Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 10:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe
-
Size
488KB
-
MD5
54116fd588d22f73cf534c8a3072c3f6
-
SHA1
f10611a895e396d71c0b213649a3c719225c0ebc
-
SHA256
609cb64597f0e115d7ea503f67040e768d50d7c138c754b706994d43172add38
-
SHA512
b88e83099d4090f00d49a2521a772aeb75039ee562c4963c9c20d2bb4ec3d78209ddcd8090c796073e4754f485662225a0e6f232586bcfaf9915c1d22ad505b8
-
SSDEEP
12288:/U5rCOTeiDajAPi2vCY/8o92CTf53XjNZ:/UQOJDL62KVoACVHjN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4516 4E4F.tmp 3100 4EAC.tmp 3936 5F46.tmp 3508 4F49.tmp 3620 4FA6.tmp 2696 4FF5.tmp 4376 6169.tmp 2732 50A0.tmp 3304 50EF.tmp 2884 513D.tmp 2460 519A.tmp 744 51E9.tmp 2876 5237.tmp 5112 5294.tmp 1216 52E3.tmp 5048 5331.tmp 4136 539E.tmp 2496 53EC.tmp 3264 544A.tmp 2364 5498.tmp 828 54E6.tmp 4044 5534.tmp 4640 5582.tmp 3796 55D1.tmp 2864 562E.tmp 1672 568C.tmp 3236 56DA.tmp 4612 5728.tmp 4072 5796.tmp 3824 5803.tmp 5104 5861.tmp 2440 58AF.tmp 1256 58FD.tmp 2388 595B.tmp 2832 59A9.tmp 424 59F7.tmp 220 5A55.tmp 2504 5AA3.tmp 2340 5AF1.tmp 2268 5B3F.tmp 4440 5B8D.tmp 636 5BDB.tmp 3628 5C39.tmp 620 5C87.tmp 3876 5CD5.tmp 3080 5D24.tmp 1936 5D72.tmp 1108 5DC0.tmp 4936 5E0E.tmp 1320 5E5C.tmp 2976 5EAA.tmp 4984 5EF8.tmp 3936 5F46.tmp 2144 5F85.tmp 4556 5FD3.tmp 2368 6021.tmp 1508 606F.tmp 5028 60BD.tmp 1020 610C.tmp 4376 6169.tmp 748 61B7.tmp 2224 6206.tmp 4108 6254.tmp 3252 62A2.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4516 4932 2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe 84 PID 4932 wrote to memory of 4516 4932 2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe 84 PID 4932 wrote to memory of 4516 4932 2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe 84 PID 4516 wrote to memory of 3100 4516 4E4F.tmp 85 PID 4516 wrote to memory of 3100 4516 4E4F.tmp 85 PID 4516 wrote to memory of 3100 4516 4E4F.tmp 85 PID 3100 wrote to memory of 3936 3100 4EAC.tmp 125 PID 3100 wrote to memory of 3936 3100 4EAC.tmp 125 PID 3100 wrote to memory of 3936 3100 4EAC.tmp 125 PID 3936 wrote to memory of 3508 3936 5F46.tmp 87 PID 3936 wrote to memory of 3508 3936 5F46.tmp 87 PID 3936 wrote to memory of 3508 3936 5F46.tmp 87 PID 3508 wrote to memory of 3620 3508 4F49.tmp 88 PID 3508 wrote to memory of 3620 3508 4F49.tmp 88 PID 3508 wrote to memory of 3620 3508 4F49.tmp 88 PID 3620 wrote to memory of 2696 3620 4FA6.tmp 89 PID 3620 wrote to memory of 2696 3620 4FA6.tmp 89 PID 3620 wrote to memory of 2696 3620 4FA6.tmp 89 PID 2696 wrote to memory of 4376 2696 4FF5.tmp 134 PID 2696 wrote to memory of 4376 2696 4FF5.tmp 134 PID 2696 wrote to memory of 4376 2696 4FF5.tmp 134 PID 4376 wrote to memory of 2732 4376 6169.tmp 90 PID 4376 wrote to memory of 2732 4376 6169.tmp 90 PID 4376 wrote to memory of 2732 4376 6169.tmp 90 PID 2732 wrote to memory of 3304 2732 50A0.tmp 91 PID 2732 wrote to memory of 3304 2732 50A0.tmp 91 PID 2732 wrote to memory of 3304 2732 50A0.tmp 91 PID 3304 wrote to memory of 2884 3304 50EF.tmp 92 PID 3304 wrote to memory of 2884 3304 50EF.tmp 92 PID 3304 wrote to memory of 2884 3304 50EF.tmp 92 PID 2884 wrote to memory of 2460 2884 513D.tmp 94 PID 2884 wrote to memory of 2460 2884 513D.tmp 94 PID 2884 wrote to memory of 2460 2884 513D.tmp 94 PID 2460 wrote to memory of 744 2460 519A.tmp 150 PID 2460 wrote to memory of 744 2460 519A.tmp 150 PID 2460 wrote to memory of 744 2460 519A.tmp 150 PID 744 wrote to memory of 2876 744 51E9.tmp 95 PID 744 wrote to memory of 2876 744 51E9.tmp 95 PID 744 wrote to memory of 2876 744 51E9.tmp 95 PID 2876 wrote to memory of 5112 2876 5237.tmp 149 PID 2876 wrote to memory of 5112 2876 5237.tmp 149 PID 2876 wrote to memory of 5112 2876 5237.tmp 149 PID 5112 wrote to memory of 1216 5112 5294.tmp 96 PID 5112 wrote to memory of 1216 5112 5294.tmp 96 PID 5112 wrote to memory of 1216 5112 5294.tmp 96 PID 1216 wrote to memory of 5048 1216 52E3.tmp 148 PID 1216 wrote to memory of 5048 1216 52E3.tmp 148 PID 1216 wrote to memory of 5048 1216 52E3.tmp 148 PID 5048 wrote to memory of 4136 5048 5331.tmp 147 PID 5048 wrote to memory of 4136 5048 5331.tmp 147 PID 5048 wrote to memory of 4136 5048 5331.tmp 147 PID 4136 wrote to memory of 2496 4136 539E.tmp 146 PID 4136 wrote to memory of 2496 4136 539E.tmp 146 PID 4136 wrote to memory of 2496 4136 539E.tmp 146 PID 2496 wrote to memory of 3264 2496 53EC.tmp 145 PID 2496 wrote to memory of 3264 2496 53EC.tmp 145 PID 2496 wrote to memory of 3264 2496 53EC.tmp 145 PID 3264 wrote to memory of 2364 3264 544A.tmp 97 PID 3264 wrote to memory of 2364 3264 544A.tmp 97 PID 3264 wrote to memory of 2364 3264 544A.tmp 97 PID 2364 wrote to memory of 828 2364 5498.tmp 144 PID 2364 wrote to memory of 828 2364 5498.tmp 144 PID 2364 wrote to memory of 828 2364 5498.tmp 144 PID 828 wrote to memory of 4044 828 54E6.tmp 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_54116fd588d22f73cf534c8a3072c3f6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"C:\Users\Admin\AppData\Local\Temp\4EFB.tmp"4⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\4F49.tmp"C:\Users\Admin\AppData\Local\Temp\4F49.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"C:\Users\Admin\AppData\Local\Temp\4FF5.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"8⤵PID:4376
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\50EF.tmp"C:\Users\Admin\AppData\Local\Temp\50EF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\513D.tmp"C:\Users\Admin\AppData\Local\Temp\513D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\519A.tmp"C:\Users\Admin\AppData\Local\Temp\519A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\51E9.tmp"C:\Users\Admin\AppData\Local\Temp\51E9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5237.tmp"C:\Users\Admin\AppData\Local\Temp\5237.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\5294.tmp"C:\Users\Admin\AppData\Local\Temp\5294.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\5331.tmp"C:\Users\Admin\AppData\Local\Temp\5331.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\5498.tmp"C:\Users\Admin\AppData\Local\Temp\5498.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\54E6.tmp"C:\Users\Admin\AppData\Local\Temp\54E6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp"1⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\56DA.tmp"C:\Users\Admin\AppData\Local\Temp\56DA.tmp"2⤵
- Executes dropped EXE
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\5796.tmp"C:\Users\Admin\AppData\Local\Temp\5796.tmp"1⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\5803.tmp"C:\Users\Admin\AppData\Local\Temp\5803.tmp"2⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\5861.tmp"C:\Users\Admin\AppData\Local\Temp\5861.tmp"3⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"4⤵
- Executes dropped EXE
PID:2440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"1⤵
- Executes dropped EXE
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\595B.tmp"C:\Users\Admin\AppData\Local\Temp\595B.tmp"2⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\59A9.tmp"C:\Users\Admin\AppData\Local\Temp\59A9.tmp"3⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\59F7.tmp"C:\Users\Admin\AppData\Local\Temp\59F7.tmp"4⤵
- Executes dropped EXE
PID:424 -
C:\Users\Admin\AppData\Local\Temp\5A55.tmp"C:\Users\Admin\AppData\Local\Temp\5A55.tmp"5⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"C:\Users\Admin\AppData\Local\Temp\5AA3.tmp"6⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"C:\Users\Admin\AppData\Local\Temp\5AF1.tmp"7⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"C:\Users\Admin\AppData\Local\Temp\5B3F.tmp"8⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"C:\Users\Admin\AppData\Local\Temp\5B8D.tmp"9⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"C:\Users\Admin\AppData\Local\Temp\5BDB.tmp"10⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"11⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\5C87.tmp"C:\Users\Admin\AppData\Local\Temp\5C87.tmp"12⤵
- Executes dropped EXE
PID:620 -
C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"C:\Users\Admin\AppData\Local\Temp\5CD5.tmp"13⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"14⤵
- Executes dropped EXE
PID:3080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5D72.tmp"C:\Users\Admin\AppData\Local\Temp\5D72.tmp"1⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"2⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"3⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"4⤵
- Executes dropped EXE
PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"1⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\5EF8.tmp"C:\Users\Admin\AppData\Local\Temp\5EF8.tmp"2⤵
- Executes dropped EXE
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\5F46.tmp"C:\Users\Admin\AppData\Local\Temp\5F46.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"2⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"3⤵
- Executes dropped EXE
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"1⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\606F.tmp"C:\Users\Admin\AppData\Local\Temp\606F.tmp"2⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"3⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\610C.tmp"C:\Users\Admin\AppData\Local\Temp\610C.tmp"4⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\6169.tmp"C:\Users\Admin\AppData\Local\Temp\6169.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"6⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\6206.tmp"C:\Users\Admin\AppData\Local\Temp\6206.tmp"7⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"8⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\62A2.tmp"C:\Users\Admin\AppData\Local\Temp\62A2.tmp"9⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\6300.tmp"C:\Users\Admin\AppData\Local\Temp\6300.tmp"10⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\635D.tmp"C:\Users\Admin\AppData\Local\Temp\635D.tmp"11⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\63FA.tmp"C:\Users\Admin\AppData\Local\Temp\63FA.tmp"12⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\64B5.tmp"C:\Users\Admin\AppData\Local\Temp\64B5.tmp"13⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\6542.tmp"C:\Users\Admin\AppData\Local\Temp\6542.tmp"14⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\65CE.tmp"C:\Users\Admin\AppData\Local\Temp\65CE.tmp"15⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"16⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\6699.tmp"C:\Users\Admin\AppData\Local\Temp\6699.tmp"17⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"18⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\67B3.tmp"C:\Users\Admin\AppData\Local\Temp\67B3.tmp"19⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\683F.tmp"C:\Users\Admin\AppData\Local\Temp\683F.tmp"20⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\689D.tmp"C:\Users\Admin\AppData\Local\Temp\689D.tmp"21⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"22⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"23⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"24⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\69F5.tmp"C:\Users\Admin\AppData\Local\Temp\69F5.tmp"25⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\6A43.tmp"C:\Users\Admin\AppData\Local\Temp\6A43.tmp"26⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"27⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"C:\Users\Admin\AppData\Local\Temp\6AFE.tmp"28⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"C:\Users\Admin\AppData\Local\Temp\6B4D.tmp"29⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"30⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\6C08.tmp"C:\Users\Admin\AppData\Local\Temp\6C08.tmp"31⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\6C66.tmp"C:\Users\Admin\AppData\Local\Temp\6C66.tmp"32⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"33⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\6D02.tmp"C:\Users\Admin\AppData\Local\Temp\6D02.tmp"34⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\6D60.tmp"C:\Users\Admin\AppData\Local\Temp\6D60.tmp"35⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"C:\Users\Admin\AppData\Local\Temp\6DAE.tmp"36⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"37⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\6E69.tmp"C:\Users\Admin\AppData\Local\Temp\6E69.tmp"38⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"39⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\6F15.tmp"C:\Users\Admin\AppData\Local\Temp\6F15.tmp"40⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"41⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"42⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\702F.tmp"C:\Users\Admin\AppData\Local\Temp\702F.tmp"43⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\707D.tmp"C:\Users\Admin\AppData\Local\Temp\707D.tmp"44⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\70DA.tmp"C:\Users\Admin\AppData\Local\Temp\70DA.tmp"45⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\7138.tmp"C:\Users\Admin\AppData\Local\Temp\7138.tmp"46⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\7196.tmp"C:\Users\Admin\AppData\Local\Temp\7196.tmp"47⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\7203.tmp"C:\Users\Admin\AppData\Local\Temp\7203.tmp"48⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"49⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\72AF.tmp"C:\Users\Admin\AppData\Local\Temp\72AF.tmp"50⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\730D.tmp"C:\Users\Admin\AppData\Local\Temp\730D.tmp"51⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\736B.tmp"C:\Users\Admin\AppData\Local\Temp\736B.tmp"52⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\73C8.tmp"C:\Users\Admin\AppData\Local\Temp\73C8.tmp"53⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\7426.tmp"C:\Users\Admin\AppData\Local\Temp\7426.tmp"54⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"55⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\74D2.tmp"C:\Users\Admin\AppData\Local\Temp\74D2.tmp"56⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\7520.tmp"C:\Users\Admin\AppData\Local\Temp\7520.tmp"57⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\757E.tmp"C:\Users\Admin\AppData\Local\Temp\757E.tmp"58⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\75DC.tmp"C:\Users\Admin\AppData\Local\Temp\75DC.tmp"59⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\762A.tmp"C:\Users\Admin\AppData\Local\Temp\762A.tmp"60⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"61⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"62⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"63⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\7762.tmp"C:\Users\Admin\AppData\Local\Temp\7762.tmp"64⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\77B0.tmp"C:\Users\Admin\AppData\Local\Temp\77B0.tmp"65⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\780E.tmp"C:\Users\Admin\AppData\Local\Temp\780E.tmp"66⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\785C.tmp"C:\Users\Admin\AppData\Local\Temp\785C.tmp"67⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"68⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\7918.tmp"C:\Users\Admin\AppData\Local\Temp\7918.tmp"69⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\7966.tmp"C:\Users\Admin\AppData\Local\Temp\7966.tmp"70⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\79C4.tmp"C:\Users\Admin\AppData\Local\Temp\79C4.tmp"71⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\7A12.tmp"C:\Users\Admin\AppData\Local\Temp\7A12.tmp"72⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\7A60.tmp"C:\Users\Admin\AppData\Local\Temp\7A60.tmp"73⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"C:\Users\Admin\AppData\Local\Temp\7ABE.tmp"74⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"75⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"76⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\7BB8.tmp"C:\Users\Admin\AppData\Local\Temp\7BB8.tmp"77⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\7C15.tmp"C:\Users\Admin\AppData\Local\Temp\7C15.tmp"78⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"79⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"80⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"81⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"82⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"C:\Users\Admin\AppData\Local\Temp\7DEA.tmp"83⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"84⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\7E96.tmp"C:\Users\Admin\AppData\Local\Temp\7E96.tmp"85⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"86⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\7F42.tmp"C:\Users\Admin\AppData\Local\Temp\7F42.tmp"87⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"C:\Users\Admin\AppData\Local\Temp\7FA0.tmp"88⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"89⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"90⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\809A.tmp"C:\Users\Admin\AppData\Local\Temp\809A.tmp"91⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\80E8.tmp"C:\Users\Admin\AppData\Local\Temp\80E8.tmp"92⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\8136.tmp"C:\Users\Admin\AppData\Local\Temp\8136.tmp"93⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\8184.tmp"C:\Users\Admin\AppData\Local\Temp\8184.tmp"94⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"95⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"96⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"97⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\82DC.tmp"C:\Users\Admin\AppData\Local\Temp\82DC.tmp"98⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\832A.tmp"C:\Users\Admin\AppData\Local\Temp\832A.tmp"99⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\8378.tmp"C:\Users\Admin\AppData\Local\Temp\8378.tmp"100⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\83C6.tmp"C:\Users\Admin\AppData\Local\Temp\83C6.tmp"101⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\8414.tmp"C:\Users\Admin\AppData\Local\Temp\8414.tmp"102⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\8462.tmp"C:\Users\Admin\AppData\Local\Temp\8462.tmp"103⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\84B1.tmp"C:\Users\Admin\AppData\Local\Temp\84B1.tmp"104⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"105⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\854D.tmp"C:\Users\Admin\AppData\Local\Temp\854D.tmp"106⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\85AB.tmp"C:\Users\Admin\AppData\Local\Temp\85AB.tmp"107⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"108⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"109⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"110⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"111⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\8741.tmp"C:\Users\Admin\AppData\Local\Temp\8741.tmp"112⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"113⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\87ED.tmp"C:\Users\Admin\AppData\Local\Temp\87ED.tmp"114⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\883B.tmp"C:\Users\Admin\AppData\Local\Temp\883B.tmp"115⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"116⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\88E7.tmp"C:\Users\Admin\AppData\Local\Temp\88E7.tmp"117⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"118⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\8993.tmp"C:\Users\Admin\AppData\Local\Temp\8993.tmp"119⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"120⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"121⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"122⤵PID:1348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-