 5028 wrote to memory of 1200 5028 517B.tmp 90 PID 5028 wrote to memory of 1200 5028 517B.tmp 90 PID 5028 wrote to memory of 1200 5028 517B.tmp 90 PID 1200 wrote to memory of 2580 1200 51F8.tmp 91 PID 1200 wrote to memory of 2580 1200 51F8.tmp 91 PID 1200 wrote to memory of 2580 1200 51F8.tmp 91 PID 2580 wrote to memory of 2132 2580 5266.tmp 92 PID 2580 wrote to memory of 2132 2580 5266.tmp 92 PID 2580 wrote to memory of 2132 2580 5266.tmp 92 PID 2132 wrote to memory of 1708 2132 52D3.tmp 137 PID 2132 wrote to memory of 1708 2132 52D3.tmp 137 PID 2132 wrote to memory of 1708 2132 52D3.tmp 137 PID 1708 wrote to memory of 3644 1708 wmiprvse.exe 94 PID 1708 wrote to memory of 3644 1708 wmiprvse.exe 94 PID 1708 wrote to memory of 3644 1708 wmiprvse.exe 94 PID 3644 wrote to memory of 2220 3644 537F.tmp 95 PID 3644 wrote to memory of 2220 3644 537F.tmp 95 PID 3644 wrote to memory of 2220 3644 537F.tmp 95 PID 2220 wrote to memory of 1892 2220 53EC.tmp 96 PID 2220 wrote to memory of 1892 2220 53EC.tmp 96 PID 2220 wrote to memory of 1892 2220 53EC.tmp 96 PID 1892 wrote to memory of 4236 1892 543A.tmp 99 PID 1892 wrote to memory of 4236 1892 543A.tmp 99 PID 1892 wrote to memory of 4236 1892 543A.tmp 99 PID 4236 wrote to memory of 4936 4236 5488.tmp 98 PID 4236 wrote to memory of 4936 4236 5488.tmp 98 PID 4236 wrote to memory of 4936 4236 5488.tmp 98 PID 4936 wrote to memory of 1520 4936 54E6.tmp 97 PID 4936 wrote to memory of 1520 4936 54E6.tmp 97 PID 4936 wrote to memory of 1520 4936 54E6.tmp 97 PID 1520 wrote to memory of 3776 1520 5534.tmp 100 PID 1520 wrote to memory of 3776 1520 5534.tmp 100 PID 1520 wrote to memory of 3776 1520 5534.tmp 100 PID 3776 wrote to memory of 2036 3776 5592.tmp 147 PID 3776 wrote to memory of 2036 3776 5592.tmp 147 PID 3776 wrote to memory of 2036 3776 5592.tmp 147 PID 2036 wrote to memory of 3868 2036 633E.tmp 102 PID 2036 wrote to memory of 3868 2036 633E.tmp 102 PID 2036 wrote to memory of 3868 2036 633E.tmp 102 PID 3868 wrote to memory of 3196 3868 564E.tmp 149 PID 3868 wrote to memory of 3196 3868 564E.tmp 149 PID 3868 wrote to memory of 3196 3868 564E.tmp 149 PID 3196 wrote to memory of 2352 3196 63DA.tmp 103 PID 3196 wrote to memory of 2352 3196 63DA.tmp 103 PID 3196 wrote to memory of 2352 3196 63DA.tmp 103 PID 2352 wrote to memory of 2680 2352 56F9.tmp 105 PID 2352 wrote to memory of 2680 2352 56F9.tmp 105 PID 2352 wrote to memory of 2680 2352 56F9.tmp 105 PID 2680 wrote to memory of 3736 2680 5748.tmp 146 PID 2680 wrote to memory of 3736 2680 5748.tmp 146 PID 2680 wrote to memory of 3736 2680 5748.tmp 146 PID 3736 wrote to memory of 4744 3736 5796.tmp 106 PID 3736 wrote to memory of 4744 3736 5796.tmp 106 PID 3736 wrote to memory of 4744 3736 5796.tmp 106 PID 4744 wrote to memory of 2784 4744 57E4.tmp 107 PID 4744 wrote to memory of 2784 4744 57E4.tmp 107 PID 4744 wrote to memory of 2784 4744 57E4.tmp 107 PID 2784 wrote to memory of 1716 2784 5842.tmp 143 PID 2784 wrote to memory of 1716 2784 5842.tmp 143 PID 2784 wrote to memory of 1716 2784 5842.tmp 143 PID 1716 wrote to memory of 4688 1716 5890.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_9c6b6503742f45843719fc6382df13c9_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\517B.tmp"C:\Users\Admin\AppData\Local\Temp\517B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\51F8.tmp"C:\Users\Admin\AppData\Local\Temp\51F8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\52D3.tmp"C:\Users\Admin\AppData\Local\Temp\52D3.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\5331.tmp"C:\Users\Admin\AppData\Local\Temp\5331.tmp"6⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\537F.tmp"C:\Users\Admin\AppData\Local\Temp\537F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\5488.tmp"C:\Users\Admin\AppData\Local\Temp\5488.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5534.tmp"C:\Users\Admin\AppData\Local\Temp\5534.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\5592.tmp"C:\Users\Admin\AppData\Local\Temp\5592.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"3⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\564E.tmp"C:\Users\Admin\AppData\Local\Temp\564E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\569C.tmp"C:\Users\Admin\AppData\Local\Temp\569C.tmp"5⤵PID:3196
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\54E6.tmp"C:\Users\Admin\AppData\Local\Temp\54E6.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936
-
C:\Users\Admin\AppData\Local\Temp\56F9.tmp"C:\Users\Admin\AppData\Local\Temp\56F9.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\5748.tmp"C:\Users\Admin\AppData\Local\Temp\5748.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\5796.tmp"C:\Users\Admin\AppData\Local\Temp\5796.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\57E4.tmp"C:\Users\Admin\AppData\Local\Temp\57E4.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\5842.tmp"C:\Users\Admin\AppData\Local\Temp\5842.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\5890.tmp"C:\Users\Admin\AppData\Local\Temp\5890.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"1⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\598A.tmp"C:\Users\Admin\AppData\Local\Temp\598A.tmp"2⤵
- Executes dropped EXE
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\58DE.tmp"C:\Users\Admin\AppData\Local\Temp\58DE.tmp"1⤵
- Executes dropped EXE
PID:4688
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"1⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"C:\Users\Admin\AppData\Local\Temp\5B7E.tmp"1⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"2⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"3⤵
- Executes dropped EXE
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"1⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"2⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"3⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"4⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"5⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"6⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\5E6C.tmp"C:\Users\Admin\AppData\Local\Temp\5E6C.tmp"7⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"8⤵
- Executes dropped EXE
PID:2704
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5B30.tmp"C:\Users\Admin\AppData\Local\Temp\5B30.tmp"1⤵
- Executes dropped EXE
PID:4476
-
C:\Users\Admin\AppData\Local\Temp\5F08.tmp"C:\Users\Admin\AppData\Local\Temp\5F08.tmp"1⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\5F56.tmp"C:\Users\Admin\AppData\Local\Temp\5F56.tmp"2⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"C:\Users\Admin\AppData\Local\Temp\5FA4.tmp"3⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"C:\Users\Admin\AppData\Local\Temp\5FF2.tmp"4⤵
- Executes dropped EXE
PID:2908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6040.tmp"C:\Users\Admin\AppData\Local\Temp\6040.tmp"1⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\608F.tmp"C:\Users\Admin\AppData\Local\Temp\608F.tmp"2⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\60DD.tmp"C:\Users\Admin\AppData\Local\Temp\60DD.tmp"3⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\612B.tmp"C:\Users\Admin\AppData\Local\Temp\612B.tmp"4⤵
- Executes dropped EXE
PID:4388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6169.tmp"C:\Users\Admin\AppData\Local\Temp\6169.tmp"1⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"2⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\6206.tmp"C:\Users\Admin\AppData\Local\Temp\6206.tmp"3⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"4⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\62A2.tmp"C:\Users\Admin\AppData\Local\Temp\62A2.tmp"5⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\62F0.tmp"C:\Users\Admin\AppData\Local\Temp\62F0.tmp"6⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\638C.tmp"C:\Users\Admin\AppData\Local\Temp\638C.tmp"8⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\63DA.tmp"C:\Users\Admin\AppData\Local\Temp\63DA.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\6477.tmp"C:\Users\Admin\AppData\Local\Temp\6477.tmp"10⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\64E4.tmp"C:\Users\Admin\AppData\Local\Temp\64E4.tmp"11⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"12⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\659F.tmp"C:\Users\Admin\AppData\Local\Temp\659F.tmp"13⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\660D.tmp"C:\Users\Admin\AppData\Local\Temp\660D.tmp"14⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\668A.tmp"C:\Users\Admin\AppData\Local\Temp\668A.tmp"15⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\6716.tmp"C:\Users\Admin\AppData\Local\Temp\6716.tmp"16⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"17⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\67D2.tmp"C:\Users\Admin\AppData\Local\Temp\67D2.tmp"18⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\6830.tmp"C:\Users\Admin\AppData\Local\Temp\6830.tmp"19⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\68BC.tmp"C:\Users\Admin\AppData\Local\Temp\68BC.tmp"20⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\6939.tmp"C:\Users\Admin\AppData\Local\Temp\6939.tmp"21⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"22⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\69E5.tmp"C:\Users\Admin\AppData\Local\Temp\69E5.tmp"23⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"24⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\6A81.tmp"C:\Users\Admin\AppData\Local\Temp\6A81.tmp"25⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"26⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\6B1E.tmp"C:\Users\Admin\AppData\Local\Temp\6B1E.tmp"27⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"28⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"29⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\6C27.tmp"C:\Users\Admin\AppData\Local\Temp\6C27.tmp"30⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\6C75.tmp"C:\Users\Admin\AppData\Local\Temp\6C75.tmp"31⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"C:\Users\Admin\AppData\Local\Temp\6CD3.tmp"32⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\6D31.tmp"C:\Users\Admin\AppData\Local\Temp\6D31.tmp"33⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"34⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"35⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\6E2B.tmp"C:\Users\Admin\AppData\Local\Temp\6E2B.tmp"36⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"37⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"38⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\6F15.tmp"C:\Users\Admin\AppData\Local\Temp\6F15.tmp"39⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\6F63.tmp"C:\Users\Admin\AppData\Local\Temp\6F63.tmp"40⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"41⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\700F.tmp"C:\Users\Admin\AppData\Local\Temp\700F.tmp"42⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"43⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\70BB.tmp"C:\Users\Admin\AppData\Local\Temp\70BB.tmp"44⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\7119.tmp"C:\Users\Admin\AppData\Local\Temp\7119.tmp"45⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"46⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"47⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\7213.tmp"C:\Users\Admin\AppData\Local\Temp\7213.tmp"48⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"49⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\72AF.tmp"C:\Users\Admin\AppData\Local\Temp\72AF.tmp"50⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"51⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp"52⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\73A9.tmp"C:\Users\Admin\AppData\Local\Temp\73A9.tmp"53⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\7407.tmp"C:\Users\Admin\AppData\Local\Temp\7407.tmp"54⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\7465.tmp"C:\Users\Admin\AppData\Local\Temp\7465.tmp"55⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\74C2.tmp"C:\Users\Admin\AppData\Local\Temp\74C2.tmp"56⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\7511.tmp"C:\Users\Admin\AppData\Local\Temp\7511.tmp"57⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\755F.tmp"C:\Users\Admin\AppData\Local\Temp\755F.tmp"58⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\75AD.tmp"C:\Users\Admin\AppData\Local\Temp\75AD.tmp"59⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"60⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"61⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"62⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"63⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\7762.tmp"C:\Users\Admin\AppData\Local\Temp\7762.tmp"64⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\77B0.tmp"C:\Users\Admin\AppData\Local\Temp\77B0.tmp"65⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\77FF.tmp"C:\Users\Admin\AppData\Local\Temp\77FF.tmp"66⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\784D.tmp"C:\Users\Admin\AppData\Local\Temp\784D.tmp"67⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp"68⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\78E9.tmp"C:\Users\Admin\AppData\Local\Temp\78E9.tmp"69⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\7947.tmp"C:\Users\Admin\AppData\Local\Temp\7947.tmp"70⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\7995.tmp"C:\Users\Admin\AppData\Local\Temp\7995.tmp"71⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\79E3.tmp"C:\Users\Admin\AppData\Local\Temp\79E3.tmp"72⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\7A31.tmp"C:\Users\Admin\AppData\Local\Temp\7A31.tmp"73⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"74⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"75⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"76⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"77⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"78⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\7C15.tmp"C:\Users\Admin\AppData\Local\Temp\7C15.tmp"79⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"80⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"81⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"82⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\7D6D.tmp"C:\Users\Admin\AppData\Local\Temp\7D6D.tmp"83⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"84⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"85⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\7E67.tmp"C:\Users\Admin\AppData\Local\Temp\7E67.tmp"86⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"87⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\7F03.tmp"C:\Users\Admin\AppData\Local\Temp\7F03.tmp"88⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\7F61.tmp"C:\Users\Admin\AppData\Local\Temp\7F61.tmp"89⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"90⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"91⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"92⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\80A9.tmp"C:\Users\Admin\AppData\Local\Temp\80A9.tmp"93⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"94⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\8146.tmp"C:\Users\Admin\AppData\Local\Temp\8146.tmp"95⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\8194.tmp"C:\Users\Admin\AppData\Local\Temp\8194.tmp"96⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"97⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"98⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\829D.tmp"C:\Users\Admin\AppData\Local\Temp\829D.tmp"99⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\82EB.tmp"C:\Users\Admin\AppData\Local\Temp\82EB.tmp"100⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"101⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\8388.tmp"C:\Users\Admin\AppData\Local\Temp\8388.tmp"102⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"103⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\8424.tmp"C:\Users\Admin\AppData\Local\Temp\8424.tmp"104⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\8472.tmp"C:\Users\Admin\AppData\Local\Temp\8472.tmp"105⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\84C0.tmp"C:\Users\Admin\AppData\Local\Temp\84C0.tmp"106⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\851E.tmp"C:\Users\Admin\AppData\Local\Temp\851E.tmp"107⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"108⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\85BA.tmp"C:\Users\Admin\AppData\Local\Temp\85BA.tmp"109⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"110⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\8666.tmp"C:\Users\Admin\AppData\Local\Temp\8666.tmp"111⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"112⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\8702.tmp"C:\Users\Admin\AppData\Local\Temp\8702.tmp"113⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\8750.tmp"C:\Users\Admin\AppData\Local\Temp\8750.tmp"114⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\879F.tmp"C:\Users\Admin\AppData\Local\Temp\879F.tmp"115⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\87ED.tmp"C:\Users\Admin\AppData\Local\Temp\87ED.tmp"116⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\884A.tmp"C:\Users\Admin\AppData\Local\Temp\884A.tmp"117⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\8899.tmp"C:\Users\Admin\AppData\Local\Temp\8899.tmp"118⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\88E7.tmp"C:\Users\Admin\AppData\Local\Temp\88E7.tmp"119⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"120⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\89A2.tmp"C:\Users\Admin\AppData\Local\Temp\89A2.tmp"121⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"122⤵PID:4304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-