Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 20:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe
-
Size
486KB
-
MD5
4a8b31ee3954392559603b73e24f3c8e
-
SHA1
868ae65cb951f2d6689330f978b231a790543cfe
-
SHA256
aaed4c7843fb21bf4ac0ebc2f5617cfb2d320a24e1effd9e800846144dae58e5
-
SHA512
7ef2d1c79281e44b60e4a29258a18821dc049d3d2e8916382af26f8659f2830579a29b9be82432ec801868fef21ed479b0a3b49abe505da67636f41c2342f511
-
SSDEEP
12288:UU5rCOTeiD5D3jkLzm2TDLzT/SlHZLW2ApJNZ:UUQOJDVgLzjTXcZLWJN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2084 755F.tmp 3056 761A.tmp 3980 76E5.tmp 4360 7791.tmp 624 784D.tmp 1996 78D9.tmp 2404 7966.tmp 2808 7A70.tmp 4164 7B4A.tmp 744 7BD7.tmp 2420 7C64.tmp 4904 7D00.tmp 4836 7D9C.tmp 1784 7E58.tmp 2852 7F52.tmp 4788 7FCF.tmp 1276 805B.tmp 996 8117.tmp 2748 81C3.tmp 1812 826E.tmp 1052 832A.tmp 4668 83F5.tmp 3864 8491.tmp 3224 854D.tmp 1476 8608.tmp 2880 86F3.tmp 4120 87DD.tmp 4520 8899.tmp 4336 8944.tmp 3220 8A2F.tmp 3468 8AFA.tmp 3944 8BE4.tmp 4764 8CAF.tmp 2872 8D6B.tmp 464 8E26.tmp 3560 8EA3.tmp 3696 8F30.tmp 1196 8FCC.tmp 4444 90D6.tmp 3520 9182.tmp 2544 923D.tmp 2084 92BA.tmp 1540 9376.tmp 3180 93F3.tmp 208 948F.tmp 1948 952B.tmp 3152 95F6.tmp 4948 9683.tmp 760 971F.tmp 3920 97BC.tmp 3732 9858.tmp 1996 9904.tmp 2308 99B0.tmp 3680 9A2D.tmp 3900 9AC9.tmp 4220 9B65.tmp 1072 9C11.tmp 2324 9CAD.tmp 3320 9D49.tmp 4376 9DE6.tmp 3708 9E72.tmp 4836 9EFF.tmp 1516 9FAB.tmp 1784 A066.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 2084 4144 2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe 83 PID 4144 wrote to memory of 2084 4144 2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe 83 PID 4144 wrote to memory of 2084 4144 2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe 83 PID 2084 wrote to memory of 3056 2084 755F.tmp 85 PID 2084 wrote to memory of 3056 2084 755F.tmp 85 PID 2084 wrote to memory of 3056 2084 755F.tmp 85 PID 3056 wrote to memory of 3980 3056 761A.tmp 86 PID 3056 wrote to memory of 3980 3056 761A.tmp 86 PID 3056 wrote to memory of 3980 3056 761A.tmp 86 PID 3980 wrote to memory of 4360 3980 76E5.tmp 88 PID 3980 wrote to memory of 4360 3980 76E5.tmp 88 PID 3980 wrote to memory of 4360 3980 76E5.tmp 88 PID 4360 wrote to memory of 624 4360 7791.tmp 89 PID 4360 wrote to memory of 624 4360 7791.tmp 89 PID 4360 wrote to memory of 624 4360 7791.tmp 89 PID 624 wrote to memory of 1996 624 784D.tmp 90 PID 624 wrote to memory of 1996 624 784D.tmp 90 PID 624 wrote to memory of 1996 624 784D.tmp 90 PID 1996 wrote to memory of 2404 1996 78D9.tmp 91 PID 1996 wrote to memory of 2404 1996 78D9.tmp 91 PID 1996 wrote to memory of 2404 1996 78D9.tmp 91 PID 2404 wrote to memory of 2808 2404 7966.tmp 93 PID 2404 wrote to memory of 2808 2404 7966.tmp 93 PID 2404 wrote to memory of 2808 2404 7966.tmp 93 PID 2808 wrote to memory of 4164 2808 7A70.tmp 94 PID 2808 wrote to memory of 4164 2808 7A70.tmp 94 PID 2808 wrote to memory of 4164 2808 7A70.tmp 94 PID 4164 wrote to memory of 744 4164 7B4A.tmp 95 PID 4164 wrote to memory of 744 4164 7B4A.tmp 95 PID 4164 wrote to memory of 744 4164 7B4A.tmp 95 PID 744 wrote to memory of 2420 744 7BD7.tmp 96 PID 744 wrote to memory of 2420 744 7BD7.tmp 96 PID 744 wrote to memory of 2420 744 7BD7.tmp 96 PID 2420 wrote to memory of 4904 2420 7C64.tmp 97 PID 2420 wrote to memory of 4904 2420 7C64.tmp 97 PID 2420 wrote to memory of 4904 2420 7C64.tmp 97 PID 4904 wrote to memory of 4836 4904 7D00.tmp 98 PID 4904 wrote to memory of 4836 4904 7D00.tmp 98 PID 4904 wrote to memory of 4836 4904 7D00.tmp 98 PID 4836 wrote to memory of 1784 4836 7D9C.tmp 99 PID 4836 wrote to memory of 1784 4836 7D9C.tmp 99 PID 4836 wrote to memory of 1784 4836 7D9C.tmp 99 PID 1784 wrote to memory of 2852 1784 7E58.tmp 100 PID 1784 wrote to memory of 2852 1784 7E58.tmp 100 PID 1784 wrote to memory of 2852 1784 7E58.tmp 100 PID 2852 wrote to memory of 4788 2852 7F52.tmp 102 PID 2852 wrote to memory of 4788 2852 7F52.tmp 102 PID 2852 wrote to memory of 4788 2852 7F52.tmp 102 PID 4788 wrote to memory of 1276 4788 7FCF.tmp 103 PID 4788 wrote to memory of 1276 4788 7FCF.tmp 103 PID 4788 wrote to memory of 1276 4788 7FCF.tmp 103 PID 1276 wrote to memory of 996 1276 805B.tmp 104 PID 1276 wrote to memory of 996 1276 805B.tmp 104 PID 1276 wrote to memory of 996 1276 805B.tmp 104 PID 996 wrote to memory of 2748 996 8117.tmp 105 PID 996 wrote to memory of 2748 996 8117.tmp 105 PID 996 wrote to memory of 2748 996 8117.tmp 105 PID 2748 wrote to memory of 1812 2748 81C3.tmp 107 PID 2748 wrote to memory of 1812 2748 81C3.tmp 107 PID 2748 wrote to memory of 1812 2748 81C3.tmp 107 PID 1812 wrote to memory of 1052 1812 826E.tmp 108 PID 1812 wrote to memory of 1052 1812 826E.tmp 108 PID 1812 wrote to memory of 1052 1812 826E.tmp 108 PID 1052 wrote to memory of 4668 1052 832A.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_4a8b31ee3954392559603b73e24f3c8e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\755F.tmp"C:\Users\Admin\AppData\Local\Temp\755F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\76E5.tmp"C:\Users\Admin\AppData\Local\Temp\76E5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\784D.tmp"C:\Users\Admin\AppData\Local\Temp\784D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\78D9.tmp"C:\Users\Admin\AppData\Local\Temp\78D9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\7966.tmp"C:\Users\Admin\AppData\Local\Temp\7966.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\7A70.tmp"C:\Users\Admin\AppData\Local\Temp\7A70.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"C:\Users\Admin\AppData\Local\Temp\7B4A.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\7C64.tmp"C:\Users\Admin\AppData\Local\Temp\7C64.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\7D00.tmp"C:\Users\Admin\AppData\Local\Temp\7D00.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\7E58.tmp"C:\Users\Admin\AppData\Local\Temp\7E58.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\805B.tmp"C:\Users\Admin\AppData\Local\Temp\805B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\8117.tmp"C:\Users\Admin\AppData\Local\Temp\8117.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\81C3.tmp"C:\Users\Admin\AppData\Local\Temp\81C3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\832A.tmp"C:\Users\Admin\AppData\Local\Temp\832A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\83F5.tmp"C:\Users\Admin\AppData\Local\Temp\83F5.tmp"23⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"24⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\854D.tmp"C:\Users\Admin\AppData\Local\Temp\854D.tmp"25⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\8608.tmp"C:\Users\Admin\AppData\Local\Temp\8608.tmp"26⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"27⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"28⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\8899.tmp"C:\Users\Admin\AppData\Local\Temp\8899.tmp"29⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"30⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"31⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\8AFA.tmp"C:\Users\Admin\AppData\Local\Temp\8AFA.tmp"32⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"33⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"34⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"35⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\8E26.tmp"C:\Users\Admin\AppData\Local\Temp\8E26.tmp"36⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"37⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\8F30.tmp"C:\Users\Admin\AppData\Local\Temp\8F30.tmp"38⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"39⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\90D6.tmp"C:\Users\Admin\AppData\Local\Temp\90D6.tmp"40⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\9182.tmp"C:\Users\Admin\AppData\Local\Temp\9182.tmp"41⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\923D.tmp"C:\Users\Admin\AppData\Local\Temp\923D.tmp"42⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"43⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"44⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\93F3.tmp"C:\Users\Admin\AppData\Local\Temp\93F3.tmp"45⤵
- Executes dropped EXE
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\948F.tmp"C:\Users\Admin\AppData\Local\Temp\948F.tmp"46⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\952B.tmp"C:\Users\Admin\AppData\Local\Temp\952B.tmp"47⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\95F6.tmp"C:\Users\Admin\AppData\Local\Temp\95F6.tmp"48⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\9683.tmp"C:\Users\Admin\AppData\Local\Temp\9683.tmp"49⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\971F.tmp"C:\Users\Admin\AppData\Local\Temp\971F.tmp"50⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\97BC.tmp"C:\Users\Admin\AppData\Local\Temp\97BC.tmp"51⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\9858.tmp"C:\Users\Admin\AppData\Local\Temp\9858.tmp"52⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\9904.tmp"C:\Users\Admin\AppData\Local\Temp\9904.tmp"53⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"54⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"55⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"56⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\9B65.tmp"C:\Users\Admin\AppData\Local\Temp\9B65.tmp"57⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\9C11.tmp"C:\Users\Admin\AppData\Local\Temp\9C11.tmp"58⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"59⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\9D49.tmp"C:\Users\Admin\AppData\Local\Temp\9D49.tmp"60⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"61⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\9E72.tmp"C:\Users\Admin\AppData\Local\Temp\9E72.tmp"62⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"63⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\9FAB.tmp"C:\Users\Admin\AppData\Local\Temp\9FAB.tmp"64⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\A066.tmp"C:\Users\Admin\AppData\Local\Temp\A066.tmp"65⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"66⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\A19F.tmp"C:\Users\Admin\AppData\Local\Temp\A19F.tmp"67⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"68⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"69⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\A316.tmp"C:\Users\Admin\AppData\Local\Temp\A316.tmp"70⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\A3C2.tmp"C:\Users\Admin\AppData\Local\Temp\A3C2.tmp"71⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"72⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"73⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"74⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"75⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\A681.tmp"C:\Users\Admin\AppData\Local\Temp\A681.tmp"76⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\A70D.tmp"C:\Users\Admin\AppData\Local\Temp\A70D.tmp"77⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\A7C9.tmp"C:\Users\Admin\AppData\Local\Temp\A7C9.tmp"78⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\A865.tmp"C:\Users\Admin\AppData\Local\Temp\A865.tmp"79⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"80⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\A98E.tmp"C:\Users\Admin\AppData\Local\Temp\A98E.tmp"81⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"82⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"83⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"84⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"85⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"86⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"87⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\AD76.tmp"C:\Users\Admin\AppData\Local\Temp\AD76.tmp"88⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"89⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\AE80.tmp"C:\Users\Admin\AppData\Local\Temp\AE80.tmp"90⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"91⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"92⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"93⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"94⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"95⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\B229.tmp"C:\Users\Admin\AppData\Local\Temp\B229.tmp"96⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"97⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\B323.tmp"C:\Users\Admin\AppData\Local\Temp\B323.tmp"98⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"99⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"100⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"101⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"102⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"103⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\B67F.tmp"C:\Users\Admin\AppData\Local\Temp\B67F.tmp"104⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\B71B.tmp"C:\Users\Admin\AppData\Local\Temp\B71B.tmp"105⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"106⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"107⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"108⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"109⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"110⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"111⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"112⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"113⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"114⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"115⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"116⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\BE00.tmp"C:\Users\Admin\AppData\Local\Temp\BE00.tmp"117⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"118⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"119⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\BF97.tmp"C:\Users\Admin\AppData\Local\Temp\BF97.tmp"120⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\C004.tmp"C:\Users\Admin\AppData\Local\Temp\C004.tmp"121⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"122⤵PID:2236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-