Analysis
-
max time kernel
164s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 19:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe
-
Size
529KB
-
MD5
d773c2b732e33609912e1f773b178686
-
SHA1
70680550aad2310f8af913f2194e061272d9f62e
-
SHA256
aa7c176637db83c45bb4a5546a5735aa33cd7d29f628ab88938bd87f3c929a5e
-
SHA512
59e959b974c82611ce444e750d450e2e7a0b7c58dbffa135ee64b6e176f4234cf69a6b865892648adb59d3109c3e206952ab1b901e25f8fe4a8a6e64a593c6b5
-
SSDEEP
12288:NU5rCOTeij1tewIBUn6n8j4Z1CTZwlH4Hp:NUQOJj3ewM8jScTSlH4Hp
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1720 ADF3.tmp 3344 AEDD.tmp 2524 AF99.tmp 2320 B0C2.tmp 3684 B14E.tmp 4248 B1EB.tmp 1176 B2B6.tmp 4732 B352.tmp 4624 B3FE.tmp 3120 B4F8.tmp 1472 B594.tmp 2628 B640.tmp 3640 B6FC.tmp 1820 B769.tmp 4584 B882.tmp 4104 B91E.tmp 4292 B9BB.tmp 1292 BA67.tmp 4172 BAE4.tmp 1956 BB70.tmp 2732 BC89.tmp 4360 BD35.tmp 4780 BDE1.tmp 1296 BE9D.tmp 2560 BF77.tmp 4688 BFF4.tmp 4116 C0A0.tmp 2592 C10E.tmp 2804 C1C9.tmp 4572 C285.tmp 1896 C321.tmp 1908 C3EC.tmp 4084 C4B7.tmp 3820 C534.tmp 2776 C592.tmp 1120 C5F0.tmp 316 C64D.tmp 4068 C6BB.tmp 964 C728.tmp 60 C7B5.tmp 4820 C832.tmp 3772 C8FD.tmp 1688 C96A.tmp 2068 C9E7.tmp 3856 CA55.tmp 1328 CAE1.tmp 1788 CB4F.tmp 1820 CBCC.tmp 4244 CC39.tmp 3208 CC97.tmp 3996 CD04.tmp 4292 CDC0.tmp 3736 CE1D.tmp 4440 CE9A.tmp 4172 CF17.tmp 2028 CF85.tmp 728 D002.tmp 1392 D08E.tmp 2648 D11B.tmp 404 D198.tmp 1876 D234.tmp 3420 D2B1.tmp 4656 D32E.tmp 1540 D3BB.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1720 1504 2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe 89 PID 1504 wrote to memory of 1720 1504 2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe 89 PID 1504 wrote to memory of 1720 1504 2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe 89 PID 1720 wrote to memory of 3344 1720 ADF3.tmp 91 PID 1720 wrote to memory of 3344 1720 ADF3.tmp 91 PID 1720 wrote to memory of 3344 1720 ADF3.tmp 91 PID 3344 wrote to memory of 2524 3344 AEDD.tmp 92 PID 3344 wrote to memory of 2524 3344 AEDD.tmp 92 PID 3344 wrote to memory of 2524 3344 AEDD.tmp 92 PID 2524 wrote to memory of 2320 2524 AF99.tmp 94 PID 2524 wrote to memory of 2320 2524 AF99.tmp 94 PID 2524 wrote to memory of 2320 2524 AF99.tmp 94 PID 2320 wrote to memory of 3684 2320 B0C2.tmp 95 PID 2320 wrote to memory of 3684 2320 B0C2.tmp 95 PID 2320 wrote to memory of 3684 2320 B0C2.tmp 95 PID 3684 wrote to memory of 4248 3684 B14E.tmp 96 PID 3684 wrote to memory of 4248 3684 B14E.tmp 96 PID 3684 wrote to memory of 4248 3684 B14E.tmp 96 PID 4248 wrote to memory of 1176 4248 B1EB.tmp 97 PID 4248 wrote to memory of 1176 4248 B1EB.tmp 97 PID 4248 wrote to memory of 1176 4248 B1EB.tmp 97 PID 1176 wrote to memory of 4732 1176 B2B6.tmp 98 PID 1176 wrote to memory of 4732 1176 B2B6.tmp 98 PID 1176 wrote to memory of 4732 1176 B2B6.tmp 98 PID 4732 wrote to memory of 4624 4732 B352.tmp 99 PID 4732 wrote to memory of 4624 4732 B352.tmp 99 PID 4732 wrote to memory of 4624 4732 B352.tmp 99 PID 4624 wrote to memory of 3120 4624 B3FE.tmp 101 PID 4624 wrote to memory of 3120 4624 B3FE.tmp 101 PID 4624 wrote to memory of 3120 4624 B3FE.tmp 101 PID 3120 wrote to memory of 1472 3120 B4F8.tmp 102 PID 3120 wrote to memory of 1472 3120 B4F8.tmp 102 PID 3120 wrote to memory of 1472 3120 B4F8.tmp 102 PID 1472 wrote to memory of 2628 1472 B594.tmp 103 PID 1472 wrote to memory of 2628 1472 B594.tmp 103 PID 1472 wrote to memory of 2628 1472 B594.tmp 103 PID 2628 wrote to memory of 3640 2628 B640.tmp 104 PID 2628 wrote to memory of 3640 2628 B640.tmp 104 PID 2628 wrote to memory of 3640 2628 B640.tmp 104 PID 3640 wrote to memory of 1820 3640 B6FC.tmp 105 PID 3640 wrote to memory of 1820 3640 B6FC.tmp 105 PID 3640 wrote to memory of 1820 3640 B6FC.tmp 105 PID 1820 wrote to memory of 4584 1820 B769.tmp 106 PID 1820 wrote to memory of 4584 1820 B769.tmp 106 PID 1820 wrote to memory of 4584 1820 B769.tmp 106 PID 4584 wrote to memory of 4104 4584 B882.tmp 107 PID 4584 wrote to memory of 4104 4584 B882.tmp 107 PID 4584 wrote to memory of 4104 4584 B882.tmp 107 PID 4104 wrote to memory of 4292 4104 B91E.tmp 108 PID 4104 wrote to memory of 4292 4104 B91E.tmp 108 PID 4104 wrote to memory of 4292 4104 B91E.tmp 108 PID 4292 wrote to memory of 1292 4292 B9BB.tmp 109 PID 4292 wrote to memory of 1292 4292 B9BB.tmp 109 PID 4292 wrote to memory of 1292 4292 B9BB.tmp 109 PID 1292 wrote to memory of 4172 1292 BA67.tmp 110 PID 1292 wrote to memory of 4172 1292 BA67.tmp 110 PID 1292 wrote to memory of 4172 1292 BA67.tmp 110 PID 4172 wrote to memory of 1956 4172 BAE4.tmp 111 PID 4172 wrote to memory of 1956 4172 BAE4.tmp 111 PID 4172 wrote to memory of 1956 4172 BAE4.tmp 111 PID 1956 wrote to memory of 2732 1956 BB70.tmp 112 PID 1956 wrote to memory of 2732 1956 BB70.tmp 112 PID 1956 wrote to memory of 2732 1956 BB70.tmp 112 PID 2732 wrote to memory of 4360 2732 BC89.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_d773c2b732e33609912e1f773b178686_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\B0C2.tmp"C:\Users\Admin\AppData\Local\Temp\B0C2.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"C:\Users\Admin\AppData\Local\Temp\B3FE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\B594.tmp"C:\Users\Admin\AppData\Local\Temp\B594.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\B769.tmp"C:\Users\Admin\AppData\Local\Temp\B769.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\B882.tmp"C:\Users\Admin\AppData\Local\Temp\B882.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\BA67.tmp"C:\Users\Admin\AppData\Local\Temp\BA67.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\BB70.tmp"C:\Users\Admin\AppData\Local\Temp\BB70.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\BC89.tmp"C:\Users\Admin\AppData\Local\Temp\BC89.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"23⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"24⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"25⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\BF77.tmp"C:\Users\Admin\AppData\Local\Temp\BF77.tmp"26⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"27⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"28⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"29⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"30⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"31⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\C321.tmp"C:\Users\Admin\AppData\Local\Temp\C321.tmp"32⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"33⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"34⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"35⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"36⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"37⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\C64D.tmp"C:\Users\Admin\AppData\Local\Temp\C64D.tmp"38⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\C6BB.tmp"C:\Users\Admin\AppData\Local\Temp\C6BB.tmp"39⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\C728.tmp"C:\Users\Admin\AppData\Local\Temp\C728.tmp"40⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"41⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\C832.tmp"C:\Users\Admin\AppData\Local\Temp\C832.tmp"42⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"43⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\C96A.tmp"C:\Users\Admin\AppData\Local\Temp\C96A.tmp"44⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"45⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\CA55.tmp"C:\Users\Admin\AppData\Local\Temp\CA55.tmp"46⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"47⤵
- Executes dropped EXE
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"48⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"49⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\CC39.tmp"C:\Users\Admin\AppData\Local\Temp\CC39.tmp"50⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"51⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\CD04.tmp"C:\Users\Admin\AppData\Local\Temp\CD04.tmp"52⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"53⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"54⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"55⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\CF17.tmp"C:\Users\Admin\AppData\Local\Temp\CF17.tmp"56⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\CF85.tmp"C:\Users\Admin\AppData\Local\Temp\CF85.tmp"57⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\D002.tmp"C:\Users\Admin\AppData\Local\Temp\D002.tmp"58⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"59⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"60⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\D198.tmp"C:\Users\Admin\AppData\Local\Temp\D198.tmp"61⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"62⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"63⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"64⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"65⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"66⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\D4E4.tmp"C:\Users\Admin\AppData\Local\Temp\D4E4.tmp"67⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\D561.tmp"C:\Users\Admin\AppData\Local\Temp\D561.tmp"68⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"69⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\D67A.tmp"C:\Users\Admin\AppData\Local\Temp\D67A.tmp"70⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\D707.tmp"C:\Users\Admin\AppData\Local\Temp\D707.tmp"71⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\D793.tmp"C:\Users\Admin\AppData\Local\Temp\D793.tmp"72⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"73⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"74⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\D92A.tmp"C:\Users\Admin\AppData\Local\Temp\D92A.tmp"75⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"76⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\DA43.tmp"C:\Users\Admin\AppData\Local\Temp\DA43.tmp"77⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"78⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"79⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"80⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"81⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"82⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"83⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"84⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\DE98.tmp"C:\Users\Admin\AppData\Local\Temp\DE98.tmp"85⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"86⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"87⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"88⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\E04E.tmp"C:\Users\Admin\AppData\Local\Temp\E04E.tmp"89⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"90⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\E138.tmp"C:\Users\Admin\AppData\Local\Temp\E138.tmp"91⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"92⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"93⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\E2FD.tmp"C:\Users\Admin\AppData\Local\Temp\E2FD.tmp"94⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"95⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"96⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"97⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"98⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"99⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\E57E.tmp"C:\Users\Admin\AppData\Local\Temp\E57E.tmp"100⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"101⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"102⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\E714.tmp"C:\Users\Admin\AppData\Local\Temp\E714.tmp"103⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\E781.tmp"C:\Users\Admin\AppData\Local\Temp\E781.tmp"104⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\E84D.tmp"C:\Users\Admin\AppData\Local\Temp\E84D.tmp"105⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"106⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\E975.tmp"C:\Users\Admin\AppData\Local\Temp\E975.tmp"107⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\EA02.tmp"C:\Users\Admin\AppData\Local\Temp\EA02.tmp"108⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"109⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"110⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"111⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"112⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"113⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"114⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"115⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"116⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\EE48.tmp"C:\Users\Admin\AppData\Local\Temp\EE48.tmp"117⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"118⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\EF61.tmp"C:\Users\Admin\AppData\Local\Temp\EF61.tmp"119⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"120⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\F06B.tmp"C:\Users\Admin\AppData\Local\Temp\F06B.tmp"121⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\F117.tmp"C:\Users\Admin\AppData\Local\Temp\F117.tmp"122⤵PID:3920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-