Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 14:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe
-
Size
486KB
-
MD5
e8d590c05c529a5fbe448178a76995df
-
SHA1
7866fb32741a37c1e69442cb366b6e707af3ac2d
-
SHA256
78f2482b33dfef9f15b916971eef1dd50a32ea1733ad1c9aba1fd37743735316
-
SHA512
ad80dc6a579e3446ceeb086a2b71ceea39734d64bc50b324f25ad36fb781b3eb2fc8161ef532c8587f1b7b7522c1c36b8ae569e22ed40d67456862a4df546f71
-
SSDEEP
12288:oU5rCOTeiDL8y9yJS3Z5lsAKO3TkqFLg/YDaD+QAeNZ:oUQOJDL8Ir3vBDjlBS+eN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1832 AAB.tmp 2208 AE9.tmp 2664 2932.tmp 2852 B76.tmp 2964 BB4.tmp 2676 BF2.tmp 2584 2AA9.tmp 2724 C6F.tmp 2556 CAE.tmp 2680 2B54.tmp 2340 D4A.tmp 320 3BE8.tmp 2744 DC6.tmp 2800 E05.tmp 2748 E53.tmp 1580 EA1.tmp 1576 EDF.tmp 2160 F2D.tmp 1628 F7B.tmp 1272 FBA.tmp 2036 FF8.tmp 1236 1046.tmp 1624 1FA1.tmp 2656 1FE0.tmp 3020 1111.tmp 1972 3006.tmp 1852 119D.tmp 1916 11EB.tmp 2944 1239.tmp 324 1278.tmp 1412 12B6.tmp 948 12F4.tmp 2768 3276.tmp 2524 1371.tmp 920 13B0.tmp 1036 2359.tmp 1032 339E.tmp 1204 146B.tmp 2812 14A9.tmp 1252 14E8.tmp 1736 1526.tmp 1296 1564.tmp 1900 3553.tmp 1676 257B.tmp 908 1620.tmp 608 165E.tmp 2000 169C.tmp 3000 16DB.tmp 500 36C9.tmp 1988 3708.tmp 1708 1796.tmp 1432 3775.tmp 1500 1813.tmp 1664 1851.tmp 1536 1890.tmp 1524 386E.tmp 2056 38AD.tmp 2688 193B.tmp 2412 392A.tmp 1952 19A8.tmp 2716 19E7.tmp 2752 1A25.tmp 2928 1A64.tmp 1208 2A6A.tmp -
Loads dropped DLL 64 IoCs
pid Process 2056 190C.tmp 1832 3830.tmp 2208 AE9.tmp 2664 2932.tmp 2852 B76.tmp 2964 BB4.tmp 2676 BF2.tmp 2584 2AA9.tmp 2724 C6F.tmp 2556 CAE.tmp 2680 2B54.tmp 2340 D4A.tmp 320 3BE8.tmp 2744 DC6.tmp 2800 E05.tmp 2748 E53.tmp 1580 EA1.tmp 1576 EDF.tmp 2160 F2D.tmp 1628 F7B.tmp 1272 FBA.tmp 2036 FF8.tmp 1236 1046.tmp 1624 1FA1.tmp 2656 1FE0.tmp 3020 1111.tmp 1972 3006.tmp 1852 119D.tmp 1916 11EB.tmp 2944 1239.tmp 324 1278.tmp 1412 12B6.tmp 948 12F4.tmp 2768 3276.tmp 2524 1371.tmp 920 13B0.tmp 1036 2359.tmp 1032 339E.tmp 1204 146B.tmp 2812 14A9.tmp 1252 14E8.tmp 1736 1526.tmp 1296 1564.tmp 1900 3553.tmp 1676 257B.tmp 908 1620.tmp 608 165E.tmp 2000 169C.tmp 3000 16DB.tmp 500 36C9.tmp 1988 3708.tmp 1708 1796.tmp 1432 3775.tmp 1500 1813.tmp 1664 1851.tmp 1536 1890.tmp 1524 386E.tmp 2056 38AD.tmp 2688 193B.tmp 2412 392A.tmp 1952 19A8.tmp 2716 19E7.tmp 2752 1A25.tmp 2928 1A64.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1832 2056 190C.tmp 23 PID 2056 wrote to memory of 1832 2056 190C.tmp 23 PID 2056 wrote to memory of 1832 2056 190C.tmp 23 PID 2056 wrote to memory of 1832 2056 190C.tmp 23 PID 1832 wrote to memory of 2208 1832 3830.tmp 151 PID 1832 wrote to memory of 2208 1832 3830.tmp 151 PID 1832 wrote to memory of 2208 1832 3830.tmp 151 PID 1832 wrote to memory of 2208 1832 3830.tmp 151 PID 2208 wrote to memory of 2664 2208 AE9.tmp 153 PID 2208 wrote to memory of 2664 2208 AE9.tmp 153 PID 2208 wrote to memory of 2664 2208 AE9.tmp 153 PID 2208 wrote to memory of 2664 2208 AE9.tmp 153 PID 2664 wrote to memory of 2852 2664 2932.tmp 147 PID 2664 wrote to memory of 2852 2664 2932.tmp 147 PID 2664 wrote to memory of 2852 2664 2932.tmp 147 PID 2664 wrote to memory of 2852 2664 2932.tmp 147 PID 2852 wrote to memory of 2964 2852 B76.tmp 146 PID 2852 wrote to memory of 2964 2852 B76.tmp 146 PID 2852 wrote to memory of 2964 2852 B76.tmp 146 PID 2852 wrote to memory of 2964 2852 B76.tmp 146 PID 2964 wrote to memory of 2676 2964 BB4.tmp 144 PID 2964 wrote to memory of 2676 2964 BB4.tmp 144 PID 2964 wrote to memory of 2676 2964 BB4.tmp 144 PID 2964 wrote to memory of 2676 2964 BB4.tmp 144 PID 2676 wrote to memory of 2584 2676 BF2.tmp 159 PID 2676 wrote to memory of 2584 2676 BF2.tmp 159 PID 2676 wrote to memory of 2584 2676 BF2.tmp 159 PID 2676 wrote to memory of 2584 2676 BF2.tmp 159 PID 2584 wrote to memory of 2724 2584 2AA9.tmp 143 PID 2584 wrote to memory of 2724 2584 2AA9.tmp 143 PID 2584 wrote to memory of 2724 2584 2AA9.tmp 143 PID 2584 wrote to memory of 2724 2584 2AA9.tmp 143 PID 2724 wrote to memory of 2556 2724 C6F.tmp 140 PID 2724 wrote to memory of 2556 2724 C6F.tmp 140 PID 2724 wrote to memory of 2556 2724 C6F.tmp 140 PID 2724 wrote to memory of 2556 2724 C6F.tmp 140 PID 2556 wrote to memory of 2680 2556 CAE.tmp 162 PID 2556 wrote to memory of 2680 2556 CAE.tmp 162 PID 2556 wrote to memory of 2680 2556 CAE.tmp 162 PID 2556 wrote to memory of 2680 2556 CAE.tmp 162 PID 2680 wrote to memory of 2340 2680 2B54.tmp 136 PID 2680 wrote to memory of 2340 2680 2B54.tmp 136 PID 2680 wrote to memory of 2340 2680 2B54.tmp 136 PID 2680 wrote to memory of 2340 2680 2B54.tmp 136 PID 2340 wrote to memory of 320 2340 D4A.tmp 232 PID 2340 wrote to memory of 320 2340 D4A.tmp 232 PID 2340 wrote to memory of 320 2340 D4A.tmp 232 PID 2340 wrote to memory of 320 2340 D4A.tmp 232 PID 320 wrote to memory of 2744 320 3BE8.tmp 132 PID 320 wrote to memory of 2744 320 3BE8.tmp 132 PID 320 wrote to memory of 2744 320 3BE8.tmp 132 PID 320 wrote to memory of 2744 320 3BE8.tmp 132 PID 2744 wrote to memory of 2800 2744 DC6.tmp 131 PID 2744 wrote to memory of 2800 2744 DC6.tmp 131 PID 2744 wrote to memory of 2800 2744 DC6.tmp 131 PID 2744 wrote to memory of 2800 2744 DC6.tmp 131 PID 2800 wrote to memory of 2748 2800 E05.tmp 129 PID 2800 wrote to memory of 2748 2800 E05.tmp 129 PID 2800 wrote to memory of 2748 2800 E05.tmp 129 PID 2800 wrote to memory of 2748 2800 E05.tmp 129 PID 2748 wrote to memory of 1580 2748 E53.tmp 128 PID 2748 wrote to memory of 1580 2748 E53.tmp 128 PID 2748 wrote to memory of 1580 2748 E53.tmp 128 PID 2748 wrote to memory of 1580 2748 E53.tmp 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_e8d590c05c529a5fbe448178a76995df_mafia.exe"1⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\AAB.tmp"C:\Users\Admin\AppData\Local\Temp\AAB.tmp"2⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\AE9.tmp"C:\Users\Admin\AppData\Local\Temp\AE9.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\193B.tmp"C:\Users\Admin\AppData\Local\Temp\193B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\C31.tmp"C:\Users\Admin\AppData\Local\Temp\C31.tmp"1⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\1084.tmp"C:\Users\Admin\AppData\Local\Temp\1084.tmp"1⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\10D2.tmp"C:\Users\Admin\AppData\Local\Temp\10D2.tmp"2⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\201E.tmp"C:\Users\Admin\AppData\Local\Temp\201E.tmp"3⤵PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1111.tmp"C:\Users\Admin\AppData\Local\Temp\1111.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\114F.tmp"C:\Users\Admin\AppData\Local\Temp\114F.tmp"2⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\119D.tmp"C:\Users\Admin\AppData\Local\Temp\119D.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\11EB.tmp"C:\Users\Admin\AppData\Local\Temp\11EB.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\1278.tmp"C:\Users\Admin\AppData\Local\Temp\1278.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\12B6.tmp"C:\Users\Admin\AppData\Local\Temp\12B6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\12F4.tmp"C:\Users\Admin\AppData\Local\Temp\12F4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:948 -
C:\Users\Admin\AppData\Local\Temp\1333.tmp"C:\Users\Admin\AppData\Local\Temp\1333.tmp"3⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\32B4.tmp"C:\Users\Admin\AppData\Local\Temp\32B4.tmp"4⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\32E3.tmp"C:\Users\Admin\AppData\Local\Temp\32E3.tmp"5⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"6⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\3360.tmp"C:\Users\Admin\AppData\Local\Temp\3360.tmp"7⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"9⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"10⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"11⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"12⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"13⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\3514.tmp"C:\Users\Admin\AppData\Local\Temp\3514.tmp"14⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"16⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"17⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\360E.tmp"C:\Users\Admin\AppData\Local\Temp\360E.tmp"18⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"19⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"20⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:500 -
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"23⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\3775.tmp"C:\Users\Admin\AppData\Local\Temp\3775.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\37B3.tmp"C:\Users\Admin\AppData\Local\Temp\37B3.tmp"25⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\37F2.tmp"C:\Users\Admin\AppData\Local\Temp\37F2.tmp"26⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\3830.tmp"C:\Users\Admin\AppData\Local\Temp\3830.tmp"27⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\386E.tmp"C:\Users\Admin\AppData\Local\Temp\386E.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\38AD.tmp"C:\Users\Admin\AppData\Local\Temp\38AD.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\38EB.tmp"C:\Users\Admin\AppData\Local\Temp\38EB.tmp"30⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\392A.tmp"C:\Users\Admin\AppData\Local\Temp\392A.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\3968.tmp"C:\Users\Admin\AppData\Local\Temp\3968.tmp"32⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\39A6.tmp"C:\Users\Admin\AppData\Local\Temp\39A6.tmp"33⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\39E5.tmp"C:\Users\Admin\AppData\Local\Temp\39E5.tmp"34⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\3A23.tmp"C:\Users\Admin\AppData\Local\Temp\3A23.tmp"35⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3A62.tmp"C:\Users\Admin\AppData\Local\Temp\3A62.tmp"36⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3A90.tmp"C:\Users\Admin\AppData\Local\Temp\3A90.tmp"37⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3ABF.tmp"C:\Users\Admin\AppData\Local\Temp\3ABF.tmp"38⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\3AFE.tmp"C:\Users\Admin\AppData\Local\Temp\3AFE.tmp"39⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\3B3C.tmp"C:\Users\Admin\AppData\Local\Temp\3B3C.tmp"40⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"41⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"42⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"44⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"45⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3CD2.tmp"C:\Users\Admin\AppData\Local\Temp\3CD2.tmp"46⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3D20.tmp"C:\Users\Admin\AppData\Local\Temp\3D20.tmp"47⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3D4E.tmp"C:\Users\Admin\AppData\Local\Temp\3D4E.tmp"48⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"49⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"50⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\3E29.tmp"C:\Users\Admin\AppData\Local\Temp\3E29.tmp"51⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3E77.tmp"C:\Users\Admin\AppData\Local\Temp\3E77.tmp"52⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"53⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp"54⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"55⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3F80.tmp"C:\Users\Admin\AppData\Local\Temp\3F80.tmp"56⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"57⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\401C.tmp"C:\Users\Admin\AppData\Local\Temp\401C.tmp"58⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\406A.tmp"C:\Users\Admin\AppData\Local\Temp\406A.tmp"59⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\4099.tmp"C:\Users\Admin\AppData\Local\Temp\4099.tmp"60⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\40F6.tmp"C:\Users\Admin\AppData\Local\Temp\40F6.tmp"61⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\4164.tmp"C:\Users\Admin\AppData\Local\Temp\4164.tmp"62⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\41A2.tmp"C:\Users\Admin\AppData\Local\Temp\41A2.tmp"63⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\420F.tmp"C:\Users\Admin\AppData\Local\Temp\420F.tmp"64⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\424E.tmp"C:\Users\Admin\AppData\Local\Temp\424E.tmp"65⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\429C.tmp"C:\Users\Admin\AppData\Local\Temp\429C.tmp"66⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\42DA.tmp"C:\Users\Admin\AppData\Local\Temp\42DA.tmp"67⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\4328.tmp"C:\Users\Admin\AppData\Local\Temp\4328.tmp"68⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\4366.tmp"C:\Users\Admin\AppData\Local\Temp\4366.tmp"69⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\43A5.tmp"C:\Users\Admin\AppData\Local\Temp\43A5.tmp"70⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\4402.tmp"C:\Users\Admin\AppData\Local\Temp\4402.tmp"71⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\4450.tmp"C:\Users\Admin\AppData\Local\Temp\4450.tmp"72⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\448F.tmp"C:\Users\Admin\AppData\Local\Temp\448F.tmp"73⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\44BE.tmp"C:\Users\Admin\AppData\Local\Temp\44BE.tmp"74⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\450C.tmp"C:\Users\Admin\AppData\Local\Temp\450C.tmp"75⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\455A.tmp"C:\Users\Admin\AppData\Local\Temp\455A.tmp"76⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\4588.tmp"C:\Users\Admin\AppData\Local\Temp\4588.tmp"77⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\45C7.tmp"C:\Users\Admin\AppData\Local\Temp\45C7.tmp"78⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\4624.tmp"C:\Users\Admin\AppData\Local\Temp\4624.tmp"79⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\4663.tmp"C:\Users\Admin\AppData\Local\Temp\4663.tmp"80⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\46A1.tmp"C:\Users\Admin\AppData\Local\Temp\46A1.tmp"81⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\46E0.tmp"C:\Users\Admin\AppData\Local\Temp\46E0.tmp"82⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\471E.tmp"C:\Users\Admin\AppData\Local\Temp\471E.tmp"83⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\475C.tmp"C:\Users\Admin\AppData\Local\Temp\475C.tmp"84⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\478B.tmp"C:\Users\Admin\AppData\Local\Temp\478B.tmp"85⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\47CA.tmp"C:\Users\Admin\AppData\Local\Temp\47CA.tmp"86⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\47F8.tmp"C:\Users\Admin\AppData\Local\Temp\47F8.tmp"87⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\4846.tmp"C:\Users\Admin\AppData\Local\Temp\4846.tmp"88⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\4875.tmp"C:\Users\Admin\AppData\Local\Temp\4875.tmp"89⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"90⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\4911.tmp"C:\Users\Admin\AppData\Local\Temp\4911.tmp"91⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\4950.tmp"C:\Users\Admin\AppData\Local\Temp\4950.tmp"92⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\499E.tmp"C:\Users\Admin\AppData\Local\Temp\499E.tmp"93⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\49FB.tmp"C:\Users\Admin\AppData\Local\Temp\49FB.tmp"94⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\4A68.tmp"C:\Users\Admin\AppData\Local\Temp\4A68.tmp"95⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"96⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\4AF5.tmp"C:\Users\Admin\AppData\Local\Temp\4AF5.tmp"97⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"98⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\4B62.tmp"C:\Users\Admin\AppData\Local\Temp\4B62.tmp"99⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"100⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"101⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"102⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\4C5C.tmp"C:\Users\Admin\AppData\Local\Temp\4C5C.tmp"103⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"104⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\4CF8.tmp"C:\Users\Admin\AppData\Local\Temp\4CF8.tmp"105⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\4D36.tmp"C:\Users\Admin\AppData\Local\Temp\4D36.tmp"106⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\4D74.tmp"C:\Users\Admin\AppData\Local\Temp\4D74.tmp"107⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"108⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\4E01.tmp"C:\Users\Admin\AppData\Local\Temp\4E01.tmp"109⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"110⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"111⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"112⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\4EFA.tmp"C:\Users\Admin\AppData\Local\Temp\4EFA.tmp"113⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"114⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\4F96.tmp"C:\Users\Admin\AppData\Local\Temp\4F96.tmp"115⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"116⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\5013.tmp"C:\Users\Admin\AppData\Local\Temp\5013.tmp"117⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"118⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\5090.tmp"C:\Users\Admin\AppData\Local\Temp\5090.tmp"119⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\50CE.tmp"C:\Users\Admin\AppData\Local\Temp\50CE.tmp"120⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\510D.tmp"C:\Users\Admin\AppData\Local\Temp\510D.tmp"121⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\514B.tmp"C:\Users\Admin\AppData\Local\Temp\514B.tmp"122⤵PID:2040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-