Analysis
-
max time kernel
159s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 01:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe
-
Size
486KB
-
MD5
409d4dafa410d72170af531319c50705
-
SHA1
c3eef669590fa0b84b9c51b91b05c7544f88f103
-
SHA256
2b617c7f9e94ecb336d8407106f4df0faf9884de2fd5dab77a02024e932b57d0
-
SHA512
6b20d282d9d0b364078021b9bf5532364f958fb481af235b06b752f4703308e2e93bbb6551b331c4c065a57a5a0e11062b7c59ea2ffa7bbeffb46b4dc6e1f520
-
SSDEEP
12288:/U5rCOTeiDLJBle9b27p0vO8ECFCdSqRcgNZ:/UQOJDLFex2p0vOHuCdSqugN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1916 5BF6.tmp 4612 5FAF.tmp 1840 6201.tmp 4836 6675.tmp 1812 684A.tmp 4920 6A9C.tmp 4696 6B09.tmp 3764 6C71.tmp 2784 6E94.tmp 3444 6F4F.tmp 4144 7049.tmp 2264 7182.tmp 4008 7385.tmp 3976 7460.tmp 4088 751B.tmp 2368 75A8.tmp 4296 7654.tmp 4616 77AC.tmp 4776 7858.tmp 2684 7903.tmp 4252 79A0.tmp 4092 7A2C.tmp 2424 7AD8.tmp 4180 7BC3.tmp 2264 7C4F.tmp 3088 7D1A.tmp 3976 7ED0.tmp 4500 7F6C.tmp 3228 8008.tmp 4296 8076.tmp 4412 8131.tmp 4508 81ED.tmp 3836 8344.tmp 2336 849C.tmp 4160 8548.tmp 1732 8623.tmp 2900 871D.tmp 4952 878A.tmp 1916 88B3.tmp 4320 8920.tmp 4500 898E.tmp 2368 8A0B.tmp 1664 8A88.tmp 1460 8B05.tmp 960 8B82.tmp 3444 8C5D.tmp 2424 8CCA.tmp 3744 8D37.tmp 4300 8D95.tmp 536 8E12.tmp 1104 8E8F.tmp 2672 8F2B.tmp 2836 8F99.tmp 4912 9006.tmp 2900 9093.tmp 4952 911F.tmp 3608 918D.tmp 4320 91FA.tmp 5108 9296.tmp 792 9313.tmp 3836 93FE.tmp 1820 94C9.tmp 4180 9536.tmp 1480 95A4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1916 4756 2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe 100 PID 4756 wrote to memory of 1916 4756 2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe 100 PID 4756 wrote to memory of 1916 4756 2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe 100 PID 1916 wrote to memory of 4612 1916 5BF6.tmp 101 PID 1916 wrote to memory of 4612 1916 5BF6.tmp 101 PID 1916 wrote to memory of 4612 1916 5BF6.tmp 101 PID 4612 wrote to memory of 1840 4612 5FAF.tmp 102 PID 4612 wrote to memory of 1840 4612 5FAF.tmp 102 PID 4612 wrote to memory of 1840 4612 5FAF.tmp 102 PID 1840 wrote to memory of 4836 1840 6201.tmp 103 PID 1840 wrote to memory of 4836 1840 6201.tmp 103 PID 1840 wrote to memory of 4836 1840 6201.tmp 103 PID 4340 wrote to memory of 1812 4340 6731.tmp 105 PID 4340 wrote to memory of 1812 4340 6731.tmp 105 PID 4340 wrote to memory of 1812 4340 6731.tmp 105 PID 1812 wrote to memory of 4920 1812 684A.tmp 106 PID 1812 wrote to memory of 4920 1812 684A.tmp 106 PID 1812 wrote to memory of 4920 1812 684A.tmp 106 PID 4920 wrote to memory of 4696 4920 6A9C.tmp 107 PID 4920 wrote to memory of 4696 4920 6A9C.tmp 107 PID 4920 wrote to memory of 4696 4920 6A9C.tmp 107 PID 4696 wrote to memory of 3764 4696 6B09.tmp 132 PID 4696 wrote to memory of 3764 4696 6B09.tmp 132 PID 4696 wrote to memory of 3764 4696 6B09.tmp 132 PID 3764 wrote to memory of 2784 3764 6C71.tmp 109 PID 3764 wrote to memory of 2784 3764 6C71.tmp 109 PID 3764 wrote to memory of 2784 3764 6C71.tmp 109 PID 2784 wrote to memory of 3444 2784 6E94.tmp 148 PID 2784 wrote to memory of 3444 2784 6E94.tmp 148 PID 2784 wrote to memory of 3444 2784 6E94.tmp 148 PID 3444 wrote to memory of 4144 3444 6F4F.tmp 199 PID 3444 wrote to memory of 4144 3444 6F4F.tmp 199 PID 3444 wrote to memory of 4144 3444 6F4F.tmp 199 PID 4144 wrote to memory of 2264 4144 7049.tmp 205 PID 4144 wrote to memory of 2264 4144 7049.tmp 205 PID 4144 wrote to memory of 2264 4144 7049.tmp 205 PID 2264 wrote to memory of 4008 2264 7182.tmp 113 PID 2264 wrote to memory of 4008 2264 7182.tmp 113 PID 2264 wrote to memory of 4008 2264 7182.tmp 113 PID 4008 wrote to memory of 3976 4008 7385.tmp 127 PID 4008 wrote to memory of 3976 4008 7385.tmp 127 PID 4008 wrote to memory of 3976 4008 7385.tmp 127 PID 3976 wrote to memory of 4088 3976 7460.tmp 115 PID 3976 wrote to memory of 4088 3976 7460.tmp 115 PID 3976 wrote to memory of 4088 3976 7460.tmp 115 PID 4088 wrote to memory of 2368 4088 751B.tmp 143 PID 4088 wrote to memory of 2368 4088 751B.tmp 143 PID 4088 wrote to memory of 2368 4088 751B.tmp 143 PID 2368 wrote to memory of 4296 2368 75A8.tmp 130 PID 2368 wrote to memory of 4296 2368 75A8.tmp 130 PID 2368 wrote to memory of 4296 2368 75A8.tmp 130 PID 4296 wrote to memory of 4616 4296 7654.tmp 118 PID 4296 wrote to memory of 4616 4296 7654.tmp 118 PID 4296 wrote to memory of 4616 4296 7654.tmp 118 PID 4616 wrote to memory of 4776 4616 77AC.tmp 119 PID 4616 wrote to memory of 4776 4616 77AC.tmp 119 PID 4616 wrote to memory of 4776 4616 77AC.tmp 119 PID 4776 wrote to memory of 2684 4776 7858.tmp 120 PID 4776 wrote to memory of 2684 4776 7858.tmp 120 PID 4776 wrote to memory of 2684 4776 7858.tmp 120 PID 2684 wrote to memory of 4252 2684 7903.tmp 121 PID 2684 wrote to memory of 4252 2684 7903.tmp 121 PID 2684 wrote to memory of 4252 2684 7903.tmp 121 PID 4252 wrote to memory of 4092 4252 79A0.tmp 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_409d4dafa410d72170af531319c50705_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\6201.tmp"C:\Users\Admin\AppData\Local\Temp\6201.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"5⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\6731.tmp"C:\Users\Admin\AppData\Local\Temp\6731.tmp"6⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\684A.tmp"C:\Users\Admin\AppData\Local\Temp\684A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\6A9C.tmp"C:\Users\Admin\AppData\Local\Temp\6A9C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\6C71.tmp"C:\Users\Admin\AppData\Local\Temp\6C71.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\6E94.tmp"C:\Users\Admin\AppData\Local\Temp\6E94.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\7049.tmp"C:\Users\Admin\AppData\Local\Temp\7049.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\7182.tmp"C:\Users\Admin\AppData\Local\Temp\7182.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\7385.tmp"C:\Users\Admin\AppData\Local\Temp\7385.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\7460.tmp"C:\Users\Admin\AppData\Local\Temp\7460.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\75A8.tmp"C:\Users\Admin\AppData\Local\Temp\75A8.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\7654.tmp"C:\Users\Admin\AppData\Local\Temp\7654.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\77AC.tmp"C:\Users\Admin\AppData\Local\Temp\77AC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\7858.tmp"C:\Users\Admin\AppData\Local\Temp\7858.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\7903.tmp"C:\Users\Admin\AppData\Local\Temp\7903.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\79A0.tmp"C:\Users\Admin\AppData\Local\Temp\79A0.tmp"23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\7A2C.tmp"C:\Users\Admin\AppData\Local\Temp\7A2C.tmp"24⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\7AD8.tmp"C:\Users\Admin\AppData\Local\Temp\7AD8.tmp"25⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"26⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"27⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\7D1A.tmp"C:\Users\Admin\AppData\Local\Temp\7D1A.tmp"28⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\7ED0.tmp"C:\Users\Admin\AppData\Local\Temp\7ED0.tmp"29⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\7F6C.tmp"C:\Users\Admin\AppData\Local\Temp\7F6C.tmp"30⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\8008.tmp"C:\Users\Admin\AppData\Local\Temp\8008.tmp"31⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\8076.tmp"C:\Users\Admin\AppData\Local\Temp\8076.tmp"32⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\8131.tmp"C:\Users\Admin\AppData\Local\Temp\8131.tmp"33⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\81ED.tmp"C:\Users\Admin\AppData\Local\Temp\81ED.tmp"34⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\8344.tmp"C:\Users\Admin\AppData\Local\Temp\8344.tmp"35⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\849C.tmp"C:\Users\Admin\AppData\Local\Temp\849C.tmp"36⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\8548.tmp"C:\Users\Admin\AppData\Local\Temp\8548.tmp"37⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\8623.tmp"C:\Users\Admin\AppData\Local\Temp\8623.tmp"38⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\871D.tmp"C:\Users\Admin\AppData\Local\Temp\871D.tmp"39⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\878A.tmp"C:\Users\Admin\AppData\Local\Temp\878A.tmp"40⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\88B3.tmp"C:\Users\Admin\AppData\Local\Temp\88B3.tmp"41⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\8920.tmp"C:\Users\Admin\AppData\Local\Temp\8920.tmp"42⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\898E.tmp"C:\Users\Admin\AppData\Local\Temp\898E.tmp"43⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\8A0B.tmp"C:\Users\Admin\AppData\Local\Temp\8A0B.tmp"44⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\8A88.tmp"C:\Users\Admin\AppData\Local\Temp\8A88.tmp"45⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\8B05.tmp"C:\Users\Admin\AppData\Local\Temp\8B05.tmp"46⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\8B82.tmp"C:\Users\Admin\AppData\Local\Temp\8B82.tmp"47⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"48⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"49⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\8D37.tmp"C:\Users\Admin\AppData\Local\Temp\8D37.tmp"50⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\8D95.tmp"C:\Users\Admin\AppData\Local\Temp\8D95.tmp"51⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\8E12.tmp"C:\Users\Admin\AppData\Local\Temp\8E12.tmp"52⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"53⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"54⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\8F99.tmp"C:\Users\Admin\AppData\Local\Temp\8F99.tmp"55⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\9006.tmp"C:\Users\Admin\AppData\Local\Temp\9006.tmp"56⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\9093.tmp"C:\Users\Admin\AppData\Local\Temp\9093.tmp"57⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\911F.tmp"C:\Users\Admin\AppData\Local\Temp\911F.tmp"58⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\918D.tmp"C:\Users\Admin\AppData\Local\Temp\918D.tmp"59⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\91FA.tmp"C:\Users\Admin\AppData\Local\Temp\91FA.tmp"60⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\9296.tmp"C:\Users\Admin\AppData\Local\Temp\9296.tmp"61⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\9313.tmp"C:\Users\Admin\AppData\Local\Temp\9313.tmp"62⤵
- Executes dropped EXE
PID:792 -
C:\Users\Admin\AppData\Local\Temp\93FE.tmp"C:\Users\Admin\AppData\Local\Temp\93FE.tmp"63⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\94C9.tmp"C:\Users\Admin\AppData\Local\Temp\94C9.tmp"64⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\9536.tmp"C:\Users\Admin\AppData\Local\Temp\9536.tmp"65⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\95A4.tmp"C:\Users\Admin\AppData\Local\Temp\95A4.tmp"66⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\9621.tmp"C:\Users\Admin\AppData\Local\Temp\9621.tmp"67⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\972A.tmp"C:\Users\Admin\AppData\Local\Temp\972A.tmp"68⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\9798.tmp"C:\Users\Admin\AppData\Local\Temp\9798.tmp"69⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\9805.tmp"C:\Users\Admin\AppData\Local\Temp\9805.tmp"70⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\9882.tmp"C:\Users\Admin\AppData\Local\Temp\9882.tmp"71⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\98FF.tmp"C:\Users\Admin\AppData\Local\Temp\98FF.tmp"72⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\99BA.tmp"C:\Users\Admin\AppData\Local\Temp\99BA.tmp"73⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\9A28.tmp"C:\Users\Admin\AppData\Local\Temp\9A28.tmp"74⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"75⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"76⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"77⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\9D35.tmp"C:\Users\Admin\AppData\Local\Temp\9D35.tmp"78⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\9E8D.tmp"C:\Users\Admin\AppData\Local\Temp\9E8D.tmp"79⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"80⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\9F77.tmp"C:\Users\Admin\AppData\Local\Temp\9F77.tmp"81⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\9FE5.tmp"C:\Users\Admin\AppData\Local\Temp\9FE5.tmp"82⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\A0B0.tmp"C:\Users\Admin\AppData\Local\Temp\A0B0.tmp"83⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\A14C.tmp"C:\Users\Admin\AppData\Local\Temp\A14C.tmp"84⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\A4C7.tmp"C:\Users\Admin\AppData\Local\Temp\A4C7.tmp"85⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\A534.tmp"C:\Users\Admin\AppData\Local\Temp\A534.tmp"86⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\A5C1.tmp"C:\Users\Admin\AppData\Local\Temp\A5C1.tmp"87⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\A62E.tmp"C:\Users\Admin\AppData\Local\Temp\A62E.tmp"88⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\A69B.tmp"C:\Users\Admin\AppData\Local\Temp\A69B.tmp"89⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\A709.tmp"C:\Users\Admin\AppData\Local\Temp\A709.tmp"90⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\A7E3.tmp"C:\Users\Admin\AppData\Local\Temp\A7E3.tmp"91⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\A8DD.tmp"C:\Users\Admin\AppData\Local\Temp\A8DD.tmp"92⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\A94B.tmp"C:\Users\Admin\AppData\Local\Temp\A94B.tmp"93⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\A9B8.tmp"C:\Users\Admin\AppData\Local\Temp\A9B8.tmp"94⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\AA26.tmp"C:\Users\Admin\AppData\Local\Temp\AA26.tmp"95⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\AAE1.tmp"C:\Users\Admin\AppData\Local\Temp\AAE1.tmp"96⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\AB7D.tmp"C:\Users\Admin\AppData\Local\Temp\AB7D.tmp"97⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\ABEB.tmp"C:\Users\Admin\AppData\Local\Temp\ABEB.tmp"98⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\AC58.tmp"C:\Users\Admin\AppData\Local\Temp\AC58.tmp"99⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\AD52.tmp"C:\Users\Admin\AppData\Local\Temp\AD52.tmp"100⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\ADBF.tmp"C:\Users\Admin\AppData\Local\Temp\ADBF.tmp"101⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\AE2D.tmp"C:\Users\Admin\AppData\Local\Temp\AE2D.tmp"102⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\AE9A.tmp"C:\Users\Admin\AppData\Local\Temp\AE9A.tmp"103⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\B169.tmp"C:\Users\Admin\AppData\Local\Temp\B169.tmp"104⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"105⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\B244.tmp"C:\Users\Admin\AppData\Local\Temp\B244.tmp"106⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"C:\Users\Admin\AppData\Local\Temp\B2B1.tmp"107⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\B31E.tmp"C:\Users\Admin\AppData\Local\Temp\B31E.tmp"108⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\B428.tmp"C:\Users\Admin\AppData\Local\Temp\B428.tmp"109⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\B4B5.tmp"C:\Users\Admin\AppData\Local\Temp\B4B5.tmp"110⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\B522.tmp"C:\Users\Admin\AppData\Local\Temp\B522.tmp"111⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\B689.tmp"C:\Users\Admin\AppData\Local\Temp\B689.tmp"112⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\B783.tmp"C:\Users\Admin\AppData\Local\Temp\B783.tmp"113⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\B83F.tmp"C:\Users\Admin\AppData\Local\Temp\B83F.tmp"114⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"C:\Users\Admin\AppData\Local\Temp\B8BC.tmp"115⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\B958.tmp"C:\Users\Admin\AppData\Local\Temp\B958.tmp"116⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\B9E5.tmp"C:\Users\Admin\AppData\Local\Temp\B9E5.tmp"117⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\BAA0.tmp"C:\Users\Admin\AppData\Local\Temp\BAA0.tmp"118⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\BB4C.tmp"C:\Users\Admin\AppData\Local\Temp\BB4C.tmp"119⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\BC56.tmp"C:\Users\Admin\AppData\Local\Temp\BC56.tmp"120⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"121⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\BD9E.tmp"C:\Users\Admin\AppData\Local\Temp\BD9E.tmp"122⤵PID:1844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-