Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 06:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-11_a6780d3621c836fe52b3920de20a62ad_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-11_a6780d3621c836fe52b3920de20a62ad_mafia.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
2024-01-11_a6780d3621c836fe52b3920de20a62ad_mafia.exe
-
Size
712KB
-
MD5
a6780d3621c836fe52b3920de20a62ad
-
SHA1
2ac391c52100c57b7669e776e961d990aff5db3d
-
SHA256
e6281eec23cfd50b7e38beb9eb09dab15e75ff149603bd20b679dead378f935a
-
SHA512
33236e59e1ab05e2a542857d9ead44b44be588f9f4fab0b18f792ae753870a603ae64c0574c75ff29b3d52fbd61153cb5f8e6d2e0afebf7834e3baeceb7004ee
-
SSDEEP
12288:FU5rCOTeiDvbzkM1nIO4HF0zfWB/kBHkIRNZdCvq5TJLCvY90D8/LVBlVk736Y7k:FUQOJDvbzLOO4HKEqkIRNnCvq5TJLCvc
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2392 B05B.tmp 2820 CDCA.tmp 2276 B145.tmp 2064 4C1D.tmp 2688 9369.tmp 2904 B27D.tmp 2708 B01D.tmp 2636 6613.tmp 2620 9656.tmp 1376 E8AA.tmp 2204 34A7.tmp 1432 98E5.tmp 2880 8150.tmp 2768 50CE.tmp 1520 518A.tmp 1736 6B22.tmp 3004 9BD2.tmp 1936 8372.tmp 1512 B76E.tmp 800 9CAD.tmp 640 848B.tmp 1452 6CC7.tmp 1084 BA4A.tmp 1396 B9ED.tmp 2612 BD75.tmp 1772 A083.tmp 2320 6F27.tmp 2316 BE32.tmp 2216 BDC3.tmp 2008 C17B.tmp 1064 57C1.tmp 2308 587C.tmp 1492 C2F1.tmp 624 8AB3.tmp 2400 A3CE.tmp 2436 A802.tmp 1704 C4C5.tmp 664 7436.tmp 1428 8CD5.tmp 1684 1094.tmp 1292 10F2.tmp 752 DF67.tmp 604 C7E1.tmp 900 8E3B.tmp 1992 5EB3.tmp 2260 A860.tmp 2220 140D.tmp 1776 A92B.tmp 2856 CA61.tmp 2212 A9E6.tmp 2992 6104.tmp 2364 15D2.tmp 1132 AB3D.tmp 1656 AE97.tmp 2464 6326.tmp 2848 1803.tmp 2820 CDCA.tmp 2372 CE37.tmp 2696 AD6F.tmp 2816 94D0.tmp 2744 CF7F.tmp 2796 E782.tmp 2948 D04A.tmp 2588 D0A7.tmp -
Loads dropped DLL 64 IoCs
pid Process 2396 2024-01-11_a6780d3621c836fe52b3920de20a62ad_mafia.exe 2392 B05B.tmp 2820 CDCA.tmp 2276 B145.tmp 2064 4C1D.tmp 2688 9369.tmp 2904 B27D.tmp 2708 B01D.tmp 2636 6613.tmp 2620 9656.tmp 1376 E8AA.tmp 2204 34A7.tmp 1432 98E5.tmp 2880 8150.tmp 2768 50CE.tmp 1520 518A.tmp 1736 6B22.tmp 3004 9BD2.tmp 1936 8372.tmp 1512 B76E.tmp 800 9CAD.tmp 640 848B.tmp 1452 6CC7.tmp 1084 BA4A.tmp 1396 B9ED.tmp 2612 BD75.tmp 1772 A083.tmp 2320 6F27.tmp 2316 BE32.tmp 2216 BDC3.tmp 2008 C17B.tmp 1064 57C1.tmp 2308 587C.tmp 1492 C2F1.tmp 624 8AB3.tmp 2400 A3CE.tmp 2436 A802.tmp 1704 C4C5.tmp 664 7436.tmp 1428 8CD5.tmp 1684 1094.tmp 1292 10F2.tmp 752 DF67.tmp 604 C7E1.tmp 900 8E3B.tmp 1992 5EB3.tmp 2260 A860.tmp 2220 140D.tmp 1776 A92B.tmp 2856 CA61.tmp 2212 A9E6.tmp 2992 6104.tmp 2364 15D2.tmp 1132 AB3D.tmp 2120 62C9.tmp 2464 6326.tmp 2848 1803.tmp 2820 CDCA.tmp 2372 CE37.tmp 2696 AD6F.tmp 2816 94D0.tmp 2744 CF7F.tmp 2796 E782.tmp 2948 D04A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2392 2396 E466.tmp 28 PID 2396 wrote to memory of 2392 2396 E466.tmp 28 PID 2396 wrote to memory of 2392 2396 E466.tmp 28 PID 2396 wrote to memory of 2392 2396 E466.tmp 28 PID 2392 wrote to memory of 2820 2392 B05B.tmp 85 PID 2392 wrote to memory of 2820 2392 B05B.tmp 85 PID 2392 wrote to memory of 2820 2392 B05B.tmp 85 PID 2392 wrote to memory of 2820 2392 B05B.tmp 85 PID 2820 wrote to memory of 2276 2820 CDCA.tmp 30 PID 2820 wrote to memory of 2276 2820 CDCA.tmp 30 PID 2820 wrote to memory of 2276 2820 CDCA.tmp 30 PID 2820 wrote to memory of 2276 2820 CDCA.tmp 30 PID 2276 wrote to memory of 2064 2276 B145.tmp 271 PID 2276 wrote to memory of 2064 2276 B145.tmp 271 PID 2276 wrote to memory of 2064 2276 B145.tmp 271 PID 2276 wrote to memory of 2064 2276 B145.tmp 271 PID 2064 wrote to memory of 2688 2064 4C1D.tmp 461 PID 2064 wrote to memory of 2688 2064 4C1D.tmp 461 PID 2064 wrote to memory of 2688 2064 4C1D.tmp 461 PID 2064 wrote to memory of 2688 2064 4C1D.tmp 461 PID 2688 wrote to memory of 2904 2688 9369.tmp 64 PID 2688 wrote to memory of 2904 2688 9369.tmp 64 PID 2688 wrote to memory of 2904 2688 9369.tmp 64 PID 2688 wrote to memory of 2904 2688 9369.tmp 64 PID 2904 wrote to memory of 2708 2904 B27D.tmp 537 PID 2904 wrote to memory of 2708 2904 B27D.tmp 537 PID 2904 wrote to memory of 2708 2904 B27D.tmp 537 PID 2904 wrote to memory of 2708 2904 B27D.tmp 537 PID 2708 wrote to memory of 2636 2708 B01D.tmp 340 PID 2708 wrote to memory of 2636 2708 B01D.tmp 340 PID 2708 wrote to memory of 2636 2708 B01D.tmp 340 PID 2708 wrote to memory of 2636 2708 B01D.tmp 340 PID 2636 wrote to memory of 2620 2636 6613.tmp 470 PID 2636 wrote to memory of 2620 2636 6613.tmp 470 PID 2636 wrote to memory of 2620 2636 6613.tmp 470 PID 2636 wrote to memory of 2620 2636 6613.tmp 470 PID 2620 wrote to memory of 1376 2620 9656.tmp 154 PID 2620 wrote to memory of 1376 2620 9656.tmp 154 PID 2620 wrote to memory of 1376 2620 9656.tmp 154 PID 2620 wrote to memory of 1376 2620 9656.tmp 154 PID 1376 wrote to memory of 2204 1376 E8AA.tmp 218 PID 1376 wrote to memory of 2204 1376 E8AA.tmp 218 PID 1376 wrote to memory of 2204 1376 E8AA.tmp 218 PID 1376 wrote to memory of 2204 1376 E8AA.tmp 218 PID 2204 wrote to memory of 1432 2204 34A7.tmp 477 PID 2204 wrote to memory of 1432 2204 34A7.tmp 477 PID 2204 wrote to memory of 1432 2204 34A7.tmp 477 PID 2204 wrote to memory of 1432 2204 34A7.tmp 477 PID 1432 wrote to memory of 2880 1432 98E5.tmp 414 PID 1432 wrote to memory of 2880 1432 98E5.tmp 414 PID 1432 wrote to memory of 2880 1432 98E5.tmp 414 PID 1432 wrote to memory of 2880 1432 98E5.tmp 414 PID 2880 wrote to memory of 2768 2880 8150.tmp 284 PID 2880 wrote to memory of 2768 2880 8150.tmp 284 PID 2880 wrote to memory of 2768 2880 8150.tmp 284 PID 2880 wrote to memory of 2768 2880 8150.tmp 284 PID 2768 wrote to memory of 1520 2768 50CE.tmp 289 PID 2768 wrote to memory of 1520 2768 50CE.tmp 289 PID 2768 wrote to memory of 1520 2768 50CE.tmp 289 PID 2768 wrote to memory of 1520 2768 50CE.tmp 289 PID 1520 wrote to memory of 1736 1520 518A.tmp 353 PID 1520 wrote to memory of 1736 1520 518A.tmp 353 PID 1520 wrote to memory of 1736 1520 518A.tmp 353 PID 1520 wrote to memory of 1736 1520 518A.tmp 353
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_a6780d3621c836fe52b3920de20a62ad_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_a6780d3621c836fe52b3920de20a62ad_mafia.exe"1⤵
- Loads dropped DLL
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\B05B.tmp"C:\Users\Admin\AppData\Local\Temp\B05B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\B0C9.tmp"C:\Users\Admin\AppData\Local\Temp\B0C9.tmp"3⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\B145.tmp"C:\Users\Admin\AppData\Local\Temp\B145.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\B1B3.tmp"C:\Users\Admin\AppData\Local\Temp\B1B3.tmp"5⤵PID:2064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B490.tmp"C:\Users\Admin\AppData\Local\Temp\B490.tmp"1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\B52C.tmp"C:\Users\Admin\AppData\Local\Temp\B52C.tmp"2⤵PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\B876.tmp"C:\Users\Admin\AppData\Local\Temp\B876.tmp"1⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\B8D4.tmp"C:\Users\Admin\AppData\Local\Temp\B8D4.tmp"2⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\BB63.tmp"C:\Users\Admin\AppData\Local\Temp\BB63.tmp"1⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\BBB1.tmp"C:\Users\Admin\AppData\Local\Temp\BBB1.tmp"2⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\BD75.tmp"C:\Users\Admin\AppData\Local\Temp\BD75.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\BE31.tmp"C:\Users\Admin\AppData\Local\Temp\BE31.tmp"4⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\BEFB.tmp"C:\Users\Admin\AppData\Local\Temp\BEFB.tmp"5⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\C033.tmp"C:\Users\Admin\AppData\Local\Temp\C033.tmp"6⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"7⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\C17B.tmp"C:\Users\Admin\AppData\Local\Temp\C17B.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BAE6.tmp"C:\Users\Admin\AppData\Local\Temp\BAE6.tmp"1⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\BA79.tmp"C:\Users\Admin\AppData\Local\Temp\BA79.tmp"1⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\B9CD.tmp"C:\Users\Admin\AppData\Local\Temp\B9CD.tmp"1⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\B951.tmp"C:\Users\Admin\AppData\Local\Temp\B951.tmp"1⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\B7DA.tmp"C:\Users\Admin\AppData\Local\Temp\B7DA.tmp"1⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\B76D.tmp"C:\Users\Admin\AppData\Local\Temp\B76D.tmp"1⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\51F7.tmp"C:\Users\Admin\AppData\Local\Temp\51F7.tmp"2⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\5245.tmp"C:\Users\Admin\AppData\Local\Temp\5245.tmp"3⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\52A2.tmp"C:\Users\Admin\AppData\Local\Temp\52A2.tmp"4⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\5300.tmp"C:\Users\Admin\AppData\Local\Temp\5300.tmp"5⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\535E.tmp"C:\Users\Admin\AppData\Local\Temp\535E.tmp"6⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\53BB.tmp"C:\Users\Admin\AppData\Local\Temp\53BB.tmp"7⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\5419.tmp"C:\Users\Admin\AppData\Local\Temp\5419.tmp"8⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\5476.tmp"C:\Users\Admin\AppData\Local\Temp\5476.tmp"9⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\54D4.tmp"C:\Users\Admin\AppData\Local\Temp\54D4.tmp"10⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\5532.tmp"C:\Users\Admin\AppData\Local\Temp\5532.tmp"11⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\5580.tmp"C:\Users\Admin\AppData\Local\Temp\5580.tmp"12⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\55DD.tmp"C:\Users\Admin\AppData\Local\Temp\55DD.tmp"13⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\563B.tmp"C:\Users\Admin\AppData\Local\Temp\563B.tmp"14⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\56A8.tmp"C:\Users\Admin\AppData\Local\Temp\56A8.tmp"15⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\5706.tmp"C:\Users\Admin\AppData\Local\Temp\5706.tmp"16⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\5763.tmp"C:\Users\Admin\AppData\Local\Temp\5763.tmp"17⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\57C1.tmp"C:\Users\Admin\AppData\Local\Temp\57C1.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\581F.tmp"C:\Users\Admin\AppData\Local\Temp\581F.tmp"19⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\587C.tmp"C:\Users\Admin\AppData\Local\Temp\587C.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"21⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\5947.tmp"C:\Users\Admin\AppData\Local\Temp\5947.tmp"22⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\59A5.tmp"C:\Users\Admin\AppData\Local\Temp\59A5.tmp"23⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp"24⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"25⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"26⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"27⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp"C:\Users\Admin\AppData\Local\Temp\5BA7.tmp"28⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\5C05.tmp"C:\Users\Admin\AppData\Local\Temp\5C05.tmp"29⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\5C63.tmp"C:\Users\Admin\AppData\Local\Temp\5C63.tmp"30⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"31⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\5D1E.tmp"C:\Users\Admin\AppData\Local\Temp\5D1E.tmp"32⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\5D7B.tmp"C:\Users\Admin\AppData\Local\Temp\5D7B.tmp"33⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\5EB3.tmp"C:\Users\Admin\AppData\Local\Temp\5EB3.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\5F11.tmp"C:\Users\Admin\AppData\Local\Temp\5F11.tmp"35⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\5F6F.tmp"C:\Users\Admin\AppData\Local\Temp\5F6F.tmp"36⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\5FBD.tmp"C:\Users\Admin\AppData\Local\Temp\5FBD.tmp"37⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\7899.tmp"C:\Users\Admin\AppData\Local\Temp\7899.tmp"38⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\78E7.tmp"C:\Users\Admin\AppData\Local\Temp\78E7.tmp"39⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\7935.tmp"C:\Users\Admin\AppData\Local\Temp\7935.tmp"40⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\7983.tmp"C:\Users\Admin\AppData\Local\Temp\7983.tmp"41⤵PID:292
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BC3D.tmp"C:\Users\Admin\AppData\Local\Temp\BC3D.tmp"13⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BC9B.tmp"C:\Users\Admin\AppData\Local\Temp\BC9B.tmp"14⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\BD08.tmp"C:\Users\Admin\AppData\Local\Temp\BD08.tmp"15⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\BD66.tmp"C:\Users\Admin\AppData\Local\Temp\BD66.tmp"16⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\BDC3.tmp"C:\Users\Admin\AppData\Local\Temp\BDC3.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\BE32.tmp"C:\Users\Admin\AppData\Local\Temp\BE32.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\BF69.tmp"C:\Users\Admin\AppData\Local\Temp\BF69.tmp"19⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"20⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\C024.tmp"C:\Users\Admin\AppData\Local\Temp\C024.tmp"21⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\C0EF.tmp"C:\Users\Admin\AppData\Local\Temp\C0EF.tmp"22⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\C13D.tmp"C:\Users\Admin\AppData\Local\Temp\C13D.tmp"23⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"24⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\C227.tmp"C:\Users\Admin\AppData\Local\Temp\C227.tmp"25⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\C284.tmp"C:\Users\Admin\AppData\Local\Temp\C284.tmp"26⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"27⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\C33F.tmp"C:\Users\Admin\AppData\Local\Temp\C33F.tmp"28⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\C39D.tmp"C:\Users\Admin\AppData\Local\Temp\C39D.tmp"29⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\C6A9.tmp"C:\Users\Admin\AppData\Local\Temp\C6A9.tmp"30⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\E81E.tmp"C:\Users\Admin\AppData\Local\Temp\E81E.tmp"31⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\F92E.tmp"C:\Users\Admin\AppData\Local\Temp\F92E.tmp"32⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\638.tmp"C:\Users\Admin\AppData\Local\Temp\638.tmp"33⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\83B.tmp"C:\Users\Admin\AppData\Local\Temp\83B.tmp"34⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\9C2.tmp"C:\Users\Admin\AppData\Local\Temp\9C2.tmp"35⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\A1E.tmp"C:\Users\Admin\AppData\Local\Temp\A1E.tmp"36⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\A9B.tmp"C:\Users\Admin\AppData\Local\Temp\A9B.tmp"37⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\B28.tmp"C:\Users\Admin\AppData\Local\Temp\B28.tmp"38⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\BE3.tmp"C:\Users\Admin\AppData\Local\Temp\BE3.tmp"39⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"40⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"41⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"42⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"43⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"44⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\FE8.tmp"C:\Users\Admin\AppData\Local\Temp\FE8.tmp"45⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\1075.tmp"C:\Users\Admin\AppData\Local\Temp\1075.tmp"46⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\10E2.tmp"C:\Users\Admin\AppData\Local\Temp\10E2.tmp"47⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\1150.tmp"C:\Users\Admin\AppData\Local\Temp\1150.tmp"48⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\120A.tmp"C:\Users\Admin\AppData\Local\Temp\120A.tmp"49⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\1287.tmp"C:\Users\Admin\AppData\Local\Temp\1287.tmp"50⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\12E6.tmp"C:\Users\Admin\AppData\Local\Temp\12E6.tmp"51⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\1343.tmp"C:\Users\Admin\AppData\Local\Temp\1343.tmp"52⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"53⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\146B.tmp"C:\Users\Admin\AppData\Local\Temp\146B.tmp"54⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\1630.tmp"C:\Users\Admin\AppData\Local\Temp\1630.tmp"55⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\168E.tmp"C:\Users\Admin\AppData\Local\Temp\168E.tmp"56⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"57⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\17E4.tmp"C:\Users\Admin\AppData\Local\Temp\17E4.tmp"58⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\1880.tmp"C:\Users\Admin\AppData\Local\Temp\1880.tmp"59⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\193B.tmp"C:\Users\Admin\AppData\Local\Temp\193B.tmp"60⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\1A16.tmp"C:\Users\Admin\AppData\Local\Temp\1A16.tmp"61⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\1A73.tmp"C:\Users\Admin\AppData\Local\Temp\1A73.tmp"62⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"63⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"64⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\1C09.tmp"C:\Users\Admin\AppData\Local\Temp\1C09.tmp"65⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\3DBD.tmp"C:\Users\Admin\AppData\Local\Temp\3DBD.tmp"66⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"67⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"68⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\400D.tmp"C:\Users\Admin\AppData\Local\Temp\400D.tmp"69⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\4099.tmp"C:\Users\Admin\AppData\Local\Temp\4099.tmp"70⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\40F6.tmp"C:\Users\Admin\AppData\Local\Temp\40F6.tmp"71⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\4154.tmp"C:\Users\Admin\AppData\Local\Temp\4154.tmp"72⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\41D1.tmp"C:\Users\Admin\AppData\Local\Temp\41D1.tmp"73⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\423E.tmp"C:\Users\Admin\AppData\Local\Temp\423E.tmp"74⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\42AB.tmp"C:\Users\Admin\AppData\Local\Temp\42AB.tmp"75⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\4318.tmp"C:\Users\Admin\AppData\Local\Temp\4318.tmp"76⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\4366.tmp"C:\Users\Admin\AppData\Local\Temp\4366.tmp"77⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\43E3.tmp"C:\Users\Admin\AppData\Local\Temp\43E3.tmp"78⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\4441.tmp"C:\Users\Admin\AppData\Local\Temp\4441.tmp"79⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\449E.tmp"C:\Users\Admin\AppData\Local\Temp\449E.tmp"80⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\452B.tmp"C:\Users\Admin\AppData\Local\Temp\452B.tmp"81⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\4588.tmp"C:\Users\Admin\AppData\Local\Temp\4588.tmp"82⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\45F6.tmp"C:\Users\Admin\AppData\Local\Temp\45F6.tmp"83⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\4672.tmp"C:\Users\Admin\AppData\Local\Temp\4672.tmp"84⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\46E0.tmp"C:\Users\Admin\AppData\Local\Temp\46E0.tmp"85⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\473D.tmp"C:\Users\Admin\AppData\Local\Temp\473D.tmp"86⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\47AA.tmp"C:\Users\Admin\AppData\Local\Temp\47AA.tmp"87⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\4808.tmp"C:\Users\Admin\AppData\Local\Temp\4808.tmp"88⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\4885.tmp"C:\Users\Admin\AppData\Local\Temp\4885.tmp"89⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\48F2.tmp"C:\Users\Admin\AppData\Local\Temp\48F2.tmp"90⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\4950.tmp"C:\Users\Admin\AppData\Local\Temp\4950.tmp"91⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\49CC.tmp"C:\Users\Admin\AppData\Local\Temp\49CC.tmp"92⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\4A49.tmp"C:\Users\Admin\AppData\Local\Temp\4A49.tmp"93⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\4A98.tmp"C:\Users\Admin\AppData\Local\Temp\4A98.tmp"94⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\4B04.tmp"C:\Users\Admin\AppData\Local\Temp\4B04.tmp"95⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\4B63.tmp"C:\Users\Admin\AppData\Local\Temp\4B63.tmp"96⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\4BC1.tmp"C:\Users\Admin\AppData\Local\Temp\4BC1.tmp"97⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\4C1E.tmp"C:\Users\Admin\AppData\Local\Temp\4C1E.tmp"98⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\4C8B.tmp"C:\Users\Admin\AppData\Local\Temp\4C8B.tmp"99⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\4CE8.tmp"C:\Users\Admin\AppData\Local\Temp\4CE8.tmp"100⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\4D65.tmp"C:\Users\Admin\AppData\Local\Temp\4D65.tmp"101⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"102⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\4E30.tmp"C:\Users\Admin\AppData\Local\Temp\4E30.tmp"103⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\4EAD.tmp"C:\Users\Admin\AppData\Local\Temp\4EAD.tmp"104⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"105⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\4F87.tmp"C:\Users\Admin\AppData\Local\Temp\4F87.tmp"106⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\4FC5.tmp"C:\Users\Admin\AppData\Local\Temp\4FC5.tmp"107⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\5033.tmp"C:\Users\Admin\AppData\Local\Temp\5033.tmp"108⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\5090.tmp"C:\Users\Admin\AppData\Local\Temp\5090.tmp"109⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\50FD.tmp"C:\Users\Admin\AppData\Local\Temp\50FD.tmp"110⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\517A.tmp"C:\Users\Admin\AppData\Local\Temp\517A.tmp"111⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\51D8.tmp"C:\Users\Admin\AppData\Local\Temp\51D8.tmp"112⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\5255.tmp"C:\Users\Admin\AppData\Local\Temp\5255.tmp"113⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\534E.tmp"C:\Users\Admin\AppData\Local\Temp\534E.tmp"114⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\53AC.tmp"C:\Users\Admin\AppData\Local\Temp\53AC.tmp"115⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\5409.tmp"C:\Users\Admin\AppData\Local\Temp\5409.tmp"116⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\5477.tmp"C:\Users\Admin\AppData\Local\Temp\5477.tmp"117⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\54E4.tmp"C:\Users\Admin\AppData\Local\Temp\54E4.tmp"118⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\5522.tmp"C:\Users\Admin\AppData\Local\Temp\5522.tmp"119⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\559F.tmp"C:\Users\Admin\AppData\Local\Temp\559F.tmp"120⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\560C.tmp"C:\Users\Admin\AppData\Local\Temp\560C.tmp"121⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\5679.tmp"C:\Users\Admin\AppData\Local\Temp\5679.tmp"122⤵PID:2284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-