Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 18:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe
-
Size
487KB
-
MD5
c88d94991973797322d6c2f7c89e6eff
-
SHA1
1f7e7205e559ed52f8d8c090547155ca35db156b
-
SHA256
64d5304bc57cd8955827944203c3826859bb4741bc5c0a78b51082e300b27146
-
SHA512
64d87d8d02b89b1c9469864a115ea350fdfd55c5e47599b7b9dfae0383b24a59d053064dae8c03e62d4c10c26a95ff49c65defb978763c8532ce351b32d01947
-
SSDEEP
6144:qorf3lPvovsgZnqG2C7mOTeiL9DUKfzQ+fxiPp8lMMPOTrRAHi1kujpu+V6QsH3j:HU5rCOTeiJT3Uh8lMU2Roi17l85NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1944 D78.tmp 2144 DC6.tmp 3064 E24.tmp 3028 E62.tmp 2548 EDF.tmp 2644 F1E.tmp 2880 F5C.tmp 3048 F9A.tmp 2520 FD9.tmp 2588 1017.tmp 2432 1056.tmp 1896 10A4.tmp 2364 10E2.tmp 1800 1120.tmp 2760 115F.tmp 2000 119D.tmp 1652 120A.tmp 1184 1249.tmp 2480 2221.tmp 2460 1304.tmp 2776 1342.tmp 752 231A.tmp 1752 13DE.tmp 2936 141D.tmp 2820 145B.tmp 1688 14A9.tmp 1404 14F7.tmp 1492 1545.tmp 2268 1584.tmp 1716 15C2.tmp 560 25F8.tmp 1460 2636.tmp 912 167D.tmp 2064 16BC.tmp 2296 16FA.tmp 1444 1738.tmp 452 1777.tmp 1992 17B5.tmp 2216 17F4.tmp 1928 1832.tmp 1348 1870.tmp 1584 18AF.tmp 1608 18ED.tmp 2236 192C.tmp 1988 2952.tmp 968 19A8.tmp 2040 29CE.tmp 2916 1A25.tmp 2328 2A4B.tmp 2312 2A8A.tmp 1784 2AC8.tmp 2300 2B06.tmp 1692 1B5D.tmp 1528 2B83.tmp 1392 2BC2.tmp 1596 2C00.tmp 1696 2C3E.tmp 2036 2C7D.tmp 2164 2CBB.tmp 2512 2CFA.tmp 2560 1D41.tmp 2376 2D76.tmp 2524 2DB5.tmp 2716 2DF3.tmp -
Loads dropped DLL 64 IoCs
pid Process 1684 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 1944 D78.tmp 2144 DC6.tmp 3064 E24.tmp 3028 E62.tmp 2548 EDF.tmp 2644 F1E.tmp 2880 F5C.tmp 3048 F9A.tmp 2520 FD9.tmp 2588 1017.tmp 2432 1056.tmp 1896 10A4.tmp 2364 10E2.tmp 1800 1120.tmp 2760 115F.tmp 2000 119D.tmp 1652 120A.tmp 1184 1249.tmp 2480 2221.tmp 2460 1304.tmp 2776 1342.tmp 752 231A.tmp 1752 13DE.tmp 2936 141D.tmp 2820 145B.tmp 1688 14A9.tmp 1404 14F7.tmp 1492 1545.tmp 2268 1584.tmp 1716 15C2.tmp 560 25F8.tmp 1460 2636.tmp 912 167D.tmp 2064 16BC.tmp 2296 16FA.tmp 1444 1738.tmp 452 1777.tmp 1992 17B5.tmp 2216 17F4.tmp 1928 1832.tmp 1348 1870.tmp 1584 18AF.tmp 1608 18ED.tmp 2236 192C.tmp 1988 2952.tmp 968 19A8.tmp 2040 29CE.tmp 2916 1A25.tmp 2328 2A4B.tmp 2312 2A8A.tmp 1784 2AC8.tmp 2300 2B06.tmp 1692 1B5D.tmp 1528 2B83.tmp 1392 2BC2.tmp 1596 2C00.tmp 1696 2C3E.tmp 2036 2C7D.tmp 2164 2CBB.tmp 2512 2CFA.tmp 2560 1D41.tmp 2376 2D76.tmp 2524 2DB5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1944 1684 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 28 PID 1684 wrote to memory of 1944 1684 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 28 PID 1684 wrote to memory of 1944 1684 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 28 PID 1684 wrote to memory of 1944 1684 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 28 PID 1944 wrote to memory of 2144 1944 D78.tmp 29 PID 1944 wrote to memory of 2144 1944 D78.tmp 29 PID 1944 wrote to memory of 2144 1944 D78.tmp 29 PID 1944 wrote to memory of 2144 1944 D78.tmp 29 PID 2144 wrote to memory of 3064 2144 DC6.tmp 30 PID 2144 wrote to memory of 3064 2144 DC6.tmp 30 PID 2144 wrote to memory of 3064 2144 DC6.tmp 30 PID 2144 wrote to memory of 3064 2144 DC6.tmp 30 PID 3064 wrote to memory of 3028 3064 E24.tmp 31 PID 3064 wrote to memory of 3028 3064 E24.tmp 31 PID 3064 wrote to memory of 3028 3064 E24.tmp 31 PID 3064 wrote to memory of 3028 3064 E24.tmp 31 PID 3028 wrote to memory of 2548 3028 E62.tmp 32 PID 3028 wrote to memory of 2548 3028 E62.tmp 32 PID 3028 wrote to memory of 2548 3028 E62.tmp 32 PID 3028 wrote to memory of 2548 3028 E62.tmp 32 PID 2548 wrote to memory of 2644 2548 EDF.tmp 112 PID 2548 wrote to memory of 2644 2548 EDF.tmp 112 PID 2548 wrote to memory of 2644 2548 EDF.tmp 112 PID 2548 wrote to memory of 2644 2548 EDF.tmp 112 PID 2644 wrote to memory of 2880 2644 F1E.tmp 111 PID 2644 wrote to memory of 2880 2644 F1E.tmp 111 PID 2644 wrote to memory of 2880 2644 F1E.tmp 111 PID 2644 wrote to memory of 2880 2644 F1E.tmp 111 PID 2880 wrote to memory of 3048 2880 F5C.tmp 109 PID 2880 wrote to memory of 3048 2880 F5C.tmp 109 PID 2880 wrote to memory of 3048 2880 F5C.tmp 109 PID 2880 wrote to memory of 3048 2880 F5C.tmp 109 PID 3048 wrote to memory of 2520 3048 F9A.tmp 107 PID 3048 wrote to memory of 2520 3048 F9A.tmp 107 PID 3048 wrote to memory of 2520 3048 F9A.tmp 107 PID 3048 wrote to memory of 2520 3048 F9A.tmp 107 PID 2520 wrote to memory of 2588 2520 FD9.tmp 105 PID 2520 wrote to memory of 2588 2520 FD9.tmp 105 PID 2520 wrote to memory of 2588 2520 FD9.tmp 105 PID 2520 wrote to memory of 2588 2520 FD9.tmp 105 PID 2588 wrote to memory of 2432 2588 1017.tmp 33 PID 2588 wrote to memory of 2432 2588 1017.tmp 33 PID 2588 wrote to memory of 2432 2588 1017.tmp 33 PID 2588 wrote to memory of 2432 2588 1017.tmp 33 PID 2432 wrote to memory of 1896 2432 1056.tmp 104 PID 2432 wrote to memory of 1896 2432 1056.tmp 104 PID 2432 wrote to memory of 1896 2432 1056.tmp 104 PID 2432 wrote to memory of 1896 2432 1056.tmp 104 PID 1896 wrote to memory of 2364 1896 10A4.tmp 102 PID 1896 wrote to memory of 2364 1896 10A4.tmp 102 PID 1896 wrote to memory of 2364 1896 10A4.tmp 102 PID 1896 wrote to memory of 2364 1896 10A4.tmp 102 PID 2364 wrote to memory of 1800 2364 10E2.tmp 101 PID 2364 wrote to memory of 1800 2364 10E2.tmp 101 PID 2364 wrote to memory of 1800 2364 10E2.tmp 101 PID 2364 wrote to memory of 1800 2364 10E2.tmp 101 PID 1800 wrote to memory of 2760 1800 1120.tmp 98 PID 1800 wrote to memory of 2760 1800 1120.tmp 98 PID 1800 wrote to memory of 2760 1800 1120.tmp 98 PID 1800 wrote to memory of 2760 1800 1120.tmp 98 PID 2760 wrote to memory of 2000 2760 115F.tmp 95 PID 2760 wrote to memory of 2000 2760 115F.tmp 95 PID 2760 wrote to memory of 2000 2760 115F.tmp 95 PID 2760 wrote to memory of 2000 2760 115F.tmp 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\E24.tmp"C:\Users\Admin\AppData\Local\Temp\E24.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\E62.tmp"C:\Users\Admin\AppData\Local\Temp\E62.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\EDF.tmp"C:\Users\Admin\AppData\Local\Temp\EDF.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4FE4.tmp"C:\Users\Admin\AppData\Local\Temp\4FE4.tmp"2⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp"3⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\5061.tmp"C:\Users\Admin\AppData\Local\Temp\5061.tmp"4⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"5⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\50DE.tmp"C:\Users\Admin\AppData\Local\Temp\50DE.tmp"6⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\511C.tmp"C:\Users\Admin\AppData\Local\Temp\511C.tmp"7⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\515B.tmp"C:\Users\Admin\AppData\Local\Temp\515B.tmp"8⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\5199.tmp"C:\Users\Admin\AppData\Local\Temp\5199.tmp"9⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\51D8.tmp"C:\Users\Admin\AppData\Local\Temp\51D8.tmp"10⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\5216.tmp"C:\Users\Admin\AppData\Local\Temp\5216.tmp"11⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\5254.tmp"C:\Users\Admin\AppData\Local\Temp\5254.tmp"12⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\5293.tmp"C:\Users\Admin\AppData\Local\Temp\5293.tmp"13⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\52D1.tmp"C:\Users\Admin\AppData\Local\Temp\52D1.tmp"14⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp"15⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\534E.tmp"C:\Users\Admin\AppData\Local\Temp\534E.tmp"16⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\538C.tmp"C:\Users\Admin\AppData\Local\Temp\538C.tmp"17⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\53CB.tmp"C:\Users\Admin\AppData\Local\Temp\53CB.tmp"18⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\5409.tmp"C:\Users\Admin\AppData\Local\Temp\5409.tmp"19⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\5448.tmp"C:\Users\Admin\AppData\Local\Temp\5448.tmp"20⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\5486.tmp"C:\Users\Admin\AppData\Local\Temp\5486.tmp"21⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\54C4.tmp"C:\Users\Admin\AppData\Local\Temp\54C4.tmp"22⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\5512.tmp"C:\Users\Admin\AppData\Local\Temp\5512.tmp"23⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\5560.tmp"C:\Users\Admin\AppData\Local\Temp\5560.tmp"24⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\559F.tmp"C:\Users\Admin\AppData\Local\Temp\559F.tmp"25⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\55DD.tmp"C:\Users\Admin\AppData\Local\Temp\55DD.tmp"26⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\561C.tmp"C:\Users\Admin\AppData\Local\Temp\561C.tmp"27⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\565A.tmp"C:\Users\Admin\AppData\Local\Temp\565A.tmp"28⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\5698.tmp"C:\Users\Admin\AppData\Local\Temp\5698.tmp"29⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\56D7.tmp"C:\Users\Admin\AppData\Local\Temp\56D7.tmp"30⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\5715.tmp"C:\Users\Admin\AppData\Local\Temp\5715.tmp"31⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\5754.tmp"C:\Users\Admin\AppData\Local\Temp\5754.tmp"32⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\5792.tmp"C:\Users\Admin\AppData\Local\Temp\5792.tmp"33⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\57D0.tmp"C:\Users\Admin\AppData\Local\Temp\57D0.tmp"34⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\580F.tmp"C:\Users\Admin\AppData\Local\Temp\580F.tmp"35⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\586C.tmp"C:\Users\Admin\AppData\Local\Temp\586C.tmp"36⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"37⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\58F9.tmp"C:\Users\Admin\AppData\Local\Temp\58F9.tmp"38⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"39⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\5976.tmp"C:\Users\Admin\AppData\Local\Temp\5976.tmp"40⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\59C4.tmp"C:\Users\Admin\AppData\Local\Temp\59C4.tmp"41⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"42⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\5A50.tmp"C:\Users\Admin\AppData\Local\Temp\5A50.tmp"43⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\5A8E.tmp"C:\Users\Admin\AppData\Local\Temp\5A8E.tmp"44⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"45⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"46⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\5B88.tmp"C:\Users\Admin\AppData\Local\Temp\5B88.tmp"47⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\5BF5.tmp"C:\Users\Admin\AppData\Local\Temp\5BF5.tmp"48⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\5C43.tmp"C:\Users\Admin\AppData\Local\Temp\5C43.tmp"49⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\5CB0.tmp"C:\Users\Admin\AppData\Local\Temp\5CB0.tmp"50⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\5D2D.tmp"C:\Users\Admin\AppData\Local\Temp\5D2D.tmp"51⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\5D7B.tmp"C:\Users\Admin\AppData\Local\Temp\5D7B.tmp"52⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\5DC9.tmp"C:\Users\Admin\AppData\Local\Temp\5DC9.tmp"53⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\5E36.tmp"C:\Users\Admin\AppData\Local\Temp\5E36.tmp"54⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\5EB3.tmp"C:\Users\Admin\AppData\Local\Temp\5EB3.tmp"55⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\5F01.tmp"C:\Users\Admin\AppData\Local\Temp\5F01.tmp"56⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\5F4F.tmp"C:\Users\Admin\AppData\Local\Temp\5F4F.tmp"57⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\5F8E.tmp"C:\Users\Admin\AppData\Local\Temp\5F8E.tmp"58⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\5FCC.tmp"C:\Users\Admin\AppData\Local\Temp\5FCC.tmp"59⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\600A.tmp"C:\Users\Admin\AppData\Local\Temp\600A.tmp"60⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\6049.tmp"C:\Users\Admin\AppData\Local\Temp\6049.tmp"61⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\6087.tmp"C:\Users\Admin\AppData\Local\Temp\6087.tmp"62⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\60D5.tmp"C:\Users\Admin\AppData\Local\Temp\60D5.tmp"63⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\6114.tmp"C:\Users\Admin\AppData\Local\Temp\6114.tmp"64⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\6152.tmp"C:\Users\Admin\AppData\Local\Temp\6152.tmp"65⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\6190.tmp"C:\Users\Admin\AppData\Local\Temp\6190.tmp"66⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\61CF.tmp"C:\Users\Admin\AppData\Local\Temp\61CF.tmp"67⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\620D.tmp"C:\Users\Admin\AppData\Local\Temp\620D.tmp"68⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\624C.tmp"C:\Users\Admin\AppData\Local\Temp\624C.tmp"69⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\629A.tmp"C:\Users\Admin\AppData\Local\Temp\629A.tmp"70⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\62D8.tmp"C:\Users\Admin\AppData\Local\Temp\62D8.tmp"71⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\6316.tmp"C:\Users\Admin\AppData\Local\Temp\6316.tmp"72⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\6355.tmp"C:\Users\Admin\AppData\Local\Temp\6355.tmp"73⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\6393.tmp"C:\Users\Admin\AppData\Local\Temp\6393.tmp"74⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\63D2.tmp"C:\Users\Admin\AppData\Local\Temp\63D2.tmp"75⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\6410.tmp"C:\Users\Admin\AppData\Local\Temp\6410.tmp"76⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\644F.tmp"C:\Users\Admin\AppData\Local\Temp\644F.tmp"77⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\648D.tmp"C:\Users\Admin\AppData\Local\Temp\648D.tmp"78⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\64BC.tmp"C:\Users\Admin\AppData\Local\Temp\64BC.tmp"79⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\64FA.tmp"C:\Users\Admin\AppData\Local\Temp\64FA.tmp"80⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\6539.tmp"C:\Users\Admin\AppData\Local\Temp\6539.tmp"81⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\6577.tmp"C:\Users\Admin\AppData\Local\Temp\6577.tmp"82⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\65B5.tmp"C:\Users\Admin\AppData\Local\Temp\65B5.tmp"83⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\65F4.tmp"C:\Users\Admin\AppData\Local\Temp\65F4.tmp"84⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\6632.tmp"C:\Users\Admin\AppData\Local\Temp\6632.tmp"85⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\6671.tmp"C:\Users\Admin\AppData\Local\Temp\6671.tmp"86⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\669F.tmp"C:\Users\Admin\AppData\Local\Temp\669F.tmp"87⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\66DE.tmp"C:\Users\Admin\AppData\Local\Temp\66DE.tmp"88⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\671C.tmp"C:\Users\Admin\AppData\Local\Temp\671C.tmp"89⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\675B.tmp"C:\Users\Admin\AppData\Local\Temp\675B.tmp"90⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\6799.tmp"C:\Users\Admin\AppData\Local\Temp\6799.tmp"91⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\67D7.tmp"C:\Users\Admin\AppData\Local\Temp\67D7.tmp"92⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\6816.tmp"C:\Users\Admin\AppData\Local\Temp\6816.tmp"93⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\6854.tmp"C:\Users\Admin\AppData\Local\Temp\6854.tmp"94⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\6893.tmp"C:\Users\Admin\AppData\Local\Temp\6893.tmp"95⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\68D1.tmp"C:\Users\Admin\AppData\Local\Temp\68D1.tmp"96⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\690F.tmp"C:\Users\Admin\AppData\Local\Temp\690F.tmp"97⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\694E.tmp"C:\Users\Admin\AppData\Local\Temp\694E.tmp"98⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\698C.tmp"C:\Users\Admin\AppData\Local\Temp\698C.tmp"99⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\69CB.tmp"C:\Users\Admin\AppData\Local\Temp\69CB.tmp"100⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\6A09.tmp"C:\Users\Admin\AppData\Local\Temp\6A09.tmp"101⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\6A47.tmp"C:\Users\Admin\AppData\Local\Temp\6A47.tmp"102⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\6A86.tmp"C:\Users\Admin\AppData\Local\Temp\6A86.tmp"103⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\6AB5.tmp"C:\Users\Admin\AppData\Local\Temp\6AB5.tmp"104⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\6AF3.tmp"C:\Users\Admin\AppData\Local\Temp\6AF3.tmp"105⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\6B31.tmp"C:\Users\Admin\AppData\Local\Temp\6B31.tmp"106⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\6B70.tmp"C:\Users\Admin\AppData\Local\Temp\6B70.tmp"107⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6BAE.tmp"C:\Users\Admin\AppData\Local\Temp\6BAE.tmp"108⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\6BED.tmp"C:\Users\Admin\AppData\Local\Temp\6BED.tmp"109⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\6C2B.tmp"C:\Users\Admin\AppData\Local\Temp\6C2B.tmp"110⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\6C5A.tmp"C:\Users\Admin\AppData\Local\Temp\6C5A.tmp"111⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\6C98.tmp"C:\Users\Admin\AppData\Local\Temp\6C98.tmp"112⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\6CD7.tmp"C:\Users\Admin\AppData\Local\Temp\6CD7.tmp"113⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\6D15.tmp"C:\Users\Admin\AppData\Local\Temp\6D15.tmp"114⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\6D53.tmp"C:\Users\Admin\AppData\Local\Temp\6D53.tmp"115⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\6D92.tmp"C:\Users\Admin\AppData\Local\Temp\6D92.tmp"116⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\6DD0.tmp"C:\Users\Admin\AppData\Local\Temp\6DD0.tmp"117⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\6E0F.tmp"C:\Users\Admin\AppData\Local\Temp\6E0F.tmp"118⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\6E4D.tmp"C:\Users\Admin\AppData\Local\Temp\6E4D.tmp"119⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\6E8B.tmp"C:\Users\Admin\AppData\Local\Temp\6E8B.tmp"120⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\6ECA.tmp"C:\Users\Admin\AppData\Local\Temp\6ECA.tmp"121⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\6F08.tmp"C:\Users\Admin\AppData\Local\Temp\6F08.tmp"122⤵PID:1440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-