Analysis
-
max time kernel
151s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 12:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe
-
Size
486KB
-
MD5
4ce86cf28c286972f0eb7b6bd3c593a3
-
SHA1
ad93347e222e511c1ccab119661201f666bb4bb1
-
SHA256
760a889a9f3bb8cf695d6d45c1154846750fdbace85d42cf54d5a006c965974a
-
SHA512
e50b129be874ca5070cc05cb9b49901c505d977a9dafbf3f668a85ad195830c18a048b44b197a535a5a6d9328507edc78226f9377bb743be88b61a418f759da5
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7vg8AXT2TdedATb4RH+VNgAb0Zc9+lbiPs0sz:/U5rCOTeiDvg8RJedAx3gUlMlbiGNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1432 5BB7.tmp 2200 5D4C.tmp 3044 5E84.tmp 2968 5F20.tmp 2352 5F6E.tmp 2748 5FCC.tmp 2992 6068.tmp 2268 60F4.tmp 2780 61CF.tmp 2580 627A.tmp 2668 62E8.tmp 2568 6374.tmp 2676 63E1.tmp 2392 644F.tmp 1788 64AC.tmp 304 6539.tmp 2892 65A6.tmp 1436 6680.tmp 1832 66FD.tmp 1260 674B.tmp 588 67B8.tmp 1484 6835.tmp 2544 6873.tmp 624 68C1.tmp 2848 692F.tmp 1356 6A09.tmp 1312 6A76.tmp 2912 6B31.tmp 2304 87E5.tmp 2028 99FE.tmp 2956 AA05.tmp 2228 B57A.tmp 900 B5E7.tmp 2740 B654.tmp 3004 B6D1.tmp 1640 B73E.tmp 2444 B7AB.tmp 1556 B819.tmp 1124 B876.tmp 1652 B903.tmp 368 B97F.tmp 1104 B9DD.tmp 940 BA4A.tmp 2052 BAB7.tmp 1412 BB34.tmp 2172 BBA1.tmp 2248 BC6C.tmp 2308 BCD9.tmp 2092 BD66.tmp 2284 BE50.tmp 876 BEDC.tmp 2340 BF3A.tmp 1984 C0C0.tmp 1584 C11D.tmp 1900 C18B.tmp 1432 C207.tmp 3028 C39D.tmp 2828 C40A.tmp 2100 C477.tmp 2968 C552.tmp 2660 C5AF.tmp 2712 C61D.tmp 2672 C699.tmp 2764 C716.tmp -
Loads dropped DLL 64 IoCs
pid Process 3012 2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe 1432 5BB7.tmp 2200 5D4C.tmp 3044 5E84.tmp 2968 5F20.tmp 2352 5F6E.tmp 2748 5FCC.tmp 2992 6068.tmp 2268 60F4.tmp 2780 61CF.tmp 2580 627A.tmp 2668 62E8.tmp 2568 6374.tmp 2676 63E1.tmp 2392 644F.tmp 1788 64AC.tmp 304 6539.tmp 2892 65A6.tmp 1436 6680.tmp 1832 66FD.tmp 1260 674B.tmp 588 67B8.tmp 1484 6835.tmp 2544 6873.tmp 624 68C1.tmp 2848 692F.tmp 1356 6A09.tmp 1312 6A76.tmp 2912 6B31.tmp 2304 87E5.tmp 2028 99FE.tmp 2956 AA05.tmp 2228 B57A.tmp 900 B5E7.tmp 2740 B654.tmp 3004 B6D1.tmp 1640 B73E.tmp 2444 B7AB.tmp 1556 B819.tmp 1124 B876.tmp 1652 B903.tmp 368 B97F.tmp 1104 B9DD.tmp 940 BA4A.tmp 2052 BAB7.tmp 1412 BB34.tmp 2172 BBA1.tmp 2248 BC6C.tmp 2308 BCD9.tmp 2092 BD66.tmp 2284 BE50.tmp 876 BEDC.tmp 2340 BF3A.tmp 1984 C0C0.tmp 1584 C11D.tmp 1900 C18B.tmp 1432 C207.tmp 3028 C39D.tmp 2828 C40A.tmp 2100 C477.tmp 2968 C552.tmp 2660 C5AF.tmp 2712 C61D.tmp 2672 C699.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1432 3012 2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe 28 PID 3012 wrote to memory of 1432 3012 2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe 28 PID 3012 wrote to memory of 1432 3012 2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe 28 PID 3012 wrote to memory of 1432 3012 2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe 28 PID 1432 wrote to memory of 2200 1432 5BB7.tmp 29 PID 1432 wrote to memory of 2200 1432 5BB7.tmp 29 PID 1432 wrote to memory of 2200 1432 5BB7.tmp 29 PID 1432 wrote to memory of 2200 1432 5BB7.tmp 29 PID 2200 wrote to memory of 3044 2200 5D4C.tmp 30 PID 2200 wrote to memory of 3044 2200 5D4C.tmp 30 PID 2200 wrote to memory of 3044 2200 5D4C.tmp 30 PID 2200 wrote to memory of 3044 2200 5D4C.tmp 30 PID 3044 wrote to memory of 2968 3044 5E84.tmp 31 PID 3044 wrote to memory of 2968 3044 5E84.tmp 31 PID 3044 wrote to memory of 2968 3044 5E84.tmp 31 PID 3044 wrote to memory of 2968 3044 5E84.tmp 31 PID 2968 wrote to memory of 2352 2968 5F20.tmp 32 PID 2968 wrote to memory of 2352 2968 5F20.tmp 32 PID 2968 wrote to memory of 2352 2968 5F20.tmp 32 PID 2968 wrote to memory of 2352 2968 5F20.tmp 32 PID 2352 wrote to memory of 2748 2352 5F6E.tmp 33 PID 2352 wrote to memory of 2748 2352 5F6E.tmp 33 PID 2352 wrote to memory of 2748 2352 5F6E.tmp 33 PID 2352 wrote to memory of 2748 2352 5F6E.tmp 33 PID 2748 wrote to memory of 2992 2748 5FCC.tmp 34 PID 2748 wrote to memory of 2992 2748 5FCC.tmp 34 PID 2748 wrote to memory of 2992 2748 5FCC.tmp 34 PID 2748 wrote to memory of 2992 2748 5FCC.tmp 34 PID 2992 wrote to memory of 2268 2992 6068.tmp 35 PID 2992 wrote to memory of 2268 2992 6068.tmp 35 PID 2992 wrote to memory of 2268 2992 6068.tmp 35 PID 2992 wrote to memory of 2268 2992 6068.tmp 35 PID 2268 wrote to memory of 2780 2268 60F4.tmp 54 PID 2268 wrote to memory of 2780 2268 60F4.tmp 54 PID 2268 wrote to memory of 2780 2268 60F4.tmp 54 PID 2268 wrote to memory of 2780 2268 60F4.tmp 54 PID 2780 wrote to memory of 2580 2780 61CF.tmp 53 PID 2780 wrote to memory of 2580 2780 61CF.tmp 53 PID 2780 wrote to memory of 2580 2780 61CF.tmp 53 PID 2780 wrote to memory of 2580 2780 61CF.tmp 53 PID 2580 wrote to memory of 2668 2580 627A.tmp 52 PID 2580 wrote to memory of 2668 2580 627A.tmp 52 PID 2580 wrote to memory of 2668 2580 627A.tmp 52 PID 2580 wrote to memory of 2668 2580 627A.tmp 52 PID 2668 wrote to memory of 2568 2668 62E8.tmp 51 PID 2668 wrote to memory of 2568 2668 62E8.tmp 51 PID 2668 wrote to memory of 2568 2668 62E8.tmp 51 PID 2668 wrote to memory of 2568 2668 62E8.tmp 51 PID 2568 wrote to memory of 2676 2568 6374.tmp 50 PID 2568 wrote to memory of 2676 2568 6374.tmp 50 PID 2568 wrote to memory of 2676 2568 6374.tmp 50 PID 2568 wrote to memory of 2676 2568 6374.tmp 50 PID 2676 wrote to memory of 2392 2676 63E1.tmp 49 PID 2676 wrote to memory of 2392 2676 63E1.tmp 49 PID 2676 wrote to memory of 2392 2676 63E1.tmp 49 PID 2676 wrote to memory of 2392 2676 63E1.tmp 49 PID 2392 wrote to memory of 1788 2392 644F.tmp 37 PID 2392 wrote to memory of 1788 2392 644F.tmp 37 PID 2392 wrote to memory of 1788 2392 644F.tmp 37 PID 2392 wrote to memory of 1788 2392 644F.tmp 37 PID 1788 wrote to memory of 304 1788 64AC.tmp 36 PID 1788 wrote to memory of 304 1788 64AC.tmp 36 PID 1788 wrote to memory of 304 1788 64AC.tmp 36 PID 1788 wrote to memory of 304 1788 64AC.tmp 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_4ce86cf28c286972f0eb7b6bd3c593a3_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\5D4C.tmp"C:\Users\Admin\AppData\Local\Temp\5D4C.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\5E84.tmp"C:\Users\Admin\AppData\Local\Temp\5E84.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\5F20.tmp"C:\Users\Admin\AppData\Local\Temp\5F20.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\5F6E.tmp"C:\Users\Admin\AppData\Local\Temp\5F6E.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\5FCC.tmp"C:\Users\Admin\AppData\Local\Temp\5FCC.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\6068.tmp"C:\Users\Admin\AppData\Local\Temp\6068.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\60F4.tmp"C:\Users\Admin\AppData\Local\Temp\60F4.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\61CF.tmp"C:\Users\Admin\AppData\Local\Temp\61CF.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6539.tmp"C:\Users\Admin\AppData\Local\Temp\6539.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:304 -
C:\Users\Admin\AppData\Local\Temp\65A6.tmp"C:\Users\Admin\AppData\Local\Temp\65A6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\64AC.tmp"C:\Users\Admin\AppData\Local\Temp\64AC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788
-
C:\Users\Admin\AppData\Local\Temp\6873.tmp"C:\Users\Admin\AppData\Local\Temp\6873.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\68C1.tmp"C:\Users\Admin\AppData\Local\Temp\68C1.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624 -
C:\Users\Admin\AppData\Local\Temp\692F.tmp"C:\Users\Admin\AppData\Local\Temp\692F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\6A09.tmp"C:\Users\Admin\AppData\Local\Temp\6A09.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\6A76.tmp"C:\Users\Admin\AppData\Local\Temp\6A76.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\6B31.tmp"C:\Users\Admin\AppData\Local\Temp\6B31.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\87E5.tmp"C:\Users\Admin\AppData\Local\Temp\87E5.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\99FE.tmp"C:\Users\Admin\AppData\Local\Temp\99FE.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\AA05.tmp"C:\Users\Admin\AppData\Local\Temp\AA05.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\B57A.tmp"C:\Users\Admin\AppData\Local\Temp\B57A.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\B5E7.tmp"C:\Users\Admin\AppData\Local\Temp\B5E7.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Users\Admin\AppData\Local\Temp\B654.tmp"C:\Users\Admin\AppData\Local\Temp\B654.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\B6D1.tmp"C:\Users\Admin\AppData\Local\Temp\B6D1.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\B73E.tmp"C:\Users\Admin\AppData\Local\Temp\B73E.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\B7AB.tmp"C:\Users\Admin\AppData\Local\Temp\B7AB.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\B819.tmp"C:\Users\Admin\AppData\Local\Temp\B819.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\B876.tmp"C:\Users\Admin\AppData\Local\Temp\B876.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\B903.tmp"C:\Users\Admin\AppData\Local\Temp\B903.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\B97F.tmp"C:\Users\Admin\AppData\Local\Temp\B97F.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:368 -
C:\Users\Admin\AppData\Local\Temp\B9DD.tmp"C:\Users\Admin\AppData\Local\Temp\B9DD.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\BA4A.tmp"C:\Users\Admin\AppData\Local\Temp\BA4A.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Users\Admin\AppData\Local\Temp\BAB7.tmp"C:\Users\Admin\AppData\Local\Temp\BAB7.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\BB34.tmp"C:\Users\Admin\AppData\Local\Temp\BB34.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\BBA1.tmp"C:\Users\Admin\AppData\Local\Temp\BBA1.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\BC6C.tmp"C:\Users\Admin\AppData\Local\Temp\BC6C.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\BCD9.tmp"C:\Users\Admin\AppData\Local\Temp\BCD9.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\BD66.tmp"C:\Users\Admin\AppData\Local\Temp\BD66.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\BE50.tmp"C:\Users\Admin\AppData\Local\Temp\BE50.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\BEDC.tmp"C:\Users\Admin\AppData\Local\Temp\BEDC.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:876 -
C:\Users\Admin\AppData\Local\Temp\BF3A.tmp"C:\Users\Admin\AppData\Local\Temp\BF3A.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\C207.tmp"C:\Users\Admin\AppData\Local\Temp\C207.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\C39D.tmp"C:\Users\Admin\AppData\Local\Temp\C39D.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\C40A.tmp"C:\Users\Admin\AppData\Local\Temp\C40A.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\C477.tmp"C:\Users\Admin\AppData\Local\Temp\C477.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\C552.tmp"C:\Users\Admin\AppData\Local\Temp\C552.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\C5AF.tmp"C:\Users\Admin\AppData\Local\Temp\C5AF.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\C61D.tmp"C:\Users\Admin\AppData\Local\Temp\C61D.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\C699.tmp"C:\Users\Admin\AppData\Local\Temp\C699.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\C716.tmp"C:\Users\Admin\AppData\Local\Temp\C716.tmp"42⤵
- Executes dropped EXE
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\C83F.tmp"C:\Users\Admin\AppData\Local\Temp\C83F.tmp"43⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\D8F1.tmp"C:\Users\Admin\AppData\Local\Temp\D8F1.tmp"44⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\EFDB.tmp"C:\Users\Admin\AppData\Local\Temp\EFDB.tmp"45⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\F576.tmp"C:\Users\Admin\AppData\Local\Temp\F576.tmp"46⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\F6BE.tmp"C:\Users\Admin\AppData\Local\Temp\F6BE.tmp"47⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\F71B.tmp"C:\Users\Admin\AppData\Local\Temp\F71B.tmp"48⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\F788.tmp"C:\Users\Admin\AppData\Local\Temp\F788.tmp"49⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\F7C7.tmp"C:\Users\Admin\AppData\Local\Temp\F7C7.tmp"50⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\F805.tmp"C:\Users\Admin\AppData\Local\Temp\F805.tmp"51⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\F853.tmp"C:\Users\Admin\AppData\Local\Temp\F853.tmp"52⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\F8A1.tmp"C:\Users\Admin\AppData\Local\Temp\F8A1.tmp"53⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\F90E.tmp"C:\Users\Admin\AppData\Local\Temp\F90E.tmp"54⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\F97C.tmp"C:\Users\Admin\AppData\Local\Temp\F97C.tmp"55⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\F9D9.tmp"C:\Users\Admin\AppData\Local\Temp\F9D9.tmp"56⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\FA56.tmp"C:\Users\Admin\AppData\Local\Temp\FA56.tmp"57⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\FAB4.tmp"C:\Users\Admin\AppData\Local\Temp\FAB4.tmp"58⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\FB11.tmp"C:\Users\Admin\AppData\Local\Temp\FB11.tmp"59⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\FB7E.tmp"C:\Users\Admin\AppData\Local\Temp\FB7E.tmp"60⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\FBFB.tmp"C:\Users\Admin\AppData\Local\Temp\FBFB.tmp"61⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\FC78.tmp"C:\Users\Admin\AppData\Local\Temp\FC78.tmp"62⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\FCE5.tmp"C:\Users\Admin\AppData\Local\Temp\FCE5.tmp"63⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\FD33.tmp"C:\Users\Admin\AppData\Local\Temp\FD33.tmp"64⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\FDA0.tmp"C:\Users\Admin\AppData\Local\Temp\FDA0.tmp"65⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\FE1D.tmp"C:\Users\Admin\AppData\Local\Temp\FE1D.tmp"66⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\FE8A.tmp"C:\Users\Admin\AppData\Local\Temp\FE8A.tmp"67⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\FEF8.tmp"C:\Users\Admin\AppData\Local\Temp\FEF8.tmp"68⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\FF55.tmp"C:\Users\Admin\AppData\Local\Temp\FF55.tmp"69⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\FFC2.tmp"C:\Users\Admin\AppData\Local\Temp\FFC2.tmp"70⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\20.tmp"C:\Users\Admin\AppData\Local\Temp\20.tmp"71⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\7E.tmp"C:\Users\Admin\AppData\Local\Temp\7E.tmp"72⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\DB.tmp"C:\Users\Admin\AppData\Local\Temp\DB.tmp"73⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\148.tmp"C:\Users\Admin\AppData\Local\Temp\148.tmp"74⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\196.tmp"C:\Users\Admin\AppData\Local\Temp\196.tmp"75⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\1F4.tmp"C:\Users\Admin\AppData\Local\Temp\1F4.tmp"76⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\261.tmp"C:\Users\Admin\AppData\Local\Temp\261.tmp"77⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2BF.tmp"C:\Users\Admin\AppData\Local\Temp\2BF.tmp"78⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\33C.tmp"C:\Users\Admin\AppData\Local\Temp\33C.tmp"79⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3A9.tmp"C:\Users\Admin\AppData\Local\Temp\3A9.tmp"80⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\406.tmp"C:\Users\Admin\AppData\Local\Temp\406.tmp"81⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\464.tmp"C:\Users\Admin\AppData\Local\Temp\464.tmp"82⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\4E1.tmp"C:\Users\Admin\AppData\Local\Temp\4E1.tmp"83⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\55E.tmp"C:\Users\Admin\AppData\Local\Temp\55E.tmp"84⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\5CB.tmp"C:\Users\Admin\AppData\Local\Temp\5CB.tmp"85⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\638.tmp"C:\Users\Admin\AppData\Local\Temp\638.tmp"86⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\6A5.tmp"C:\Users\Admin\AppData\Local\Temp\6A5.tmp"87⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\712.tmp"C:\Users\Admin\AppData\Local\Temp\712.tmp"88⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\770.tmp"C:\Users\Admin\AppData\Local\Temp\770.tmp"89⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7CE.tmp"C:\Users\Admin\AppData\Local\Temp\7CE.tmp"90⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\898.tmp"C:\Users\Admin\AppData\Local\Temp\898.tmp"91⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\915.tmp"C:\Users\Admin\AppData\Local\Temp\915.tmp"92⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\982.tmp"C:\Users\Admin\AppData\Local\Temp\982.tmp"93⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\9F0.tmp"C:\Users\Admin\AppData\Local\Temp\9F0.tmp"94⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\A5D.tmp"C:\Users\Admin\AppData\Local\Temp\A5D.tmp"95⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"96⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"97⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\EB0.tmp"C:\Users\Admin\AppData\Local\Temp\EB0.tmp"98⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"99⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"100⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\FE8.tmp"C:\Users\Admin\AppData\Local\Temp\FE8.tmp"101⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\1046.tmp"C:\Users\Admin\AppData\Local\Temp\1046.tmp"102⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\10A4.tmp"C:\Users\Admin\AppData\Local\Temp\10A4.tmp"103⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\1111.tmp"C:\Users\Admin\AppData\Local\Temp\1111.tmp"104⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\118E.tmp"C:\Users\Admin\AppData\Local\Temp\118E.tmp"105⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\11DC.tmp"C:\Users\Admin\AppData\Local\Temp\11DC.tmp"106⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\1249.tmp"C:\Users\Admin\AppData\Local\Temp\1249.tmp"107⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\12C6.tmp"C:\Users\Admin\AppData\Local\Temp\12C6.tmp"108⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\1323.tmp"C:\Users\Admin\AppData\Local\Temp\1323.tmp"109⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\1390.tmp"C:\Users\Admin\AppData\Local\Temp\1390.tmp"110⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"111⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\147A.tmp"C:\Users\Admin\AppData\Local\Temp\147A.tmp"112⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\14E8.tmp"C:\Users\Admin\AppData\Local\Temp\14E8.tmp"113⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"114⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\15C2.tmp"C:\Users\Admin\AppData\Local\Temp\15C2.tmp"115⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\163F.tmp"C:\Users\Admin\AppData\Local\Temp\163F.tmp"116⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\16BC.tmp"C:\Users\Admin\AppData\Local\Temp\16BC.tmp"117⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"118⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\1767.tmp"C:\Users\Admin\AppData\Local\Temp\1767.tmp"119⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\17D4.tmp"C:\Users\Admin\AppData\Local\Temp\17D4.tmp"120⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\1842.tmp"C:\Users\Admin\AppData\Local\Temp\1842.tmp"121⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\1890.tmp"C:\Users\Admin\AppData\Local\Temp\1890.tmp"122⤵PID:624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-