Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 16:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe
-
Size
541KB
-
MD5
be5b9d1e7c8f8d679eeafac4492b0902
-
SHA1
8276a50f91ab99eae97dac5448fcb5881989d4bc
-
SHA256
4792ed34d3f31461f662fec5e751df32cec0c101ac51ba79e204f07f08c915f8
-
SHA512
9e7ada75174a03179656267ba4ca54da5a225ea6f45c578e60e87c3b01826de2bc576119a97d5c6887208258f17070e3e8ef0f3482c67b914aa871720f67f877
-
SSDEEP
12288:UU5rCOTeifGuuLp+EQXNRLJcmrZa73ctO:UUQOJfIdZ+J1rU73ctO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1680 FA94.tmp 2180 FAF2.tmp 1152 FB30.tmp 2292 FB7E.tmp 2692 FBDC.tmp 2760 ACA.tmp 2772 FC68.tmp 2608 FCB6.tmp 2532 FCF5.tmp 2604 FD43.tmp 2524 FD81.tmp 2928 FDCF.tmp 2112 CFC.tmp 1244 FE5C.tmp 2584 FE9A.tmp 2480 FED8.tmp 2788 FF36.tmp 1584 FF74.tmp 2892 FFB3.tmp 2880 FFF1.tmp 1980 30.tmp 1444 7E.tmp 3044 BC.tmp 1296 10A.tmp 3036 148.tmp 2064 187.tmp 2360 1C5.tmp 1996 204.tmp 2868 242.tmp 540 280.tmp 1160 2BF.tmp 1060 2FD.tmp 1492 33C.tmp 1824 37A.tmp 1968 3B8.tmp 696 3F7.tmp 472 435.tmp 1208 474.tmp 1088 4A2.tmp 1456 4E1.tmp 1552 51F.tmp 1616 55E.tmp 2680 59C.tmp 404 5DA.tmp 1752 619.tmp 3012 667.tmp 1128 6A5.tmp 904 6E4.tmp 1832 722.tmp 2032 760.tmp 2184 79F.tmp 1760 7DD.tmp 880 81C.tmp 2088 85A.tmp 1676 898.tmp 2172 8D7.tmp 1680 915.tmp 2464 954.tmp 2600 992.tmp 2068 9D0.tmp 1928 A0F.tmp 2756 A4D.tmp 2744 A8C.tmp 2760 ACA.tmp -
Loads dropped DLL 64 IoCs
pid Process 944 2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe 1680 915.tmp 2180 FAF2.tmp 1152 FB30.tmp 2292 FB7E.tmp 2692 FBDC.tmp 2760 ACA.tmp 2772 FC68.tmp 2608 FCB6.tmp 2532 FCF5.tmp 2604 FD43.tmp 2524 FD81.tmp 2928 FDCF.tmp 2112 CFC.tmp 1244 FE5C.tmp 2584 FE9A.tmp 2480 FED8.tmp 2788 FF36.tmp 1584 FF74.tmp 2892 FFB3.tmp 2880 FFF1.tmp 1980 30.tmp 1444 7E.tmp 3044 BC.tmp 1296 10A.tmp 3036 148.tmp 2064 187.tmp 2360 1C5.tmp 1996 204.tmp 2868 242.tmp 540 280.tmp 1160 2BF.tmp 1060 2FD.tmp 1492 33C.tmp 1824 37A.tmp 1968 3B8.tmp 696 3F7.tmp 472 435.tmp 1208 474.tmp 1088 4A2.tmp 1456 4E1.tmp 1552 51F.tmp 1616 55E.tmp 2680 59C.tmp 404 5DA.tmp 1752 619.tmp 3012 667.tmp 1128 6A5.tmp 904 6E4.tmp 1832 722.tmp 2032 760.tmp 2184 79F.tmp 1760 7DD.tmp 880 81C.tmp 2088 85A.tmp 1676 898.tmp 2172 8D7.tmp 1680 915.tmp 2464 954.tmp 2600 992.tmp 2068 9D0.tmp 1928 A0F.tmp 2756 A4D.tmp 2744 A8C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 1680 944 2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe 28 PID 944 wrote to memory of 1680 944 2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe 28 PID 944 wrote to memory of 1680 944 2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe 28 PID 944 wrote to memory of 1680 944 2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe 28 PID 1680 wrote to memory of 2180 1680 915.tmp 29 PID 1680 wrote to memory of 2180 1680 915.tmp 29 PID 1680 wrote to memory of 2180 1680 915.tmp 29 PID 1680 wrote to memory of 2180 1680 915.tmp 29 PID 2180 wrote to memory of 1152 2180 FAF2.tmp 30 PID 2180 wrote to memory of 1152 2180 FAF2.tmp 30 PID 2180 wrote to memory of 1152 2180 FAF2.tmp 30 PID 2180 wrote to memory of 1152 2180 FAF2.tmp 30 PID 1152 wrote to memory of 2292 1152 FB30.tmp 31 PID 1152 wrote to memory of 2292 1152 FB30.tmp 31 PID 1152 wrote to memory of 2292 1152 FB30.tmp 31 PID 1152 wrote to memory of 2292 1152 FB30.tmp 31 PID 2292 wrote to memory of 2692 2292 FB7E.tmp 32 PID 2292 wrote to memory of 2692 2292 FB7E.tmp 32 PID 2292 wrote to memory of 2692 2292 FB7E.tmp 32 PID 2292 wrote to memory of 2692 2292 FB7E.tmp 32 PID 2692 wrote to memory of 2760 2692 FBDC.tmp 62 PID 2692 wrote to memory of 2760 2692 FBDC.tmp 62 PID 2692 wrote to memory of 2760 2692 FBDC.tmp 62 PID 2692 wrote to memory of 2760 2692 FBDC.tmp 62 PID 2760 wrote to memory of 2772 2760 ACA.tmp 99 PID 2760 wrote to memory of 2772 2760 ACA.tmp 99 PID 2760 wrote to memory of 2772 2760 ACA.tmp 99 PID 2760 wrote to memory of 2772 2760 ACA.tmp 99 PID 2772 wrote to memory of 2608 2772 FC68.tmp 98 PID 2772 wrote to memory of 2608 2772 FC68.tmp 98 PID 2772 wrote to memory of 2608 2772 FC68.tmp 98 PID 2772 wrote to memory of 2608 2772 FC68.tmp 98 PID 2608 wrote to memory of 2532 2608 FCB6.tmp 97 PID 2608 wrote to memory of 2532 2608 FCB6.tmp 97 PID 2608 wrote to memory of 2532 2608 FCB6.tmp 97 PID 2608 wrote to memory of 2532 2608 FCB6.tmp 97 PID 2532 wrote to memory of 2604 2532 FCF5.tmp 96 PID 2532 wrote to memory of 2604 2532 FCF5.tmp 96 PID 2532 wrote to memory of 2604 2532 FCF5.tmp 96 PID 2532 wrote to memory of 2604 2532 FCF5.tmp 96 PID 2604 wrote to memory of 2524 2604 FD43.tmp 95 PID 2604 wrote to memory of 2524 2604 FD43.tmp 95 PID 2604 wrote to memory of 2524 2604 FD43.tmp 95 PID 2604 wrote to memory of 2524 2604 FD43.tmp 95 PID 2524 wrote to memory of 2928 2524 FD81.tmp 94 PID 2524 wrote to memory of 2928 2524 FD81.tmp 94 PID 2524 wrote to memory of 2928 2524 FD81.tmp 94 PID 2524 wrote to memory of 2928 2524 FD81.tmp 94 PID 2928 wrote to memory of 2112 2928 FDCF.tmp 100 PID 2928 wrote to memory of 2112 2928 FDCF.tmp 100 PID 2928 wrote to memory of 2112 2928 FDCF.tmp 100 PID 2928 wrote to memory of 2112 2928 FDCF.tmp 100 PID 2112 wrote to memory of 1244 2112 CFC.tmp 92 PID 2112 wrote to memory of 1244 2112 CFC.tmp 92 PID 2112 wrote to memory of 1244 2112 CFC.tmp 92 PID 2112 wrote to memory of 1244 2112 CFC.tmp 92 PID 1244 wrote to memory of 2584 1244 FE5C.tmp 91 PID 1244 wrote to memory of 2584 1244 FE5C.tmp 91 PID 1244 wrote to memory of 2584 1244 FE5C.tmp 91 PID 1244 wrote to memory of 2584 1244 FE5C.tmp 91 PID 2584 wrote to memory of 2480 2584 FE9A.tmp 90 PID 2584 wrote to memory of 2480 2584 FE9A.tmp 90 PID 2584 wrote to memory of 2480 2584 FE9A.tmp 90 PID 2584 wrote to memory of 2480 2584 FE9A.tmp 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-22_be5b9d1e7c8f8d679eeafac4492b0902_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\FA94.tmp"C:\Users\Admin\AppData\Local\Temp\FA94.tmp"2⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\FAF2.tmp"C:\Users\Admin\AppData\Local\Temp\FAF2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\FB30.tmp"C:\Users\Admin\AppData\Local\Temp\FB30.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\FB7E.tmp"C:\Users\Admin\AppData\Local\Temp\FB7E.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\FBDC.tmp"C:\Users\Admin\AppData\Local\Temp\FBDC.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\FC2A.tmp"C:\Users\Admin\AppData\Local\Temp\FC2A.tmp"7⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\B08.tmp"C:\Users\Admin\AppData\Local\Temp\B08.tmp"8⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\B47.tmp"C:\Users\Admin\AppData\Local\Temp\B47.tmp"9⤵PID:2516
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10A.tmp"C:\Users\Admin\AppData\Local\Temp\10A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\148.tmp"C:\Users\Admin\AppData\Local\Temp\148.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\187.tmp"C:\Users\Admin\AppData\Local\Temp\187.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\1C5.tmp"C:\Users\Admin\AppData\Local\Temp\1C5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\204.tmp"C:\Users\Admin\AppData\Local\Temp\204.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\242.tmp"C:\Users\Admin\AppData\Local\Temp\242.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\2BF.tmp"C:\Users\Admin\AppData\Local\Temp\2BF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\2FD.tmp"C:\Users\Admin\AppData\Local\Temp\2FD.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\37A.tmp"C:\Users\Admin\AppData\Local\Temp\37A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3B8.tmp"C:\Users\Admin\AppData\Local\Temp\3B8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3F7.tmp"C:\Users\Admin\AppData\Local\Temp\3F7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696
-
-
-
C:\Users\Admin\AppData\Local\Temp\435.tmp"C:\Users\Admin\AppData\Local\Temp\435.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:472 -
C:\Users\Admin\AppData\Local\Temp\474.tmp"C:\Users\Admin\AppData\Local\Temp\474.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\4A2.tmp"C:\Users\Admin\AppData\Local\Temp\4A2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\4E1.tmp"C:\Users\Admin\AppData\Local\Temp\4E1.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\51F.tmp"C:\Users\Admin\AppData\Local\Temp\51F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\55E.tmp"C:\Users\Admin\AppData\Local\Temp\55E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\59C.tmp"C:\Users\Admin\AppData\Local\Temp\59C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\5DA.tmp"C:\Users\Admin\AppData\Local\Temp\5DA.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\619.tmp"C:\Users\Admin\AppData\Local\Temp\619.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\667.tmp"C:\Users\Admin\AppData\Local\Temp\667.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\6A5.tmp"C:\Users\Admin\AppData\Local\Temp\6A5.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\6E4.tmp"C:\Users\Admin\AppData\Local\Temp\6E4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\760.tmp"C:\Users\Admin\AppData\Local\Temp\760.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\79F.tmp"C:\Users\Admin\AppData\Local\Temp\79F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\81C.tmp"C:\Users\Admin\AppData\Local\Temp\81C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Users\Admin\AppData\Local\Temp\85A.tmp"C:\Users\Admin\AppData\Local\Temp\85A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\915.tmp"C:\Users\Admin\AppData\Local\Temp\915.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\954.tmp"C:\Users\Admin\AppData\Local\Temp\954.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\992.tmp"C:\Users\Admin\AppData\Local\Temp\992.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\9D0.tmp"C:\Users\Admin\AppData\Local\Temp\9D0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\A0F.tmp"C:\Users\Admin\AppData\Local\Temp\A0F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\A4D.tmp"C:\Users\Admin\AppData\Local\Temp\A4D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\A8C.tmp"C:\Users\Admin\AppData\Local\Temp\A8C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\ACA.tmp"C:\Users\Admin\AppData\Local\Temp\ACA.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\FC68.tmp"C:\Users\Admin\AppData\Local\Temp\FC68.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B85.tmp"C:\Users\Admin\AppData\Local\Temp\B85.tmp"1⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\BC4.tmp"C:\Users\Admin\AppData\Local\Temp\BC4.tmp"2⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\C02.tmp"C:\Users\Admin\AppData\Local\Temp\C02.tmp"3⤵PID:2528
-
-
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"1⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\C7F.tmp"C:\Users\Admin\AppData\Local\Temp\C7F.tmp"2⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"3⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\CFC.tmp"C:\Users\Admin\AppData\Local\Temp\CFC.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\D3A.tmp"C:\Users\Admin\AppData\Local\Temp\D3A.tmp"5⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\D98.tmp"C:\Users\Admin\AppData\Local\Temp\D98.tmp"6⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"7⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\E24.tmp"C:\Users\Admin\AppData\Local\Temp\E24.tmp"8⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"9⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"10⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"11⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"12⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\FD9.tmp"C:\Users\Admin\AppData\Local\Temp\FD9.tmp"13⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\1036.tmp"C:\Users\Admin\AppData\Local\Temp\1036.tmp"14⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\10A4.tmp"C:\Users\Admin\AppData\Local\Temp\10A4.tmp"15⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\10F2.tmp"C:\Users\Admin\AppData\Local\Temp\10F2.tmp"16⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\114F.tmp"C:\Users\Admin\AppData\Local\Temp\114F.tmp"17⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\119D.tmp"C:\Users\Admin\AppData\Local\Temp\119D.tmp"18⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\11DC.tmp"C:\Users\Admin\AppData\Local\Temp\11DC.tmp"19⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\121A.tmp"C:\Users\Admin\AppData\Local\Temp\121A.tmp"20⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\1258.tmp"C:\Users\Admin\AppData\Local\Temp\1258.tmp"21⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\1297.tmp"C:\Users\Admin\AppData\Local\Temp\1297.tmp"22⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\12D5.tmp"C:\Users\Admin\AppData\Local\Temp\12D5.tmp"23⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\1314.tmp"C:\Users\Admin\AppData\Local\Temp\1314.tmp"24⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\1352.tmp"C:\Users\Admin\AppData\Local\Temp\1352.tmp"25⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\1390.tmp"C:\Users\Admin\AppData\Local\Temp\1390.tmp"26⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\13CF.tmp"C:\Users\Admin\AppData\Local\Temp\13CF.tmp"27⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"28⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"29⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"30⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"31⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\1516.tmp"C:\Users\Admin\AppData\Local\Temp\1516.tmp"32⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"33⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"34⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\15E1.tmp"C:\Users\Admin\AppData\Local\Temp\15E1.tmp"35⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\1620.tmp"C:\Users\Admin\AppData\Local\Temp\1620.tmp"36⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"37⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\169C.tmp"C:\Users\Admin\AppData\Local\Temp\169C.tmp"38⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\16DB.tmp"C:\Users\Admin\AppData\Local\Temp\16DB.tmp"39⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"40⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp"41⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\1796.tmp"C:\Users\Admin\AppData\Local\Temp\1796.tmp"42⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\17E4.tmp"C:\Users\Admin\AppData\Local\Temp\17E4.tmp"43⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\1822.tmp"C:\Users\Admin\AppData\Local\Temp\1822.tmp"44⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\1861.tmp"C:\Users\Admin\AppData\Local\Temp\1861.tmp"45⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\189F.tmp"C:\Users\Admin\AppData\Local\Temp\189F.tmp"46⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\18ED.tmp"C:\Users\Admin\AppData\Local\Temp\18ED.tmp"47⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"48⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\196A.tmp"C:\Users\Admin\AppData\Local\Temp\196A.tmp"49⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\19A8.tmp"C:\Users\Admin\AppData\Local\Temp\19A8.tmp"50⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"51⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\1A25.tmp"C:\Users\Admin\AppData\Local\Temp\1A25.tmp"52⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\1A64.tmp"C:\Users\Admin\AppData\Local\Temp\1A64.tmp"53⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"54⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"55⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"56⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"57⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"58⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"59⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\1C28.tmp"C:\Users\Admin\AppData\Local\Temp\1C28.tmp"60⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"61⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\1CB4.tmp"C:\Users\Admin\AppData\Local\Temp\1CB4.tmp"62⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"63⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\1D41.tmp"C:\Users\Admin\AppData\Local\Temp\1D41.tmp"64⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"65⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"66⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\1E1B.tmp"C:\Users\Admin\AppData\Local\Temp\1E1B.tmp"67⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\1E69.tmp"C:\Users\Admin\AppData\Local\Temp\1E69.tmp"68⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"69⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"70⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\1F24.tmp"C:\Users\Admin\AppData\Local\Temp\1F24.tmp"71⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\1F63.tmp"C:\Users\Admin\AppData\Local\Temp\1F63.tmp"72⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"73⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"74⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"75⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\206C.tmp"C:\Users\Admin\AppData\Local\Temp\206C.tmp"76⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"77⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"78⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"79⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2194.tmp"C:\Users\Admin\AppData\Local\Temp\2194.tmp"80⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"81⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2221.tmp"C:\Users\Admin\AppData\Local\Temp\2221.tmp"82⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\225F.tmp"C:\Users\Admin\AppData\Local\Temp\225F.tmp"83⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\229E.tmp"C:\Users\Admin\AppData\Local\Temp\229E.tmp"84⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\22DC.tmp"C:\Users\Admin\AppData\Local\Temp\22DC.tmp"85⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\232A.tmp"C:\Users\Admin\AppData\Local\Temp\232A.tmp"86⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2368.tmp"C:\Users\Admin\AppData\Local\Temp\2368.tmp"87⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\23A7.tmp"C:\Users\Admin\AppData\Local\Temp\23A7.tmp"88⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"89⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2424.tmp"C:\Users\Admin\AppData\Local\Temp\2424.tmp"90⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2462.tmp"C:\Users\Admin\AppData\Local\Temp\2462.tmp"91⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"92⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"93⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\251D.tmp"C:\Users\Admin\AppData\Local\Temp\251D.tmp"94⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"95⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\25AA.tmp"C:\Users\Admin\AppData\Local\Temp\25AA.tmp"96⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"97⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\2626.tmp"C:\Users\Admin\AppData\Local\Temp\2626.tmp"98⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"99⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"100⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\26E2.tmp"C:\Users\Admin\AppData\Local\Temp\26E2.tmp"101⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2720.tmp"C:\Users\Admin\AppData\Local\Temp\2720.tmp"102⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\275E.tmp"C:\Users\Admin\AppData\Local\Temp\275E.tmp"103⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\279D.tmp"C:\Users\Admin\AppData\Local\Temp\279D.tmp"104⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\27DB.tmp"C:\Users\Admin\AppData\Local\Temp\27DB.tmp"105⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\281A.tmp"C:\Users\Admin\AppData\Local\Temp\281A.tmp"106⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2858.tmp"C:\Users\Admin\AppData\Local\Temp\2858.tmp"107⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2896.tmp"C:\Users\Admin\AppData\Local\Temp\2896.tmp"108⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\28D5.tmp"C:\Users\Admin\AppData\Local\Temp\28D5.tmp"109⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2913.tmp"C:\Users\Admin\AppData\Local\Temp\2913.tmp"110⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2952.tmp"C:\Users\Admin\AppData\Local\Temp\2952.tmp"111⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2990.tmp"C:\Users\Admin\AppData\Local\Temp\2990.tmp"112⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\29CE.tmp"C:\Users\Admin\AppData\Local\Temp\29CE.tmp"113⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"114⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"115⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"116⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"117⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"118⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"119⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"120⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"121⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"122⤵PID:2040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-