Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 08:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe
Resource
win10v2004-20240221-en
2 signatures
150 seconds
General
-
Target
2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe
-
Size
487KB
-
MD5
9453a1216e4196a15fafe1789094cdcb
-
SHA1
521c72f8cd7508bfaa8de76cefc3f310fb493fb1
-
SHA256
f33d35feddb72762700f499e93b1b2a33bf98b29bfc6947c348036609aaa940b
-
SHA512
29df9456681c35d7ed181a2a8111a7e114fb9ac7a70790f29a2ff371a55aaed56d1fa9ad56288817992ca602ff4ddbfb7c78a9711b5cad5f577b047f32c4da4f
-
SSDEEP
6144:qorf3lPvovsgZnqG2C7mOTeiL9DUPj4LHpXPHm1m7vlVqn+BlefwxNOs2L3YFvQF:HU5rCOTeiJtVHm1KKgbOTZXfvlNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2116 4631.tmp 1972 46AE.tmp 4284 470B.tmp 796 47B7.tmp 4980 4825.tmp 1472 4882.tmp 880 48E0.tmp 4424 494D.tmp 2904 49AB.tmp 1304 4A19.tmp 2404 4A76.tmp 1092 4B32.tmp 3964 4B90.tmp 2216 4BFD.tmp 2424 4C7A.tmp 1084 4CD8.tmp 1460 4D45.tmp 4572 4DB2.tmp 5052 4E01.tmp 2016 4E8D.tmp 3008 4EDB.tmp 4796 4F68.tmp 2688 4FD5.tmp 4392 5033.tmp 3984 5091.tmp 4772 50FE.tmp 1348 515C.tmp 3144 51AA.tmp 924 5246.tmp 2724 52A4.tmp 4612 5321.tmp 3744 538E.tmp 1312 53EC.tmp 2740 543A.tmp 4336 5498.tmp 1128 54E6.tmp 4180 5544.tmp 1676 5592.tmp 3840 55E0.tmp 1404 567C.tmp 2868 5709.tmp 3548 5786.tmp 1860 57F3.tmp 2432 58AF.tmp 2068 592C.tmp 2960 59C8.tmp 4824 5A55.tmp 628 5AD2.tmp 2360 5BCC.tmp 3028 5C78.tmp 4424 5D24.tmp 3508 5D81.tmp 2228 5DEF.tmp 3400 5E5C.tmp 4088 5EAA.tmp 3304 5F08.tmp 4832 5F66.tmp 372 5FC3.tmp 2664 6021.tmp 4516 607F.tmp 2424 60DD.tmp 516 614A.tmp 3216 6198.tmp 1956 61E6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2116 4600 2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe 89 PID 4600 wrote to memory of 2116 4600 2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe 89 PID 4600 wrote to memory of 2116 4600 2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe 89 PID 2116 wrote to memory of 1972 2116 4631.tmp 90 PID 2116 wrote to memory of 1972 2116 4631.tmp 90 PID 2116 wrote to memory of 1972 2116 4631.tmp 90 PID 1972 wrote to memory of 4284 1972 46AE.tmp 92 PID 1972 wrote to memory of 4284 1972 46AE.tmp 92 PID 1972 wrote to memory of 4284 1972 46AE.tmp 92 PID 4284 wrote to memory of 796 4284 470B.tmp 93 PID 4284 wrote to memory of 796 4284 470B.tmp 93 PID 4284 wrote to memory of 796 4284 470B.tmp 93 PID 796 wrote to memory of 4980 796 47B7.tmp 96 PID 796 wrote to memory of 4980 796 47B7.tmp 96 PID 796 wrote to memory of 4980 796 47B7.tmp 96 PID 4980 wrote to memory of 1472 4980 4825.tmp 97 PID 4980 wrote to memory of 1472 4980 4825.tmp 97 PID 4980 wrote to memory of 1472 4980 4825.tmp 97 PID 1472 wrote to memory of 880 1472 4882.tmp 98 PID 1472 wrote to memory of 880 1472 4882.tmp 98 PID 1472 wrote to memory of 880 1472 4882.tmp 98 PID 880 wrote to memory of 4424 880 48E0.tmp 99 PID 880 wrote to memory of 4424 880 48E0.tmp 99 PID 880 wrote to memory of 4424 880 48E0.tmp 99 PID 4424 wrote to memory of 2904 4424 494D.tmp 100 PID 4424 wrote to memory of 2904 4424 494D.tmp 100 PID 4424 wrote to memory of 2904 4424 494D.tmp 100 PID 2904 wrote to memory of 1304 2904 49AB.tmp 101 PID 2904 wrote to memory of 1304 2904 49AB.tmp 101 PID 2904 wrote to memory of 1304 2904 49AB.tmp 101 PID 1304 wrote to memory of 2404 1304 4A19.tmp 102 PID 1304 wrote to memory of 2404 1304 4A19.tmp 102 PID 1304 wrote to memory of 2404 1304 4A19.tmp 102 PID 2404 wrote to memory of 1092 2404 4A76.tmp 103 PID 2404 wrote to memory of 1092 2404 4A76.tmp 103 PID 2404 wrote to memory of 1092 2404 4A76.tmp 103 PID 1092 wrote to memory of 3964 1092 4B32.tmp 104 PID 1092 wrote to memory of 3964 1092 4B32.tmp 104 PID 1092 wrote to memory of 3964 1092 4B32.tmp 104 PID 3964 wrote to memory of 2216 3964 4B90.tmp 105 PID 3964 wrote to memory of 2216 3964 4B90.tmp 105 PID 3964 wrote to memory of 2216 3964 4B90.tmp 105 PID 2216 wrote to memory of 2424 2216 4BFD.tmp 110 PID 2216 wrote to memory of 2424 2216 4BFD.tmp 110 PID 2216 wrote to memory of 2424 2216 4BFD.tmp 110 PID 2424 wrote to memory of 1084 2424 4C7A.tmp 106 PID 2424 wrote to memory of 1084 2424 4C7A.tmp 106 PID 2424 wrote to memory of 1084 2424 4C7A.tmp 106 PID 1084 wrote to memory of 1460 1084 4CD8.tmp 107 PID 1084 wrote to memory of 1460 1084 4CD8.tmp 107 PID 1084 wrote to memory of 1460 1084 4CD8.tmp 107 PID 1460 wrote to memory of 4572 1460 4D45.tmp 108 PID 1460 wrote to memory of 4572 1460 4D45.tmp 108 PID 1460 wrote to memory of 4572 1460 4D45.tmp 108 PID 4572 wrote to memory of 5052 4572 4DB2.tmp 109 PID 4572 wrote to memory of 5052 4572 4DB2.tmp 109 PID 4572 wrote to memory of 5052 4572 4DB2.tmp 109 PID 5052 wrote to memory of 2016 5052 4E01.tmp 111 PID 5052 wrote to memory of 2016 5052 4E01.tmp 111 PID 5052 wrote to memory of 2016 5052 4E01.tmp 111 PID 2016 wrote to memory of 3008 2016 4E8D.tmp 112 PID 2016 wrote to memory of 3008 2016 4E8D.tmp 112 PID 2016 wrote to memory of 3008 2016 4E8D.tmp 112 PID 3008 wrote to memory of 4796 3008 4EDB.tmp 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_9453a1216e4196a15fafe1789094cdcb_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\4631.tmp"C:\Users\Admin\AppData\Local\Temp\4631.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\46AE.tmp"C:\Users\Admin\AppData\Local\Temp\46AE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\470B.tmp"C:\Users\Admin\AppData\Local\Temp\470B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\47B7.tmp"C:\Users\Admin\AppData\Local\Temp\47B7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\4825.tmp"C:\Users\Admin\AppData\Local\Temp\4825.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\4882.tmp"C:\Users\Admin\AppData\Local\Temp\4882.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\48E0.tmp"C:\Users\Admin\AppData\Local\Temp\48E0.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\494D.tmp"C:\Users\Admin\AppData\Local\Temp\494D.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\49AB.tmp"C:\Users\Admin\AppData\Local\Temp\49AB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\4A19.tmp"C:\Users\Admin\AppData\Local\Temp\4A19.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\4A76.tmp"C:\Users\Admin\AppData\Local\Temp\4A76.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\4B32.tmp"C:\Users\Admin\AppData\Local\Temp\4B32.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\4B90.tmp"C:\Users\Admin\AppData\Local\Temp\4B90.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\4BFD.tmp"C:\Users\Admin\AppData\Local\Temp\4BFD.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\4C7A.tmp"C:\Users\Admin\AppData\Local\Temp\4C7A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\4D45.tmp"C:\Users\Admin\AppData\Local\Temp\4D45.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"C:\Users\Admin\AppData\Local\Temp\4DB2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\4E01.tmp"C:\Users\Admin\AppData\Local\Temp\4E01.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"7⤵
- Executes dropped EXE
PID:4796
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"1⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\5033.tmp"C:\Users\Admin\AppData\Local\Temp\5033.tmp"2⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\5091.tmp"C:\Users\Admin\AppData\Local\Temp\5091.tmp"3⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"4⤵
- Executes dropped EXE
PID:4772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\51AA.tmp"C:\Users\Admin\AppData\Local\Temp\51AA.tmp"1⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\5246.tmp"C:\Users\Admin\AppData\Local\Temp\5246.tmp"2⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\52A4.tmp"C:\Users\Admin\AppData\Local\Temp\52A4.tmp"3⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\5321.tmp"C:\Users\Admin\AppData\Local\Temp\5321.tmp"4⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\538E.tmp"C:\Users\Admin\AppData\Local\Temp\538E.tmp"5⤵
- Executes dropped EXE
PID:3744
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\515C.tmp"C:\Users\Admin\AppData\Local\Temp\515C.tmp"1⤵
- Executes dropped EXE
PID:1348
-
C:\Users\Admin\AppData\Local\Temp\53EC.tmp"C:\Users\Admin\AppData\Local\Temp\53EC.tmp"1⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\543A.tmp"C:\Users\Admin\AppData\Local\Temp\543A.tmp"2⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\5498.tmp"C:\Users\Admin\AppData\Local\Temp\5498.tmp"3⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\54E6.tmp"C:\Users\Admin\AppData\Local\Temp\54E6.tmp"4⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\5544.tmp"C:\Users\Admin\AppData\Local\Temp\5544.tmp"5⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\5592.tmp"C:\Users\Admin\AppData\Local\Temp\5592.tmp"6⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\55E0.tmp"C:\Users\Admin\AppData\Local\Temp\55E0.tmp"7⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\567C.tmp"C:\Users\Admin\AppData\Local\Temp\567C.tmp"8⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\5709.tmp"C:\Users\Admin\AppData\Local\Temp\5709.tmp"9⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\5786.tmp"C:\Users\Admin\AppData\Local\Temp\5786.tmp"10⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"11⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"12⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"13⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\59C8.tmp"C:\Users\Admin\AppData\Local\Temp\59C8.tmp"14⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\5A55.tmp"C:\Users\Admin\AppData\Local\Temp\5A55.tmp"15⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"C:\Users\Admin\AppData\Local\Temp\5AD2.tmp"16⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"C:\Users\Admin\AppData\Local\Temp\5BCC.tmp"17⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp"18⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\5D24.tmp"C:\Users\Admin\AppData\Local\Temp\5D24.tmp"19⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\5D81.tmp"C:\Users\Admin\AppData\Local\Temp\5D81.tmp"20⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"C:\Users\Admin\AppData\Local\Temp\5DEF.tmp"21⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"22⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"23⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\5F08.tmp"C:\Users\Admin\AppData\Local\Temp\5F08.tmp"24⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\5F66.tmp"C:\Users\Admin\AppData\Local\Temp\5F66.tmp"25⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"C:\Users\Admin\AppData\Local\Temp\5FC3.tmp"26⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"27⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp"28⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\60DD.tmp"C:\Users\Admin\AppData\Local\Temp\60DD.tmp"29⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\614A.tmp"C:\Users\Admin\AppData\Local\Temp\614A.tmp"30⤵
- Executes dropped EXE
PID:516 -
C:\Users\Admin\AppData\Local\Temp\6198.tmp"C:\Users\Admin\AppData\Local\Temp\6198.tmp"31⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\61E6.tmp"C:\Users\Admin\AppData\Local\Temp\61E6.tmp"32⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"33⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\62B1.tmp"C:\Users\Admin\AppData\Local\Temp\62B1.tmp"34⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\630F.tmp"C:\Users\Admin\AppData\Local\Temp\630F.tmp"35⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\636D.tmp"C:\Users\Admin\AppData\Local\Temp\636D.tmp"36⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\63CB.tmp"C:\Users\Admin\AppData\Local\Temp\63CB.tmp"37⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\6438.tmp"C:\Users\Admin\AppData\Local\Temp\6438.tmp"38⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"39⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"40⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"41⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\65AF.tmp"C:\Users\Admin\AppData\Local\Temp\65AF.tmp"42⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\660D.tmp"C:\Users\Admin\AppData\Local\Temp\660D.tmp"43⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"44⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\66B9.tmp"C:\Users\Admin\AppData\Local\Temp\66B9.tmp"45⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\6726.tmp"C:\Users\Admin\AppData\Local\Temp\6726.tmp"46⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"47⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\67C2.tmp"C:\Users\Admin\AppData\Local\Temp\67C2.tmp"48⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"49⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\687E.tmp"C:\Users\Admin\AppData\Local\Temp\687E.tmp"50⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\68DC.tmp"C:\Users\Admin\AppData\Local\Temp\68DC.tmp"51⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"52⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\69A7.tmp"C:\Users\Admin\AppData\Local\Temp\69A7.tmp"53⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\69F5.tmp"C:\Users\Admin\AppData\Local\Temp\69F5.tmp"54⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\6A43.tmp"C:\Users\Admin\AppData\Local\Temp\6A43.tmp"55⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\6A91.tmp"C:\Users\Admin\AppData\Local\Temp\6A91.tmp"56⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"57⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"58⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"59⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"60⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\6C47.tmp"C:\Users\Admin\AppData\Local\Temp\6C47.tmp"61⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"62⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"C:\Users\Admin\AppData\Local\Temp\6CF2.tmp"63⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\6D50.tmp"C:\Users\Admin\AppData\Local\Temp\6D50.tmp"64⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"C:\Users\Admin\AppData\Local\Temp\6D9E.tmp"65⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"66⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"67⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"68⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\6F25.tmp"C:\Users\Admin\AppData\Local\Temp\6F25.tmp"69⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\6F83.tmp"C:\Users\Admin\AppData\Local\Temp\6F83.tmp"70⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"71⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\704E.tmp"C:\Users\Admin\AppData\Local\Temp\704E.tmp"72⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"73⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"74⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\7157.tmp"C:\Users\Admin\AppData\Local\Temp\7157.tmp"75⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"76⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\7213.tmp"C:\Users\Admin\AppData\Local\Temp\7213.tmp"77⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"78⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\72BF.tmp"C:\Users\Admin\AppData\Local\Temp\72BF.tmp"79⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\732C.tmp"C:\Users\Admin\AppData\Local\Temp\732C.tmp"80⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"81⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"82⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"83⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"84⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"85⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"86⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\75AD.tmp"C:\Users\Admin\AppData\Local\Temp\75AD.tmp"87⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"88⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"89⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"90⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"91⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\7772.tmp"C:\Users\Admin\AppData\Local\Temp\7772.tmp"92⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"93⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\780E.tmp"C:\Users\Admin\AppData\Local\Temp\780E.tmp"94⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\786C.tmp"C:\Users\Admin\AppData\Local\Temp\786C.tmp"95⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"96⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\7918.tmp"C:\Users\Admin\AppData\Local\Temp\7918.tmp"97⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\7976.tmp"C:\Users\Admin\AppData\Local\Temp\7976.tmp"98⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\79C4.tmp"C:\Users\Admin\AppData\Local\Temp\79C4.tmp"99⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\7A31.tmp"C:\Users\Admin\AppData\Local\Temp\7A31.tmp"100⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"101⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"102⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"103⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"104⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\7C06.tmp"C:\Users\Admin\AppData\Local\Temp\7C06.tmp"105⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"106⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"107⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"108⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\7D6D.tmp"C:\Users\Admin\AppData\Local\Temp\7D6D.tmp"109⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\7DCB.tmp"C:\Users\Admin\AppData\Local\Temp\7DCB.tmp"110⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"111⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"112⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"113⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\7F13.tmp"C:\Users\Admin\AppData\Local\Temp\7F13.tmp"114⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\7F61.tmp"C:\Users\Admin\AppData\Local\Temp\7F61.tmp"115⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"116⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"117⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\807A.tmp"C:\Users\Admin\AppData\Local\Temp\807A.tmp"118⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\80D8.tmp"C:\Users\Admin\AppData\Local\Temp\80D8.tmp"119⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\8146.tmp"C:\Users\Admin\AppData\Local\Temp\8146.tmp"120⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\8194.tmp"C:\Users\Admin\AppData\Local\Temp\8194.tmp"121⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"122⤵PID:1680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-