Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 01:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe
-
Size
487KB
-
MD5
d8f0b6ac2e0764be199f91045a9a05e1
-
SHA1
19b33a4382fb151f92d6a310e57bf53bbf038f14
-
SHA256
02bd34d4a820d6fb93b579a5bc7040c3f865d7a9e5850a29dbe6d5b0e01b866f
-
SHA512
edf15355a97e6a8c1b965dafeff76bbdc848984eb71522c43a12221d2306ff84dd06a33d5359f82fac2adadb647cc2b6ff2b8682d56529250a45f3b0ad46ed62
-
SSDEEP
12288:yU5rCOTeiNUgk5kmkryfYmcPXH9ouaDOBAbZ:yUQOJNUj5Zk26X9fa2Ab
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4808 D64B.tmp 544 DAC0.tmp 3948 DBBA.tmp 2972 DC85.tmp 4908 DD7F.tmp 3848 DE3A.tmp 3104 DF83.tmp 3480 E08C.tmp 2464 E177.tmp 4956 E271.tmp 2380 E36B.tmp 4644 E4D2.tmp 224 E54F.tmp 3320 E687.tmp 3440 E733.tmp 1000 E83D.tmp 4884 E927.tmp 4540 EA31.tmp 2756 EADD.tmp 808 EBA8.tmp 4576 EC73.tmp 4568 ED1F.tmp 3708 EE09.tmp 4008 EF13.tmp 4972 EFBF.tmp 2664 F05B.tmp 3688 F126.tmp 3804 F211.tmp 676 F28E.tmp 4332 F397.tmp 1604 F472.tmp 3216 F54D.tmp 5036 F637.tmp 4272 F6A4.tmp 1312 F721.tmp 1408 F7AE.tmp 5080 F82B.tmp 1596 F8B8.tmp 2944 F954.tmp 4596 FA00.tmp 2112 FA8C.tmp 2068 FC80.tmp 3712 FD3C.tmp 4688 FDF7.tmp 2564 FE74.tmp 3472 FF4F.tmp 1812 FFBD.tmp 3260 78.tmp 3776 E5.tmp 4516 1D0.tmp 4112 23D.tmp 4016 3D3.tmp 4508 441.tmp 4696 4ED.tmp 1704 55A.tmp 4240 5F6.tmp 4968 693.tmp 2308 73E.tmp 3236 7DB.tmp 3856 896.tmp 4504 904.tmp 1780 9AF.tmp 5068 A3C.tmp 4756 B17.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 4808 2752 2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe 84 PID 2752 wrote to memory of 4808 2752 2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe 84 PID 2752 wrote to memory of 4808 2752 2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe 84 PID 4808 wrote to memory of 544 4808 D64B.tmp 85 PID 4808 wrote to memory of 544 4808 D64B.tmp 85 PID 4808 wrote to memory of 544 4808 D64B.tmp 85 PID 544 wrote to memory of 3948 544 DAC0.tmp 86 PID 544 wrote to memory of 3948 544 DAC0.tmp 86 PID 544 wrote to memory of 3948 544 DAC0.tmp 86 PID 3948 wrote to memory of 2972 3948 DBBA.tmp 87 PID 3948 wrote to memory of 2972 3948 DBBA.tmp 87 PID 3948 wrote to memory of 2972 3948 DBBA.tmp 87 PID 2972 wrote to memory of 4908 2972 DC85.tmp 88 PID 2972 wrote to memory of 4908 2972 DC85.tmp 88 PID 2972 wrote to memory of 4908 2972 DC85.tmp 88 PID 4908 wrote to memory of 3848 4908 DD7F.tmp 89 PID 4908 wrote to memory of 3848 4908 DD7F.tmp 89 PID 4908 wrote to memory of 3848 4908 DD7F.tmp 89 PID 3848 wrote to memory of 3104 3848 DE3A.tmp 90 PID 3848 wrote to memory of 3104 3848 DE3A.tmp 90 PID 3848 wrote to memory of 3104 3848 DE3A.tmp 90 PID 3104 wrote to memory of 3480 3104 DF83.tmp 91 PID 3104 wrote to memory of 3480 3104 DF83.tmp 91 PID 3104 wrote to memory of 3480 3104 DF83.tmp 91 PID 3480 wrote to memory of 2464 3480 E08C.tmp 92 PID 3480 wrote to memory of 2464 3480 E08C.tmp 92 PID 3480 wrote to memory of 2464 3480 E08C.tmp 92 PID 2464 wrote to memory of 4956 2464 E177.tmp 93 PID 2464 wrote to memory of 4956 2464 E177.tmp 93 PID 2464 wrote to memory of 4956 2464 E177.tmp 93 PID 4956 wrote to memory of 2380 4956 E271.tmp 94 PID 4956 wrote to memory of 2380 4956 E271.tmp 94 PID 4956 wrote to memory of 2380 4956 E271.tmp 94 PID 2380 wrote to memory of 4644 2380 E36B.tmp 95 PID 2380 wrote to memory of 4644 2380 E36B.tmp 95 PID 2380 wrote to memory of 4644 2380 E36B.tmp 95 PID 4644 wrote to memory of 224 4644 E4D2.tmp 96 PID 4644 wrote to memory of 224 4644 E4D2.tmp 96 PID 4644 wrote to memory of 224 4644 E4D2.tmp 96 PID 224 wrote to memory of 3320 224 E54F.tmp 97 PID 224 wrote to memory of 3320 224 E54F.tmp 97 PID 224 wrote to memory of 3320 224 E54F.tmp 97 PID 3320 wrote to memory of 3440 3320 E687.tmp 98 PID 3320 wrote to memory of 3440 3320 E687.tmp 98 PID 3320 wrote to memory of 3440 3320 E687.tmp 98 PID 3440 wrote to memory of 1000 3440 E733.tmp 99 PID 3440 wrote to memory of 1000 3440 E733.tmp 99 PID 3440 wrote to memory of 1000 3440 E733.tmp 99 PID 1000 wrote to memory of 4884 1000 E83D.tmp 100 PID 1000 wrote to memory of 4884 1000 E83D.tmp 100 PID 1000 wrote to memory of 4884 1000 E83D.tmp 100 PID 4884 wrote to memory of 4540 4884 E927.tmp 101 PID 4884 wrote to memory of 4540 4884 E927.tmp 101 PID 4884 wrote to memory of 4540 4884 E927.tmp 101 PID 4540 wrote to memory of 2756 4540 EA31.tmp 102 PID 4540 wrote to memory of 2756 4540 EA31.tmp 102 PID 4540 wrote to memory of 2756 4540 EA31.tmp 102 PID 2756 wrote to memory of 808 2756 EADD.tmp 103 PID 2756 wrote to memory of 808 2756 EADD.tmp 103 PID 2756 wrote to memory of 808 2756 EADD.tmp 103 PID 808 wrote to memory of 4576 808 EBA8.tmp 104 PID 808 wrote to memory of 4576 808 EBA8.tmp 104 PID 808 wrote to memory of 4576 808 EBA8.tmp 104 PID 4576 wrote to memory of 4568 4576 EC73.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_d8f0b6ac2e0764be199f91045a9a05e1_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\D64B.tmp"C:\Users\Admin\AppData\Local\Temp\D64B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\E271.tmp"C:\Users\Admin\AppData\Local\Temp\E271.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\E54F.tmp"C:\Users\Admin\AppData\Local\Temp\E54F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\E733.tmp"C:\Users\Admin\AppData\Local\Temp\E733.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\E927.tmp"C:\Users\Admin\AppData\Local\Temp\E927.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\EA31.tmp"C:\Users\Admin\AppData\Local\Temp\EA31.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\EADD.tmp"C:\Users\Admin\AppData\Local\Temp\EADD.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"23⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"24⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"25⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"26⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\F05B.tmp"C:\Users\Admin\AppData\Local\Temp\F05B.tmp"27⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\F126.tmp"C:\Users\Admin\AppData\Local\Temp\F126.tmp"28⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"29⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"30⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"31⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"32⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"33⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"34⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"35⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\F721.tmp"C:\Users\Admin\AppData\Local\Temp\F721.tmp"36⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"37⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\F82B.tmp"C:\Users\Admin\AppData\Local\Temp\F82B.tmp"38⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"39⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"40⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\FA00.tmp"C:\Users\Admin\AppData\Local\Temp\FA00.tmp"41⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"42⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\FC80.tmp"C:\Users\Admin\AppData\Local\Temp\FC80.tmp"43⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"44⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"45⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"46⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"47⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\FFBD.tmp"C:\Users\Admin\AppData\Local\Temp\FFBD.tmp"48⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"49⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\E5.tmp"C:\Users\Admin\AppData\Local\Temp\E5.tmp"50⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"51⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\23D.tmp"C:\Users\Admin\AppData\Local\Temp\23D.tmp"52⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\3D3.tmp"C:\Users\Admin\AppData\Local\Temp\3D3.tmp"53⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\441.tmp"C:\Users\Admin\AppData\Local\Temp\441.tmp"54⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"55⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"56⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\5F6.tmp"C:\Users\Admin\AppData\Local\Temp\5F6.tmp"57⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\693.tmp"C:\Users\Admin\AppData\Local\Temp\693.tmp"58⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\73E.tmp"C:\Users\Admin\AppData\Local\Temp\73E.tmp"59⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\7DB.tmp"C:\Users\Admin\AppData\Local\Temp\7DB.tmp"60⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"61⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\904.tmp"C:\Users\Admin\AppData\Local\Temp\904.tmp"62⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"63⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\A3C.tmp"C:\Users\Admin\AppData\Local\Temp\A3C.tmp"64⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\B17.tmp"C:\Users\Admin\AppData\Local\Temp\B17.tmp"65⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"66⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\C11.tmp"C:\Users\Admin\AppData\Local\Temp\C11.tmp"67⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"68⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"69⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"70⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\E43.tmp"C:\Users\Admin\AppData\Local\Temp\E43.tmp"71⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\F2E.tmp"C:\Users\Admin\AppData\Local\Temp\F2E.tmp"72⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"73⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\1018.tmp"C:\Users\Admin\AppData\Local\Temp\1018.tmp"74⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\10C4.tmp"C:\Users\Admin\AppData\Local\Temp\10C4.tmp"75⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"76⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\11FC.tmp"C:\Users\Admin\AppData\Local\Temp\11FC.tmp"77⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"78⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\14EA.tmp"C:\Users\Admin\AppData\Local\Temp\14EA.tmp"79⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\1577.tmp"C:\Users\Admin\AppData\Local\Temp\1577.tmp"80⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\1633.tmp"C:\Users\Admin\AppData\Local\Temp\1633.tmp"81⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\16BF.tmp"C:\Users\Admin\AppData\Local\Temp\16BF.tmp"82⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\173C.tmp"C:\Users\Admin\AppData\Local\Temp\173C.tmp"83⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\18B3.tmp"C:\Users\Admin\AppData\Local\Temp\18B3.tmp"84⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\194F.tmp"C:\Users\Admin\AppData\Local\Temp\194F.tmp"85⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\19BD.tmp"C:\Users\Admin\AppData\Local\Temp\19BD.tmp"86⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"87⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\1B92.tmp"C:\Users\Admin\AppData\Local\Temp\1B92.tmp"88⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"89⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"90⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"91⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"92⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\1E60.tmp"C:\Users\Admin\AppData\Local\Temp\1E60.tmp"93⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"94⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\2054.tmp"C:\Users\Admin\AppData\Local\Temp\2054.tmp"95⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\2110.tmp"C:\Users\Admin\AppData\Local\Temp\2110.tmp"96⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"97⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"98⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"99⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\27D6.tmp"C:\Users\Admin\AppData\Local\Temp\27D6.tmp"100⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\290F.tmp"C:\Users\Admin\AppData\Local\Temp\290F.tmp"101⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"102⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"103⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"104⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"105⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\2BBE.tmp"C:\Users\Admin\AppData\Local\Temp\2BBE.tmp"106⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\2C99.tmp"C:\Users\Admin\AppData\Local\Temp\2C99.tmp"107⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"108⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"109⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"110⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\3004.tmp"C:\Users\Admin\AppData\Local\Temp\3004.tmp"111⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\3091.tmp"C:\Users\Admin\AppData\Local\Temp\3091.tmp"112⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\30FE.tmp"C:\Users\Admin\AppData\Local\Temp\30FE.tmp"113⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\316B.tmp"C:\Users\Admin\AppData\Local\Temp\316B.tmp"114⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"115⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"116⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"117⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"118⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"119⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\360F.tmp"C:\Users\Admin\AppData\Local\Temp\360F.tmp"120⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"121⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"122⤵PID:4536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-