Analysis
-
max time kernel
167s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 06:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe
-
Size
520KB
-
MD5
0ce699f6a91315a9266d8cf0ccea051d
-
SHA1
25d238c2be88468aaa357557ddd8bd38a470688a
-
SHA256
9cc7ef1d0b2692b53e9ab8dcba5dc2e5c4af5568b60abd17fcbb769d64b4ef49
-
SHA512
9b8c70120fafb1a92a76c6cb7440c81f73320a2b09799ce646c4c92073792cf808a5a10c5a635aa34a3512b3f88d208866392fd6da45e69cd97b1f318f346d71
-
SSDEEP
12288:gj8fuxR21t5i8foH9Inka3T0d2Mvg4s8+YSuhiSjM8uNZ:gj8fuK1GYoHunk6ivgC+YtiUMZN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 624 9DC5.tmp 2820 9E52.tmp 2760 9ECF.tmp 2380 9F99.tmp 2888 A045.tmp 2628 A0B2.tmp 2660 A17D.tmp 2636 A1EA.tmp 1372 A2F3.tmp 2248 A370.tmp 2924 A41C.tmp 2952 A4B8.tmp 3068 A592.tmp 2436 A61F.tmp 1824 A67C.tmp 756 A728.tmp 1596 A795.tmp 1156 A821.tmp 2784 A88F.tmp 268 A8EC.tmp 1476 A94A.tmp 1748 A9C7.tmp 1584 B51C.tmp 1136 B98F.tmp 2068 BC3D.tmp 3008 C439.tmp 2972 C523.tmp 2392 C581.tmp 1624 C5EE.tmp 1464 C63C.tmp 2456 C6A9.tmp 632 C716.tmp 2268 C783.tmp 1720 C7E1.tmp 1048 C83F.tmp 1028 C89C.tmp 1300 C8FA.tmp 1552 C986.tmp 1324 C9E4.tmp 1708 CA41.tmp 2148 CBA8.tmp 1968 CC15.tmp 2476 CC83.tmp 2244 CCF0.tmp 2988 CD5D.tmp 1776 CDDA.tmp 2032 CE37.tmp 1788 CEA5.tmp 1716 CFAE.tmp 2224 D01B.tmp 2264 D088.tmp 2544 D0E6.tmp 2004 D143.tmp 2232 D1B1.tmp 2024 D20E.tmp 2748 D2BA.tmp 624 D308.tmp 2816 D375.tmp 3004 D3E2.tmp 2532 D45F.tmp 1912 D4CC.tmp 2672 D51A.tmp 2780 D568.tmp 2728 D623.tmp -
Loads dropped DLL 64 IoCs
pid Process 2796 2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe 624 9DC5.tmp 2820 9E52.tmp 2760 9ECF.tmp 2380 9F99.tmp 2888 A045.tmp 2628 A0B2.tmp 2660 A17D.tmp 2636 A1EA.tmp 1372 A2F3.tmp 2248 A370.tmp 2924 A41C.tmp 2952 A4B8.tmp 3068 A592.tmp 2436 A61F.tmp 1824 A67C.tmp 756 A728.tmp 1596 A795.tmp 1156 A821.tmp 2784 A88F.tmp 268 A8EC.tmp 1476 A94A.tmp 1748 A9C7.tmp 1584 B51C.tmp 1136 B98F.tmp 2068 BC3D.tmp 3008 C439.tmp 2972 C523.tmp 2392 C581.tmp 1624 C5EE.tmp 1464 C63C.tmp 2456 C6A9.tmp 632 C716.tmp 2268 C783.tmp 1720 C7E1.tmp 1048 C83F.tmp 1028 C89C.tmp 1300 C8FA.tmp 1552 C986.tmp 1324 C9E4.tmp 1708 CA41.tmp 2148 CBA8.tmp 1968 CC15.tmp 2476 CC83.tmp 2244 CCF0.tmp 2988 CD5D.tmp 1776 CDDA.tmp 2032 CE37.tmp 1788 CEA5.tmp 1716 CFAE.tmp 2224 D01B.tmp 2264 D088.tmp 2544 D0E6.tmp 2004 D143.tmp 2232 D1B1.tmp 1604 D26C.tmp 2748 D2BA.tmp 624 D308.tmp 2816 D375.tmp 3004 D3E2.tmp 2532 D45F.tmp 1912 D4CC.tmp 2672 D51A.tmp 2780 D568.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 624 2796 2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe 27 PID 2796 wrote to memory of 624 2796 2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe 27 PID 2796 wrote to memory of 624 2796 2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe 27 PID 2796 wrote to memory of 624 2796 2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe 27 PID 624 wrote to memory of 2820 624 9DC5.tmp 28 PID 624 wrote to memory of 2820 624 9DC5.tmp 28 PID 624 wrote to memory of 2820 624 9DC5.tmp 28 PID 624 wrote to memory of 2820 624 9DC5.tmp 28 PID 2820 wrote to memory of 2760 2820 9E52.tmp 29 PID 2820 wrote to memory of 2760 2820 9E52.tmp 29 PID 2820 wrote to memory of 2760 2820 9E52.tmp 29 PID 2820 wrote to memory of 2760 2820 9E52.tmp 29 PID 2760 wrote to memory of 2380 2760 9ECF.tmp 30 PID 2760 wrote to memory of 2380 2760 9ECF.tmp 30 PID 2760 wrote to memory of 2380 2760 9ECF.tmp 30 PID 2760 wrote to memory of 2380 2760 9ECF.tmp 30 PID 2380 wrote to memory of 2888 2380 9F99.tmp 31 PID 2380 wrote to memory of 2888 2380 9F99.tmp 31 PID 2380 wrote to memory of 2888 2380 9F99.tmp 31 PID 2380 wrote to memory of 2888 2380 9F99.tmp 31 PID 2888 wrote to memory of 2628 2888 A045.tmp 47 PID 2888 wrote to memory of 2628 2888 A045.tmp 47 PID 2888 wrote to memory of 2628 2888 A045.tmp 47 PID 2888 wrote to memory of 2628 2888 A045.tmp 47 PID 2628 wrote to memory of 2660 2628 A0B2.tmp 46 PID 2628 wrote to memory of 2660 2628 A0B2.tmp 46 PID 2628 wrote to memory of 2660 2628 A0B2.tmp 46 PID 2628 wrote to memory of 2660 2628 A0B2.tmp 46 PID 2660 wrote to memory of 2636 2660 A17D.tmp 32 PID 2660 wrote to memory of 2636 2660 A17D.tmp 32 PID 2660 wrote to memory of 2636 2660 A17D.tmp 32 PID 2660 wrote to memory of 2636 2660 A17D.tmp 32 PID 2636 wrote to memory of 1372 2636 A1EA.tmp 38 PID 2636 wrote to memory of 1372 2636 A1EA.tmp 38 PID 2636 wrote to memory of 1372 2636 A1EA.tmp 38 PID 2636 wrote to memory of 1372 2636 A1EA.tmp 38 PID 1372 wrote to memory of 2248 1372 A2F3.tmp 37 PID 1372 wrote to memory of 2248 1372 A2F3.tmp 37 PID 1372 wrote to memory of 2248 1372 A2F3.tmp 37 PID 1372 wrote to memory of 2248 1372 A2F3.tmp 37 PID 2248 wrote to memory of 2924 2248 A370.tmp 33 PID 2248 wrote to memory of 2924 2248 A370.tmp 33 PID 2248 wrote to memory of 2924 2248 A370.tmp 33 PID 2248 wrote to memory of 2924 2248 A370.tmp 33 PID 2924 wrote to memory of 2952 2924 A41C.tmp 36 PID 2924 wrote to memory of 2952 2924 A41C.tmp 36 PID 2924 wrote to memory of 2952 2924 A41C.tmp 36 PID 2924 wrote to memory of 2952 2924 A41C.tmp 36 PID 2952 wrote to memory of 3068 2952 A4B8.tmp 35 PID 2952 wrote to memory of 3068 2952 A4B8.tmp 35 PID 2952 wrote to memory of 3068 2952 A4B8.tmp 35 PID 2952 wrote to memory of 3068 2952 A4B8.tmp 35 PID 3068 wrote to memory of 2436 3068 A592.tmp 34 PID 3068 wrote to memory of 2436 3068 A592.tmp 34 PID 3068 wrote to memory of 2436 3068 A592.tmp 34 PID 3068 wrote to memory of 2436 3068 A592.tmp 34 PID 2436 wrote to memory of 1824 2436 A61F.tmp 45 PID 2436 wrote to memory of 1824 2436 A61F.tmp 45 PID 2436 wrote to memory of 1824 2436 A61F.tmp 45 PID 2436 wrote to memory of 1824 2436 A61F.tmp 45 PID 1824 wrote to memory of 756 1824 A67C.tmp 44 PID 1824 wrote to memory of 756 1824 A67C.tmp 44 PID 1824 wrote to memory of 756 1824 A67C.tmp 44 PID 1824 wrote to memory of 756 1824 A67C.tmp 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_0ce699f6a91315a9266d8cf0ccea051d_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\9DC5.tmp"C:\Users\Admin\AppData\Local\Temp\9DC5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\9E52.tmp"C:\Users\Admin\AppData\Local\Temp\9E52.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\9ECF.tmp"C:\Users\Admin\AppData\Local\Temp\9ECF.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\9F99.tmp"C:\Users\Admin\AppData\Local\Temp\9F99.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\A045.tmp"C:\Users\Admin\AppData\Local\Temp\A045.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\A0B2.tmp"C:\Users\Admin\AppData\Local\Temp\A0B2.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A1EA.tmp"C:\Users\Admin\AppData\Local\Temp\A1EA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\A2F3.tmp"C:\Users\Admin\AppData\Local\Temp\A2F3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\A41C.tmp"C:\Users\Admin\AppData\Local\Temp\A41C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\A4B8.tmp"C:\Users\Admin\AppData\Local\Temp\A4B8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\A61F.tmp"C:\Users\Admin\AppData\Local\Temp\A61F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\A67C.tmp"C:\Users\Admin\AppData\Local\Temp\A67C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\A592.tmp"C:\Users\Admin\AppData\Local\Temp\A592.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068
-
C:\Users\Admin\AppData\Local\Temp\A370.tmp"C:\Users\Admin\AppData\Local\Temp\A370.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248
-
C:\Users\Admin\AppData\Local\Temp\A94A.tmp"C:\Users\Admin\AppData\Local\Temp\A94A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\A9C7.tmp"C:\Users\Admin\AppData\Local\Temp\A9C7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\B51C.tmp"C:\Users\Admin\AppData\Local\Temp\B51C.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\B98F.tmp"C:\Users\Admin\AppData\Local\Temp\B98F.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\BC3D.tmp"C:\Users\Admin\AppData\Local\Temp\BC3D.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\C439.tmp"C:\Users\Admin\AppData\Local\Temp\C439.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\C523.tmp"C:\Users\Admin\AppData\Local\Temp\C523.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\C581.tmp"C:\Users\Admin\AppData\Local\Temp\C581.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\C5EE.tmp"C:\Users\Admin\AppData\Local\Temp\C5EE.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\C63C.tmp"C:\Users\Admin\AppData\Local\Temp\C63C.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\C6A9.tmp"C:\Users\Admin\AppData\Local\Temp\C6A9.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\C716.tmp"C:\Users\Admin\AppData\Local\Temp\C716.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:632 -
C:\Users\Admin\AppData\Local\Temp\C783.tmp"C:\Users\Admin\AppData\Local\Temp\C783.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\C7E1.tmp"C:\Users\Admin\AppData\Local\Temp\C7E1.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\C83F.tmp"C:\Users\Admin\AppData\Local\Temp\C83F.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\C89C.tmp"C:\Users\Admin\AppData\Local\Temp\C89C.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\C8FA.tmp"C:\Users\Admin\AppData\Local\Temp\C8FA.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\C986.tmp"C:\Users\Admin\AppData\Local\Temp\C986.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\C9E4.tmp"C:\Users\Admin\AppData\Local\Temp\C9E4.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\CA41.tmp"C:\Users\Admin\AppData\Local\Temp\CA41.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\CC15.tmp"C:\Users\Admin\AppData\Local\Temp\CC15.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\CC83.tmp"C:\Users\Admin\AppData\Local\Temp\CC83.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\CCF0.tmp"C:\Users\Admin\AppData\Local\Temp\CCF0.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\CD5D.tmp"C:\Users\Admin\AppData\Local\Temp\CD5D.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\CDDA.tmp"C:\Users\Admin\AppData\Local\Temp\CDDA.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\CE37.tmp"C:\Users\Admin\AppData\Local\Temp\CE37.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\CEA5.tmp"C:\Users\Admin\AppData\Local\Temp\CEA5.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\CFAE.tmp"C:\Users\Admin\AppData\Local\Temp\CFAE.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\D01B.tmp"C:\Users\Admin\AppData\Local\Temp\D01B.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\D088.tmp"C:\Users\Admin\AppData\Local\Temp\D088.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\D0E6.tmp"C:\Users\Admin\AppData\Local\Temp\D0E6.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\D143.tmp"C:\Users\Admin\AppData\Local\Temp\D143.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\D1B1.tmp"C:\Users\Admin\AppData\Local\Temp\D1B1.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\D20E.tmp"C:\Users\Admin\AppData\Local\Temp\D20E.tmp"35⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\D26C.tmp"C:\Users\Admin\AppData\Local\Temp\D26C.tmp"36⤵
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\D2BA.tmp"C:\Users\Admin\AppData\Local\Temp\D2BA.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\D308.tmp"C:\Users\Admin\AppData\Local\Temp\D308.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624 -
C:\Users\Admin\AppData\Local\Temp\D375.tmp"C:\Users\Admin\AppData\Local\Temp\D375.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\D3E2.tmp"C:\Users\Admin\AppData\Local\Temp\D3E2.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\D45F.tmp"C:\Users\Admin\AppData\Local\Temp\D45F.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\D4CC.tmp"C:\Users\Admin\AppData\Local\Temp\D4CC.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\D51A.tmp"C:\Users\Admin\AppData\Local\Temp\D51A.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\D568.tmp"C:\Users\Admin\AppData\Local\Temp\D568.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\D623.tmp"C:\Users\Admin\AppData\Local\Temp\D623.tmp"45⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\D691.tmp"C:\Users\Admin\AppData\Local\Temp\D691.tmp"46⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\D70D.tmp"C:\Users\Admin\AppData\Local\Temp\D70D.tmp"47⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\D76B.tmp"C:\Users\Admin\AppData\Local\Temp\D76B.tmp"48⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\E61B.tmp"C:\Users\Admin\AppData\Local\Temp\E61B.tmp"49⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\EE16.tmp"C:\Users\Admin\AppData\Local\Temp\EE16.tmp"50⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\F4F9.tmp"C:\Users\Admin\AppData\Local\Temp\F4F9.tmp"51⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\FC2A.tmp"C:\Users\Admin\AppData\Local\Temp\FC2A.tmp"52⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3F.tmp"C:\Users\Admin\AppData\Local\Temp\3F.tmp"53⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\712.tmp"C:\Users\Admin\AppData\Local\Temp\712.tmp"54⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\780.tmp"C:\Users\Admin\AppData\Local\Temp\780.tmp"55⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\80C.tmp"C:\Users\Admin\AppData\Local\Temp\80C.tmp"56⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\889.tmp"C:\Users\Admin\AppData\Local\Temp\889.tmp"57⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\906.tmp"C:\Users\Admin\AppData\Local\Temp\906.tmp"58⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\982.tmp"C:\Users\Admin\AppData\Local\Temp\982.tmp"59⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\A5D.tmp"C:\Users\Admin\AppData\Local\Temp\A5D.tmp"60⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\AE9.tmp"C:\Users\Admin\AppData\Local\Temp\AE9.tmp"61⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\B66.tmp"C:\Users\Admin\AppData\Local\Temp\B66.tmp"62⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\BF2.tmp"C:\Users\Admin\AppData\Local\Temp\BF2.tmp"63⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\C60.tmp"C:\Users\Admin\AppData\Local\Temp\C60.tmp"64⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\CDC.tmp"C:\Users\Admin\AppData\Local\Temp\CDC.tmp"65⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\D4A.tmp"C:\Users\Admin\AppData\Local\Temp\D4A.tmp"66⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"67⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\F7B.tmp"C:\Users\Admin\AppData\Local\Temp\F7B.tmp"68⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\FE8.tmp"C:\Users\Admin\AppData\Local\Temp\FE8.tmp"69⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\1056.tmp"C:\Users\Admin\AppData\Local\Temp\1056.tmp"70⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\10D2.tmp"C:\Users\Admin\AppData\Local\Temp\10D2.tmp"71⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\11EB.tmp"C:\Users\Admin\AppData\Local\Temp\11EB.tmp"72⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\12C6.tmp"C:\Users\Admin\AppData\Local\Temp\12C6.tmp"73⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\1342.tmp"C:\Users\Admin\AppData\Local\Temp\1342.tmp"74⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\13BF.tmp"C:\Users\Admin\AppData\Local\Temp\13BF.tmp"75⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\146B.tmp"C:\Users\Admin\AppData\Local\Temp\146B.tmp"76⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\14F7.tmp"C:\Users\Admin\AppData\Local\Temp\14F7.tmp"77⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\1574.tmp"C:\Users\Admin\AppData\Local\Temp\1574.tmp"78⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\164E.tmp"C:\Users\Admin\AppData\Local\Temp\164E.tmp"79⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\16CB.tmp"C:\Users\Admin\AppData\Local\Temp\16CB.tmp"80⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\1842.tmp"C:\Users\Admin\AppData\Local\Temp\1842.tmp"81⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\18AF.tmp"C:\Users\Admin\AppData\Local\Temp\18AF.tmp"82⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"83⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"84⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"85⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"86⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"87⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"88⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"89⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"90⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"91⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\311E.tmp"C:\Users\Admin\AppData\Local\Temp\311E.tmp"92⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\318C.tmp"C:\Users\Admin\AppData\Local\Temp\318C.tmp"93⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\31F9.tmp"C:\Users\Admin\AppData\Local\Temp\31F9.tmp"94⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"95⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"96⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"97⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"98⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"99⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\34C6.tmp"C:\Users\Admin\AppData\Local\Temp\34C6.tmp"100⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3543.tmp"C:\Users\Admin\AppData\Local\Temp\3543.tmp"101⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"102⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\362D.tmp"C:\Users\Admin\AppData\Local\Temp\362D.tmp"103⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\367B.tmp"C:\Users\Admin\AppData\Local\Temp\367B.tmp"104⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\36E8.tmp"C:\Users\Admin\AppData\Local\Temp\36E8.tmp"105⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\3736.tmp"C:\Users\Admin\AppData\Local\Temp\3736.tmp"106⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\3794.tmp"C:\Users\Admin\AppData\Local\Temp\3794.tmp"107⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\37F2.tmp"C:\Users\Admin\AppData\Local\Temp\37F2.tmp"108⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\385F.tmp"C:\Users\Admin\AppData\Local\Temp\385F.tmp"109⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"110⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"111⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"112⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\39F4.tmp"C:\Users\Admin\AppData\Local\Temp\39F4.tmp"113⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\3A52.tmp"C:\Users\Admin\AppData\Local\Temp\3A52.tmp"114⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"115⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"116⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"117⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\3C55.tmp"C:\Users\Admin\AppData\Local\Temp\3C55.tmp"118⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"119⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"120⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\3D8D.tmp"C:\Users\Admin\AppData\Local\Temp\3D8D.tmp"121⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3DEA.tmp"C:\Users\Admin\AppData\Local\Temp\3DEA.tmp"122⤵PID:2676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-