Analysis
-
max time kernel
156s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 11:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe
-
Size
529KB
-
MD5
3688972af468aa61faddafd9acfab5f4
-
SHA1
eac9bd98f74880ec2c07ec760571dfbbe0d571a3
-
SHA256
832e6bb44e51bb11da0b60bb65e4441918d8a8501f331809e8a98e6476698aa8
-
SHA512
fb643b8556cd93fc40bcb3d331af1f6ed1d6ced440bd9b442f7d32302e355f473ecb502c785775626ea398d203cca2d80ae2b1a7017b2d024a38ddc80571c888
-
SSDEEP
12288:NU5rCOTeij+C4Zs7c5m9V/QGOu9myN0Ck5sfD88ZTZwlH4Hp:NUQOJjjoKYXd20Ck5STSlH4Hp
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5072 ED7D.tmp 3424 F04B.tmp 3600 F136.tmp 716 F29D.tmp 3816 F4FF.tmp 2628 F5AA.tmp 4212 F6F3.tmp 4744 F86A.tmp 1412 F944.tmp 3268 FA2F.tmp 2444 FB09.tmp 4608 FBD5.tmp 3672 FCCF.tmp 1032 FD6B.tmp 1064 FE26.tmp 1752 FEF1.tmp 2896 FFAD.tmp 1596 68.tmp 1620 105.tmp 1800 1D0.tmp 2992 2BA.tmp 1956 3A5.tmp 1868 49F.tmp 3308 53B.tmp 2932 616.tmp 1492 6B2.tmp 2904 72F.tmp 3408 7BB.tmp 1664 867.tmp 840 913.tmp 984 9AF.tmp 496 A4C.tmp 4800 AC9.tmp 4132 B65.tmp 4720 BE2.tmp 4772 CBD.tmp 4748 D59.tmp 3732 E24.tmp 1020 F5D.tmp 4384 FCA.tmp 5100 1085.tmp 3488 1122.tmp 5096 119F.tmp 4980 121C.tmp 4188 12D7.tmp 3196 1345.tmp 3912 13E1.tmp 4012 147D.tmp 3464 150A.tmp 1464 15D5.tmp 4212 1661.tmp 2716 16DE.tmp 4924 176B.tmp 4004 17D8.tmp 3268 1865.tmp 2948 196F.tmp 4496 19EC.tmp 4608 1A69.tmp 5112 1B05.tmp 2020 1BC0.tmp 1432 1C2E.tmp 1064 1CBA.tmp 1752 1D86.tmp 2304 1E03.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2952 wrote to memory of 5072 2952 2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe 90 PID 2952 wrote to memory of 5072 2952 2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe 90 PID 2952 wrote to memory of 5072 2952 2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe 90 PID 5072 wrote to memory of 3424 5072 ED7D.tmp 91 PID 5072 wrote to memory of 3424 5072 ED7D.tmp 91 PID 5072 wrote to memory of 3424 5072 ED7D.tmp 91 PID 3424 wrote to memory of 3600 3424 F04B.tmp 92 PID 3424 wrote to memory of 3600 3424 F04B.tmp 92 PID 3424 wrote to memory of 3600 3424 F04B.tmp 92 PID 3600 wrote to memory of 716 3600 F136.tmp 93 PID 3600 wrote to memory of 716 3600 F136.tmp 93 PID 3600 wrote to memory of 716 3600 F136.tmp 93 PID 716 wrote to memory of 3816 716 F29D.tmp 94 PID 716 wrote to memory of 3816 716 F29D.tmp 94 PID 716 wrote to memory of 3816 716 F29D.tmp 94 PID 3816 wrote to memory of 2628 3816 F4FF.tmp 95 PID 3816 wrote to memory of 2628 3816 F4FF.tmp 95 PID 3816 wrote to memory of 2628 3816 F4FF.tmp 95 PID 2628 wrote to memory of 4212 2628 F5AA.tmp 96 PID 2628 wrote to memory of 4212 2628 F5AA.tmp 96 PID 2628 wrote to memory of 4212 2628 F5AA.tmp 96 PID 4212 wrote to memory of 4744 4212 F6F3.tmp 97 PID 4212 wrote to memory of 4744 4212 F6F3.tmp 97 PID 4212 wrote to memory of 4744 4212 F6F3.tmp 97 PID 4744 wrote to memory of 1412 4744 F86A.tmp 98 PID 4744 wrote to memory of 1412 4744 F86A.tmp 98 PID 4744 wrote to memory of 1412 4744 F86A.tmp 98 PID 1412 wrote to memory of 3268 1412 F944.tmp 99 PID 1412 wrote to memory of 3268 1412 F944.tmp 99 PID 1412 wrote to memory of 3268 1412 F944.tmp 99 PID 3268 wrote to memory of 2444 3268 FA2F.tmp 100 PID 3268 wrote to memory of 2444 3268 FA2F.tmp 100 PID 3268 wrote to memory of 2444 3268 FA2F.tmp 100 PID 2444 wrote to memory of 4608 2444 FB09.tmp 101 PID 2444 wrote to memory of 4608 2444 FB09.tmp 101 PID 2444 wrote to memory of 4608 2444 FB09.tmp 101 PID 4608 wrote to memory of 3672 4608 FBD5.tmp 102 PID 4608 wrote to memory of 3672 4608 FBD5.tmp 102 PID 4608 wrote to memory of 3672 4608 FBD5.tmp 102 PID 3672 wrote to memory of 1032 3672 FCCF.tmp 103 PID 3672 wrote to memory of 1032 3672 FCCF.tmp 103 PID 3672 wrote to memory of 1032 3672 FCCF.tmp 103 PID 1032 wrote to memory of 1064 1032 FD6B.tmp 104 PID 1032 wrote to memory of 1064 1032 FD6B.tmp 104 PID 1032 wrote to memory of 1064 1032 FD6B.tmp 104 PID 1064 wrote to memory of 1752 1064 FE26.tmp 105 PID 1064 wrote to memory of 1752 1064 FE26.tmp 105 PID 1064 wrote to memory of 1752 1064 FE26.tmp 105 PID 1752 wrote to memory of 2896 1752 FEF1.tmp 106 PID 1752 wrote to memory of 2896 1752 FEF1.tmp 106 PID 1752 wrote to memory of 2896 1752 FEF1.tmp 106 PID 2896 wrote to memory of 1596 2896 FFAD.tmp 107 PID 2896 wrote to memory of 1596 2896 FFAD.tmp 107 PID 2896 wrote to memory of 1596 2896 FFAD.tmp 107 PID 1596 wrote to memory of 1620 1596 68.tmp 108 PID 1596 wrote to memory of 1620 1596 68.tmp 108 PID 1596 wrote to memory of 1620 1596 68.tmp 108 PID 1620 wrote to memory of 1800 1620 105.tmp 109 PID 1620 wrote to memory of 1800 1620 105.tmp 109 PID 1620 wrote to memory of 1800 1620 105.tmp 109 PID 1800 wrote to memory of 2992 1800 1D0.tmp 110 PID 1800 wrote to memory of 2992 1800 1D0.tmp 110 PID 1800 wrote to memory of 2992 1800 1D0.tmp 110 PID 2992 wrote to memory of 1956 2992 2BA.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-09_3688972af468aa61faddafd9acfab5f4_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\F29D.tmp"C:\Users\Admin\AppData\Local\Temp\F29D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\F944.tmp"C:\Users\Admin\AppData\Local\Temp\F944.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\68.tmp"C:\Users\Admin\AppData\Local\Temp\68.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"23⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"24⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\53B.tmp"C:\Users\Admin\AppData\Local\Temp\53B.tmp"25⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\616.tmp"C:\Users\Admin\AppData\Local\Temp\616.tmp"26⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"27⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"28⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"29⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"30⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\913.tmp"C:\Users\Admin\AppData\Local\Temp\913.tmp"31⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"32⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"33⤵
- Executes dropped EXE
PID:496 -
C:\Users\Admin\AppData\Local\Temp\AC9.tmp"C:\Users\Admin\AppData\Local\Temp\AC9.tmp"34⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\B65.tmp"C:\Users\Admin\AppData\Local\Temp\B65.tmp"35⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\BE2.tmp"C:\Users\Admin\AppData\Local\Temp\BE2.tmp"36⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"37⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"38⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\E24.tmp"C:\Users\Admin\AppData\Local\Temp\E24.tmp"39⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"40⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\FCA.tmp"C:\Users\Admin\AppData\Local\Temp\FCA.tmp"41⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\1085.tmp"C:\Users\Admin\AppData\Local\Temp\1085.tmp"42⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"43⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"44⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"45⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"46⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp"47⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"48⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"49⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"50⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\15D5.tmp"C:\Users\Admin\AppData\Local\Temp\15D5.tmp"51⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\1661.tmp"C:\Users\Admin\AppData\Local\Temp\1661.tmp"52⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"53⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"54⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"55⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\1865.tmp"C:\Users\Admin\AppData\Local\Temp\1865.tmp"56⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"57⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"58⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"59⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"60⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"61⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\1C2E.tmp"C:\Users\Admin\AppData\Local\Temp\1C2E.tmp"62⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"63⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"64⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"65⤵
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"66⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"67⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"68⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"69⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"70⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"71⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"72⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\2287.tmp"C:\Users\Admin\AppData\Local\Temp\2287.tmp"73⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\22F4.tmp"C:\Users\Admin\AppData\Local\Temp\22F4.tmp"74⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\23A0.tmp"C:\Users\Admin\AppData\Local\Temp\23A0.tmp"75⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"76⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"77⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2556.tmp"C:\Users\Admin\AppData\Local\Temp\2556.tmp"78⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"79⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\2630.tmp"C:\Users\Admin\AppData\Local\Temp\2630.tmp"80⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"81⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\271B.tmp"C:\Users\Admin\AppData\Local\Temp\271B.tmp"82⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"83⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"84⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"85⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"86⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"87⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"88⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"89⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"90⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"91⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2D06.tmp"C:\Users\Admin\AppData\Local\Temp\2D06.tmp"92⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2D74.tmp"C:\Users\Admin\AppData\Local\Temp\2D74.tmp"93⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\2E00.tmp"C:\Users\Admin\AppData\Local\Temp\2E00.tmp"94⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"95⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"96⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"97⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\3014.tmp"C:\Users\Admin\AppData\Local\Temp\3014.tmp"98⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\3091.tmp"C:\Users\Admin\AppData\Local\Temp\3091.tmp"99⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"100⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"101⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"102⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\32B3.tmp"C:\Users\Admin\AppData\Local\Temp\32B3.tmp"103⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"104⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"105⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"106⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"107⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"108⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\360F.tmp"C:\Users\Admin\AppData\Local\Temp\360F.tmp"109⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"110⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"111⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"112⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"113⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"114⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"115⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"116⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"117⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"118⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"119⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"120⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"121⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"122⤵PID:4772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-