Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 03:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe
-
Size
486KB
-
MD5
181ca228a8b41394928b3e57d9e99869
-
SHA1
6db68715771d08aa176794f18fce27553d496503
-
SHA256
f6641f31588c9b6be39e3d50cdc2c195b1771affcc642142921439e32c1d43ce
-
SHA512
ebe6dae615c6153e1bca97da3d8d1d9f6e0c165f8e12520614de99fb980a79a50ee3a268e765948367bdaf23c8a8322fc39ac83b1b5eebd0ff70865ac9958d3a
-
SSDEEP
12288:/U5rCOTeiD92BnP/CylNFVOhVCaaQOvN4B3NZ:/UQOJD92pCyl7VOzCaXB3N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3328 3FD8.tmp 2672 4055.tmp 392 40B2.tmp 3652 4100.tmp 2280 414F.tmp 1524 419D.tmp 1316 41EB.tmp 3952 4239.tmp 2288 42B6.tmp 1040 4304.tmp 3320 4352.tmp 1916 43B0.tmp 2668 440E.tmp 3984 445C.tmp 2196 44BA.tmp 840 4517.tmp 752 4565.tmp 380 45B4.tmp 428 4602.tmp 1740 465F.tmp 2332 46AE.tmp 4876 46FC.tmp 3640 474A.tmp 3524 47A8.tmp 764 47F6.tmp 1008 4853.tmp 1344 48B1.tmp 3668 490F.tmp 4500 496D.tmp 1048 49BB.tmp 3664 4A19.tmp 4732 4A67.tmp 1836 4AB5.tmp 2116 4B03.tmp 2096 4B51.tmp 3028 4B9F.tmp 2064 4BED.tmp 5116 4C3B.tmp 4476 4C99.tmp 560 4CF7.tmp 4056 4D45.tmp 1924 4D93.tmp 972 4DE1.tmp 4788 4E2F.tmp 4848 4E7E.tmp 5060 4EBC.tmp 4708 4F0A.tmp 4888 4F58.tmp 680 4FE5.tmp 720 5052.tmp 3152 50CF.tmp 2936 514C.tmp 1100 51E9.tmp 1692 5266.tmp 2404 52F2.tmp 3504 5350.tmp 2500 539E.tmp 4908 53FC.tmp 2520 545A.tmp 1384 54B7.tmp 1668 5515.tmp 5004 5573.tmp 4148 55C1.tmp 1348 561F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3328 2316 2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe 86 PID 2316 wrote to memory of 3328 2316 2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe 86 PID 2316 wrote to memory of 3328 2316 2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe 86 PID 3328 wrote to memory of 2672 3328 3FD8.tmp 88 PID 3328 wrote to memory of 2672 3328 3FD8.tmp 88 PID 3328 wrote to memory of 2672 3328 3FD8.tmp 88 PID 2672 wrote to memory of 392 2672 4055.tmp 90 PID 2672 wrote to memory of 392 2672 4055.tmp 90 PID 2672 wrote to memory of 392 2672 4055.tmp 90 PID 392 wrote to memory of 3652 392 40B2.tmp 91 PID 392 wrote to memory of 3652 392 40B2.tmp 91 PID 392 wrote to memory of 3652 392 40B2.tmp 91 PID 3652 wrote to memory of 2280 3652 4100.tmp 92 PID 3652 wrote to memory of 2280 3652 4100.tmp 92 PID 3652 wrote to memory of 2280 3652 4100.tmp 92 PID 2280 wrote to memory of 1524 2280 414F.tmp 93 PID 2280 wrote to memory of 1524 2280 414F.tmp 93 PID 2280 wrote to memory of 1524 2280 414F.tmp 93 PID 1524 wrote to memory of 1316 1524 419D.tmp 94 PID 1524 wrote to memory of 1316 1524 419D.tmp 94 PID 1524 wrote to memory of 1316 1524 419D.tmp 94 PID 1316 wrote to memory of 3952 1316 41EB.tmp 95 PID 1316 wrote to memory of 3952 1316 41EB.tmp 95 PID 1316 wrote to memory of 3952 1316 41EB.tmp 95 PID 3952 wrote to memory of 2288 3952 4239.tmp 97 PID 3952 wrote to memory of 2288 3952 4239.tmp 97 PID 3952 wrote to memory of 2288 3952 4239.tmp 97 PID 2288 wrote to memory of 1040 2288 42B6.tmp 96 PID 2288 wrote to memory of 1040 2288 42B6.tmp 96 PID 2288 wrote to memory of 1040 2288 42B6.tmp 96 PID 1040 wrote to memory of 3320 1040 4304.tmp 98 PID 1040 wrote to memory of 3320 1040 4304.tmp 98 PID 1040 wrote to memory of 3320 1040 4304.tmp 98 PID 3320 wrote to memory of 1916 3320 4352.tmp 99 PID 3320 wrote to memory of 1916 3320 4352.tmp 99 PID 3320 wrote to memory of 1916 3320 4352.tmp 99 PID 1916 wrote to memory of 2668 1916 43B0.tmp 100 PID 1916 wrote to memory of 2668 1916 43B0.tmp 100 PID 1916 wrote to memory of 2668 1916 43B0.tmp 100 PID 2668 wrote to memory of 3984 2668 440E.tmp 101 PID 2668 wrote to memory of 3984 2668 440E.tmp 101 PID 2668 wrote to memory of 3984 2668 440E.tmp 101 PID 3984 wrote to memory of 2196 3984 445C.tmp 110 PID 3984 wrote to memory of 2196 3984 445C.tmp 110 PID 3984 wrote to memory of 2196 3984 445C.tmp 110 PID 2196 wrote to memory of 840 2196 44BA.tmp 102 PID 2196 wrote to memory of 840 2196 44BA.tmp 102 PID 2196 wrote to memory of 840 2196 44BA.tmp 102 PID 840 wrote to memory of 752 840 4517.tmp 107 PID 840 wrote to memory of 752 840 4517.tmp 107 PID 840 wrote to memory of 752 840 4517.tmp 107 PID 752 wrote to memory of 380 752 4565.tmp 103 PID 752 wrote to memory of 380 752 4565.tmp 103 PID 752 wrote to memory of 380 752 4565.tmp 103 PID 380 wrote to memory of 428 380 45B4.tmp 104 PID 380 wrote to memory of 428 380 45B4.tmp 104 PID 380 wrote to memory of 428 380 45B4.tmp 104 PID 428 wrote to memory of 1740 428 4602.tmp 106 PID 428 wrote to memory of 1740 428 4602.tmp 106 PID 428 wrote to memory of 1740 428 4602.tmp 106 PID 1740 wrote to memory of 2332 1740 465F.tmp 105 PID 1740 wrote to memory of 2332 1740 465F.tmp 105 PID 1740 wrote to memory of 2332 1740 465F.tmp 105 PID 2332 wrote to memory of 4876 2332 46AE.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_181ca228a8b41394928b3e57d9e99869_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"C:\Users\Admin\AppData\Local\Temp\3FD8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\4055.tmp"C:\Users\Admin\AppData\Local\Temp\4055.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\40B2.tmp"C:\Users\Admin\AppData\Local\Temp\40B2.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\4100.tmp"C:\Users\Admin\AppData\Local\Temp\4100.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\414F.tmp"C:\Users\Admin\AppData\Local\Temp\414F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\419D.tmp"C:\Users\Admin\AppData\Local\Temp\419D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\41EB.tmp"C:\Users\Admin\AppData\Local\Temp\41EB.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\4239.tmp"C:\Users\Admin\AppData\Local\Temp\4239.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\42B6.tmp"C:\Users\Admin\AppData\Local\Temp\42B6.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4304.tmp"C:\Users\Admin\AppData\Local\Temp\4304.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\4352.tmp"C:\Users\Admin\AppData\Local\Temp\4352.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\43B0.tmp"C:\Users\Admin\AppData\Local\Temp\43B0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\440E.tmp"C:\Users\Admin\AppData\Local\Temp\440E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\445C.tmp"C:\Users\Admin\AppData\Local\Temp\445C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\44BA.tmp"C:\Users\Admin\AppData\Local\Temp\44BA.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4517.tmp"C:\Users\Admin\AppData\Local\Temp\4517.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\4565.tmp"C:\Users\Admin\AppData\Local\Temp\4565.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\45B4.tmp"C:\Users\Admin\AppData\Local\Temp\45B4.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\4602.tmp"C:\Users\Admin\AppData\Local\Temp\4602.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\465F.tmp"C:\Users\Admin\AppData\Local\Temp\465F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\46AE.tmp"C:\Users\Admin\AppData\Local\Temp\46AE.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\46FC.tmp"C:\Users\Admin\AppData\Local\Temp\46FC.tmp"2⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\474A.tmp"C:\Users\Admin\AppData\Local\Temp\474A.tmp"3⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\47A8.tmp"C:\Users\Admin\AppData\Local\Temp\47A8.tmp"4⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\47F6.tmp"C:\Users\Admin\AppData\Local\Temp\47F6.tmp"5⤵
- Executes dropped EXE
PID:764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4853.tmp"C:\Users\Admin\AppData\Local\Temp\4853.tmp"1⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\48B1.tmp"C:\Users\Admin\AppData\Local\Temp\48B1.tmp"2⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\490F.tmp"C:\Users\Admin\AppData\Local\Temp\490F.tmp"3⤵
- Executes dropped EXE
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\496D.tmp"C:\Users\Admin\AppData\Local\Temp\496D.tmp"1⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\49BB.tmp"C:\Users\Admin\AppData\Local\Temp\49BB.tmp"2⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\4A19.tmp"C:\Users\Admin\AppData\Local\Temp\4A19.tmp"3⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\4A67.tmp"C:\Users\Admin\AppData\Local\Temp\4A67.tmp"4⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"C:\Users\Admin\AppData\Local\Temp\4AB5.tmp"5⤵
- Executes dropped EXE
PID:1836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B03.tmp"C:\Users\Admin\AppData\Local\Temp\4B03.tmp"1⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\4B51.tmp"C:\Users\Admin\AppData\Local\Temp\4B51.tmp"2⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\4B9F.tmp"C:\Users\Admin\AppData\Local\Temp\4B9F.tmp"3⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\4BED.tmp"C:\Users\Admin\AppData\Local\Temp\4BED.tmp"4⤵
- Executes dropped EXE
PID:2064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"C:\Users\Admin\AppData\Local\Temp\4C3B.tmp"1⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\4C99.tmp"C:\Users\Admin\AppData\Local\Temp\4C99.tmp"2⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"C:\Users\Admin\AppData\Local\Temp\4CF7.tmp"3⤵
- Executes dropped EXE
PID:560
-
-
-
C:\Users\Admin\AppData\Local\Temp\4D45.tmp"C:\Users\Admin\AppData\Local\Temp\4D45.tmp"1⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\4D93.tmp"C:\Users\Admin\AppData\Local\Temp\4D93.tmp"2⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"C:\Users\Admin\AppData\Local\Temp\4DE1.tmp"3⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"C:\Users\Admin\AppData\Local\Temp\4E2F.tmp"4⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"5⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"6⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"7⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"8⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\4FE5.tmp"C:\Users\Admin\AppData\Local\Temp\4FE5.tmp"9⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"10⤵
- Executes dropped EXE
PID:720 -
C:\Users\Admin\AppData\Local\Temp\50CF.tmp"C:\Users\Admin\AppData\Local\Temp\50CF.tmp"11⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\514C.tmp"C:\Users\Admin\AppData\Local\Temp\514C.tmp"12⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"13⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"14⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\52F2.tmp"C:\Users\Admin\AppData\Local\Temp\52F2.tmp"15⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\5350.tmp"C:\Users\Admin\AppData\Local\Temp\5350.tmp"16⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\539E.tmp"C:\Users\Admin\AppData\Local\Temp\539E.tmp"17⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\53FC.tmp"C:\Users\Admin\AppData\Local\Temp\53FC.tmp"18⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\545A.tmp"C:\Users\Admin\AppData\Local\Temp\545A.tmp"19⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\54B7.tmp"C:\Users\Admin\AppData\Local\Temp\54B7.tmp"20⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\5515.tmp"C:\Users\Admin\AppData\Local\Temp\5515.tmp"21⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\5573.tmp"C:\Users\Admin\AppData\Local\Temp\5573.tmp"22⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\55C1.tmp"C:\Users\Admin\AppData\Local\Temp\55C1.tmp"23⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\561F.tmp"C:\Users\Admin\AppData\Local\Temp\561F.tmp"24⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\567C.tmp"C:\Users\Admin\AppData\Local\Temp\567C.tmp"25⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\56DA.tmp"C:\Users\Admin\AppData\Local\Temp\56DA.tmp"26⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"27⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"28⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"29⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"30⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"31⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\590D.tmp"C:\Users\Admin\AppData\Local\Temp\590D.tmp"32⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\596A.tmp"C:\Users\Admin\AppData\Local\Temp\596A.tmp"33⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\59C8.tmp"C:\Users\Admin\AppData\Local\Temp\59C8.tmp"34⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\5A26.tmp"C:\Users\Admin\AppData\Local\Temp\5A26.tmp"35⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\5A84.tmp"C:\Users\Admin\AppData\Local\Temp\5A84.tmp"36⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp"37⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"38⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"39⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"40⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"41⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"42⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\5CF5.tmp"C:\Users\Admin\AppData\Local\Temp\5CF5.tmp"43⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\5D52.tmp"C:\Users\Admin\AppData\Local\Temp\5D52.tmp"44⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\5DA1.tmp"C:\Users\Admin\AppData\Local\Temp\5DA1.tmp"45⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\5DFE.tmp"C:\Users\Admin\AppData\Local\Temp\5DFE.tmp"46⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"47⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"48⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\5EF8.tmp"C:\Users\Admin\AppData\Local\Temp\5EF8.tmp"49⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\5F56.tmp"C:\Users\Admin\AppData\Local\Temp\5F56.tmp"50⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\5FB4.tmp"C:\Users\Admin\AppData\Local\Temp\5FB4.tmp"51⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\6012.tmp"C:\Users\Admin\AppData\Local\Temp\6012.tmp"52⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\6060.tmp"C:\Users\Admin\AppData\Local\Temp\6060.tmp"53⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"54⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"55⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\6179.tmp"C:\Users\Admin\AppData\Local\Temp\6179.tmp"56⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\61D7.tmp"C:\Users\Admin\AppData\Local\Temp\61D7.tmp"57⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"58⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\6283.tmp"C:\Users\Admin\AppData\Local\Temp\6283.tmp"59⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\62E0.tmp"C:\Users\Admin\AppData\Local\Temp\62E0.tmp"60⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\633E.tmp"C:\Users\Admin\AppData\Local\Temp\633E.tmp"61⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\638C.tmp"C:\Users\Admin\AppData\Local\Temp\638C.tmp"62⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\63DA.tmp"C:\Users\Admin\AppData\Local\Temp\63DA.tmp"63⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\6438.tmp"C:\Users\Admin\AppData\Local\Temp\6438.tmp"64⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6486.tmp"C:\Users\Admin\AppData\Local\Temp\6486.tmp"65⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\64D4.tmp"C:\Users\Admin\AppData\Local\Temp\64D4.tmp"66⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\6522.tmp"C:\Users\Admin\AppData\Local\Temp\6522.tmp"67⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\6580.tmp"C:\Users\Admin\AppData\Local\Temp\6580.tmp"68⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\65CE.tmp"C:\Users\Admin\AppData\Local\Temp\65CE.tmp"69⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\661C.tmp"C:\Users\Admin\AppData\Local\Temp\661C.tmp"70⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"71⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\66B9.tmp"C:\Users\Admin\AppData\Local\Temp\66B9.tmp"72⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\6707.tmp"C:\Users\Admin\AppData\Local\Temp\6707.tmp"73⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\6755.tmp"C:\Users\Admin\AppData\Local\Temp\6755.tmp"74⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\67B3.tmp"C:\Users\Admin\AppData\Local\Temp\67B3.tmp"75⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"76⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\686E.tmp"C:\Users\Admin\AppData\Local\Temp\686E.tmp"77⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\68BC.tmp"C:\Users\Admin\AppData\Local\Temp\68BC.tmp"78⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\691A.tmp"C:\Users\Admin\AppData\Local\Temp\691A.tmp"79⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\6978.tmp"C:\Users\Admin\AppData\Local\Temp\6978.tmp"80⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\69D6.tmp"C:\Users\Admin\AppData\Local\Temp\69D6.tmp"81⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"82⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\6A91.tmp"C:\Users\Admin\AppData\Local\Temp\6A91.tmp"83⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"84⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"85⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"86⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"87⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\6C37.tmp"C:\Users\Admin\AppData\Local\Temp\6C37.tmp"88⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\6C85.tmp"C:\Users\Admin\AppData\Local\Temp\6C85.tmp"89⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"90⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\6D31.tmp"C:\Users\Admin\AppData\Local\Temp\6D31.tmp"91⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"92⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"93⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"94⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\6E69.tmp"C:\Users\Admin\AppData\Local\Temp\6E69.tmp"95⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"96⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\6F06.tmp"C:\Users\Admin\AppData\Local\Temp\6F06.tmp"97⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\6F54.tmp"C:\Users\Admin\AppData\Local\Temp\6F54.tmp"98⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"C:\Users\Admin\AppData\Local\Temp\6FB2.tmp"99⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\7000.tmp"C:\Users\Admin\AppData\Local\Temp\7000.tmp"100⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"101⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"102⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\70FA.tmp"C:\Users\Admin\AppData\Local\Temp\70FA.tmp"103⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\7148.tmp"C:\Users\Admin\AppData\Local\Temp\7148.tmp"104⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\71A6.tmp"C:\Users\Admin\AppData\Local\Temp\71A6.tmp"105⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\71F4.tmp"C:\Users\Admin\AppData\Local\Temp\71F4.tmp"106⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\7242.tmp"C:\Users\Admin\AppData\Local\Temp\7242.tmp"107⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\7290.tmp"C:\Users\Admin\AppData\Local\Temp\7290.tmp"108⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\72EE.tmp"C:\Users\Admin\AppData\Local\Temp\72EE.tmp"109⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\733C.tmp"C:\Users\Admin\AppData\Local\Temp\733C.tmp"110⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"111⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\73D8.tmp"C:\Users\Admin\AppData\Local\Temp\73D8.tmp"112⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\7426.tmp"C:\Users\Admin\AppData\Local\Temp\7426.tmp"113⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"114⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"115⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"116⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"117⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"118⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\7649.tmp"C:\Users\Admin\AppData\Local\Temp\7649.tmp"119⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\7697.tmp"C:\Users\Admin\AppData\Local\Temp\7697.tmp"120⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\76E5.tmp"C:\Users\Admin\AppData\Local\Temp\76E5.tmp"121⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\7733.tmp"C:\Users\Admin\AppData\Local\Temp\7733.tmp"122⤵PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-