Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 00:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe
-
Size
486KB
-
MD5
d225b3bd897a7aeaf6c178d93590a537
-
SHA1
7e0543c7818b51d8d1c265536759cae7bc467974
-
SHA256
c213fa42786bd758ebe64cdf42fb5107a5fc17904de481c4ebeb7e11ba56c8c5
-
SHA512
e672c88f4367985582f465cb23f1ac1510f5540b1f0b4ee4b589ee7746fb00293896483b6b6a1f4857ef05bff267862517219a3f075ce8f25416692e300a27f0
-
SSDEEP
6144:Borf3lPvovsgZnqG2C7mOTeiLfD7X9r6KBa93cxNvs20LEoJs8fBj/A2aCPSFzuG:oU5rCOTeiDXd6L93A50zzJjraC3whNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2732 657.tmp 1968 6C4.tmp 1744 722.tmp 2788 780.tmp 2584 7DD.tmp 2680 84A.tmp 2580 8A8.tmp 1716 906.tmp 2764 963.tmp 2568 9B1.tmp 2472 9F0.tmp 2356 A3E.tmp 2872 A8C.tmp 2236 ACA.tmp 1984 B08.tmp 1820 B56.tmp 1804 B95.tmp 2120 BD3.tmp 1872 C21.tmp 1636 C60.tmp 1868 C9E.tmp 2632 CDC.tmp 1388 D1B.tmp 2072 D59.tmp 2780 DA7.tmp 1824 DD6.tmp 2124 E14.tmp 2256 E43.tmp 2296 E72.tmp 600 EB0.tmp 544 EEF.tmp 592 F2D.tmp 1644 F5C.tmp 2112 F9A.tmp 1896 FD9.tmp 2212 1008.tmp 412 1046.tmp 2432 1084.tmp 2668 10C3.tmp 2828 1101.tmp 1568 1140.tmp 1860 116E.tmp 912 11AD.tmp 2192 11EB.tmp 1092 122A.tmp 572 1268.tmp 2436 12A6.tmp 2196 12E5.tmp 1688 1323.tmp 3056 1362.tmp 2640 13A0.tmp 892 13DE.tmp 2044 141D.tmp 2252 145B.tmp 1580 14D8.tmp 2024 1516.tmp 2320 1555.tmp 1968 1593.tmp 2900 15C2.tmp 2292 1600.tmp 2644 163F.tmp 2812 167D.tmp 2648 16BC.tmp 2952 16FA.tmp -
Loads dropped DLL 64 IoCs
pid Process 2888 2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe 2732 657.tmp 1968 6C4.tmp 1744 722.tmp 2788 780.tmp 2584 7DD.tmp 2680 84A.tmp 2580 8A8.tmp 1716 906.tmp 2764 963.tmp 2568 9B1.tmp 2472 9F0.tmp 2356 A3E.tmp 2872 A8C.tmp 2236 ACA.tmp 1984 B08.tmp 1820 B56.tmp 1804 B95.tmp 2120 BD3.tmp 1872 C21.tmp 1636 C60.tmp 1868 C9E.tmp 2632 CDC.tmp 1388 D1B.tmp 2072 D59.tmp 2780 DA7.tmp 1824 DD6.tmp 2124 E14.tmp 2256 E43.tmp 2296 E72.tmp 600 EB0.tmp 544 EEF.tmp 592 F2D.tmp 1644 F5C.tmp 2112 F9A.tmp 1896 FD9.tmp 2212 1008.tmp 412 1046.tmp 2432 1084.tmp 2668 10C3.tmp 2828 1101.tmp 1568 1140.tmp 1860 116E.tmp 912 11AD.tmp 2192 11EB.tmp 1092 122A.tmp 572 1268.tmp 2436 12A6.tmp 2196 12E5.tmp 1688 1323.tmp 3056 1362.tmp 2640 13A0.tmp 892 13DE.tmp 2044 141D.tmp 2784 149A.tmp 1580 14D8.tmp 2024 1516.tmp 2320 1555.tmp 1968 1593.tmp 2900 15C2.tmp 2292 1600.tmp 2644 163F.tmp 2812 167D.tmp 2648 16BC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2732 2888 2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe 28 PID 2888 wrote to memory of 2732 2888 2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe 28 PID 2888 wrote to memory of 2732 2888 2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe 28 PID 2888 wrote to memory of 2732 2888 2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe 28 PID 2732 wrote to memory of 1968 2732 657.tmp 29 PID 2732 wrote to memory of 1968 2732 657.tmp 29 PID 2732 wrote to memory of 1968 2732 657.tmp 29 PID 2732 wrote to memory of 1968 2732 657.tmp 29 PID 1968 wrote to memory of 1744 1968 6C4.tmp 30 PID 1968 wrote to memory of 1744 1968 6C4.tmp 30 PID 1968 wrote to memory of 1744 1968 6C4.tmp 30 PID 1968 wrote to memory of 1744 1968 6C4.tmp 30 PID 1744 wrote to memory of 2788 1744 722.tmp 31 PID 1744 wrote to memory of 2788 1744 722.tmp 31 PID 1744 wrote to memory of 2788 1744 722.tmp 31 PID 1744 wrote to memory of 2788 1744 722.tmp 31 PID 2788 wrote to memory of 2584 2788 780.tmp 32 PID 2788 wrote to memory of 2584 2788 780.tmp 32 PID 2788 wrote to memory of 2584 2788 780.tmp 32 PID 2788 wrote to memory of 2584 2788 780.tmp 32 PID 2584 wrote to memory of 2680 2584 7DD.tmp 33 PID 2584 wrote to memory of 2680 2584 7DD.tmp 33 PID 2584 wrote to memory of 2680 2584 7DD.tmp 33 PID 2584 wrote to memory of 2680 2584 7DD.tmp 33 PID 2680 wrote to memory of 2580 2680 84A.tmp 34 PID 2680 wrote to memory of 2580 2680 84A.tmp 34 PID 2680 wrote to memory of 2580 2680 84A.tmp 34 PID 2680 wrote to memory of 2580 2680 84A.tmp 34 PID 2580 wrote to memory of 1716 2580 8A8.tmp 35 PID 2580 wrote to memory of 1716 2580 8A8.tmp 35 PID 2580 wrote to memory of 1716 2580 8A8.tmp 35 PID 2580 wrote to memory of 1716 2580 8A8.tmp 35 PID 1716 wrote to memory of 2764 1716 906.tmp 36 PID 1716 wrote to memory of 2764 1716 906.tmp 36 PID 1716 wrote to memory of 2764 1716 906.tmp 36 PID 1716 wrote to memory of 2764 1716 906.tmp 36 PID 2764 wrote to memory of 2568 2764 963.tmp 37 PID 2764 wrote to memory of 2568 2764 963.tmp 37 PID 2764 wrote to memory of 2568 2764 963.tmp 37 PID 2764 wrote to memory of 2568 2764 963.tmp 37 PID 2568 wrote to memory of 2472 2568 9B1.tmp 94 PID 2568 wrote to memory of 2472 2568 9B1.tmp 94 PID 2568 wrote to memory of 2472 2568 9B1.tmp 94 PID 2568 wrote to memory of 2472 2568 9B1.tmp 94 PID 2472 wrote to memory of 2356 2472 9F0.tmp 41 PID 2472 wrote to memory of 2356 2472 9F0.tmp 41 PID 2472 wrote to memory of 2356 2472 9F0.tmp 41 PID 2472 wrote to memory of 2356 2472 9F0.tmp 41 PID 2356 wrote to memory of 2872 2356 A3E.tmp 40 PID 2356 wrote to memory of 2872 2356 A3E.tmp 40 PID 2356 wrote to memory of 2872 2356 A3E.tmp 40 PID 2356 wrote to memory of 2872 2356 A3E.tmp 40 PID 2872 wrote to memory of 2236 2872 A8C.tmp 39 PID 2872 wrote to memory of 2236 2872 A8C.tmp 39 PID 2872 wrote to memory of 2236 2872 A8C.tmp 39 PID 2872 wrote to memory of 2236 2872 A8C.tmp 39 PID 2236 wrote to memory of 1984 2236 ACA.tmp 38 PID 2236 wrote to memory of 1984 2236 ACA.tmp 38 PID 2236 wrote to memory of 1984 2236 ACA.tmp 38 PID 2236 wrote to memory of 1984 2236 ACA.tmp 38 PID 1984 wrote to memory of 1820 1984 B08.tmp 93 PID 1984 wrote to memory of 1820 1984 B08.tmp 93 PID 1984 wrote to memory of 1820 1984 B08.tmp 93 PID 1984 wrote to memory of 1820 1984 B08.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_d225b3bd897a7aeaf6c178d93590a537_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\657.tmp"C:\Users\Admin\AppData\Local\Temp\657.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\6C4.tmp"C:\Users\Admin\AppData\Local\Temp\6C4.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\722.tmp"C:\Users\Admin\AppData\Local\Temp\722.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\780.tmp"C:\Users\Admin\AppData\Local\Temp\780.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\7DD.tmp"C:\Users\Admin\AppData\Local\Temp\7DD.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\84A.tmp"C:\Users\Admin\AppData\Local\Temp\84A.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\8A8.tmp"C:\Users\Admin\AppData\Local\Temp\8A8.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\906.tmp"C:\Users\Admin\AppData\Local\Temp\906.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\963.tmp"C:\Users\Admin\AppData\Local\Temp\963.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\9B1.tmp"C:\Users\Admin\AppData\Local\Temp\9B1.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\9F0.tmp"C:\Users\Admin\AppData\Local\Temp\9F0.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\15C2.tmp"C:\Users\Admin\AppData\Local\Temp\15C2.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\1600.tmp"C:\Users\Admin\AppData\Local\Temp\1600.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\163F.tmp"C:\Users\Admin\AppData\Local\Temp\163F.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B08.tmp"C:\Users\Admin\AppData\Local\Temp\B08.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\B56.tmp"C:\Users\Admin\AppData\Local\Temp\B56.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\ACA.tmp"C:\Users\Admin\AppData\Local\Temp\ACA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236
-
C:\Users\Admin\AppData\Local\Temp\A8C.tmp"C:\Users\Admin\AppData\Local\Temp\A8C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872
-
C:\Users\Admin\AppData\Local\Temp\A3E.tmp"C:\Users\Admin\AppData\Local\Temp\A3E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356
-
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\DA7.tmp"C:\Users\Admin\AppData\Local\Temp\DA7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\E43.tmp"C:\Users\Admin\AppData\Local\Temp\E43.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\EEF.tmp"C:\Users\Admin\AppData\Local\Temp\EEF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:544 -
C:\Users\Admin\AppData\Local\Temp\F2D.tmp"C:\Users\Admin\AppData\Local\Temp\F2D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:592 -
C:\Users\Admin\AppData\Local\Temp\F5C.tmp"C:\Users\Admin\AppData\Local\Temp\F5C.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644
-
-
-
C:\Users\Admin\AppData\Local\Temp\EB0.tmp"C:\Users\Admin\AppData\Local\Temp\EB0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824
-
C:\Users\Admin\AppData\Local\Temp\FD9.tmp"C:\Users\Admin\AppData\Local\Temp\FD9.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\1084.tmp"C:\Users\Admin\AppData\Local\Temp\1084.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\10C3.tmp"C:\Users\Admin\AppData\Local\Temp\10C3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\1140.tmp"C:\Users\Admin\AppData\Local\Temp\1140.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\116E.tmp"C:\Users\Admin\AppData\Local\Temp\116E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\11AD.tmp"C:\Users\Admin\AppData\Local\Temp\11AD.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\1101.tmp"C:\Users\Admin\AppData\Local\Temp\1101.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828
-
C:\Users\Admin\AppData\Local\Temp\11EB.tmp"C:\Users\Admin\AppData\Local\Temp\11EB.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\122A.tmp"C:\Users\Admin\AppData\Local\Temp\122A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\1268.tmp"C:\Users\Admin\AppData\Local\Temp\1268.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:572
-
-
-
C:\Users\Admin\AppData\Local\Temp\12A6.tmp"C:\Users\Admin\AppData\Local\Temp\12A6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\12E5.tmp"C:\Users\Admin\AppData\Local\Temp\12E5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\1323.tmp"C:\Users\Admin\AppData\Local\Temp\1323.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\1362.tmp"C:\Users\Admin\AppData\Local\Temp\1362.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\13DE.tmp"C:\Users\Admin\AppData\Local\Temp\13DE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"3⤵
- Executes dropped EXE
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\13A0.tmp"C:\Users\Admin\AppData\Local\Temp\13A0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640
-
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"1⤵
- Loads dropped DLL
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\1516.tmp"C:\Users\Admin\AppData\Local\Temp\1516.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
C:\Users\Admin\AppData\Local\Temp\1046.tmp"C:\Users\Admin\AppData\Local\Temp\1046.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:412
-
C:\Users\Admin\AppData\Local\Temp\167D.tmp"C:\Users\Admin\AppData\Local\Temp\167D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\16BC.tmp"C:\Users\Admin\AppData\Local\Temp\16BC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\16FA.tmp"C:\Users\Admin\AppData\Local\Temp\16FA.tmp"3⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\1738.tmp"C:\Users\Admin\AppData\Local\Temp\1738.tmp"4⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\1777.tmp"C:\Users\Admin\AppData\Local\Temp\1777.tmp"5⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\17B5.tmp"C:\Users\Admin\AppData\Local\Temp\17B5.tmp"6⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\17F4.tmp"C:\Users\Admin\AppData\Local\Temp\17F4.tmp"7⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\1832.tmp"C:\Users\Admin\AppData\Local\Temp\1832.tmp"8⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\1880.tmp"C:\Users\Admin\AppData\Local\Temp\1880.tmp"9⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\18BE.tmp"C:\Users\Admin\AppData\Local\Temp\18BE.tmp"10⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\190C.tmp"C:\Users\Admin\AppData\Local\Temp\190C.tmp"11⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\195A.tmp"C:\Users\Admin\AppData\Local\Temp\195A.tmp"12⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\1999.tmp"C:\Users\Admin\AppData\Local\Temp\1999.tmp"13⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"14⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\1A35.tmp"C:\Users\Admin\AppData\Local\Temp\1A35.tmp"15⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\1A64.tmp"C:\Users\Admin\AppData\Local\Temp\1A64.tmp"16⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\1AC1.tmp"C:\Users\Admin\AppData\Local\Temp\1AC1.tmp"17⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\1B00.tmp"C:\Users\Admin\AppData\Local\Temp\1B00.tmp"18⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"19⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"20⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"21⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\1C28.tmp"C:\Users\Admin\AppData\Local\Temp\1C28.tmp"22⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"23⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\1C95.tmp"C:\Users\Admin\AppData\Local\Temp\1C95.tmp"24⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"25⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\1D12.tmp"C:\Users\Admin\AppData\Local\Temp\1D12.tmp"26⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\1D50.tmp"C:\Users\Admin\AppData\Local\Temp\1D50.tmp"27⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"28⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"29⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"30⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\1E69.tmp"C:\Users\Admin\AppData\Local\Temp\1E69.tmp"31⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"32⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"33⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\1F34.tmp"C:\Users\Admin\AppData\Local\Temp\1F34.tmp"34⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"35⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"36⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"37⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"38⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\206C.tmp"C:\Users\Admin\AppData\Local\Temp\206C.tmp"39⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\20AA.tmp"C:\Users\Admin\AppData\Local\Temp\20AA.tmp"40⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\20E9.tmp"C:\Users\Admin\AppData\Local\Temp\20E9.tmp"41⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\2127.tmp"C:\Users\Admin\AppData\Local\Temp\2127.tmp"42⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2166.tmp"C:\Users\Admin\AppData\Local\Temp\2166.tmp"43⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\21A4.tmp"C:\Users\Admin\AppData\Local\Temp\21A4.tmp"44⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\21E2.tmp"C:\Users\Admin\AppData\Local\Temp\21E2.tmp"45⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2221.tmp"C:\Users\Admin\AppData\Local\Temp\2221.tmp"46⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\225F.tmp"C:\Users\Admin\AppData\Local\Temp\225F.tmp"47⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\229E.tmp"C:\Users\Admin\AppData\Local\Temp\229E.tmp"48⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\22DC.tmp"C:\Users\Admin\AppData\Local\Temp\22DC.tmp"49⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\231A.tmp"C:\Users\Admin\AppData\Local\Temp\231A.tmp"50⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\2359.tmp"C:\Users\Admin\AppData\Local\Temp\2359.tmp"51⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\2397.tmp"C:\Users\Admin\AppData\Local\Temp\2397.tmp"52⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\23D6.tmp"C:\Users\Admin\AppData\Local\Temp\23D6.tmp"53⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2414.tmp"C:\Users\Admin\AppData\Local\Temp\2414.tmp"54⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2452.tmp"C:\Users\Admin\AppData\Local\Temp\2452.tmp"55⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\2491.tmp"C:\Users\Admin\AppData\Local\Temp\2491.tmp"56⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\24CF.tmp"C:\Users\Admin\AppData\Local\Temp\24CF.tmp"57⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\250E.tmp"C:\Users\Admin\AppData\Local\Temp\250E.tmp"58⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"59⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"60⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp"61⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2607.tmp"C:\Users\Admin\AppData\Local\Temp\2607.tmp"62⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2646.tmp"C:\Users\Admin\AppData\Local\Temp\2646.tmp"63⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2684.tmp"C:\Users\Admin\AppData\Local\Temp\2684.tmp"64⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\26C2.tmp"C:\Users\Admin\AppData\Local\Temp\26C2.tmp"65⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2701.tmp"C:\Users\Admin\AppData\Local\Temp\2701.tmp"66⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\273F.tmp"C:\Users\Admin\AppData\Local\Temp\273F.tmp"67⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\277E.tmp"C:\Users\Admin\AppData\Local\Temp\277E.tmp"68⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\27BC.tmp"C:\Users\Admin\AppData\Local\Temp\27BC.tmp"69⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\27FA.tmp"C:\Users\Admin\AppData\Local\Temp\27FA.tmp"70⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp"71⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"72⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\28C5.tmp"C:\Users\Admin\AppData\Local\Temp\28C5.tmp"73⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2904.tmp"C:\Users\Admin\AppData\Local\Temp\2904.tmp"74⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2952.tmp"C:\Users\Admin\AppData\Local\Temp\2952.tmp"75⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2990.tmp"C:\Users\Admin\AppData\Local\Temp\2990.tmp"76⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\29CE.tmp"C:\Users\Admin\AppData\Local\Temp\29CE.tmp"77⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"78⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\2A5B.tmp"C:\Users\Admin\AppData\Local\Temp\2A5B.tmp"79⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2A99.tmp"C:\Users\Admin\AppData\Local\Temp\2A99.tmp"80⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2AD8.tmp"C:\Users\Admin\AppData\Local\Temp\2AD8.tmp"81⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2B16.tmp"C:\Users\Admin\AppData\Local\Temp\2B16.tmp"82⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2B54.tmp"C:\Users\Admin\AppData\Local\Temp\2B54.tmp"83⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2B93.tmp"C:\Users\Admin\AppData\Local\Temp\2B93.tmp"84⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"85⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\2C10.tmp"C:\Users\Admin\AppData\Local\Temp\2C10.tmp"86⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"87⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"88⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"89⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"90⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"91⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"92⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"93⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2E03.tmp"C:\Users\Admin\AppData\Local\Temp\2E03.tmp"94⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2E41.tmp"C:\Users\Admin\AppData\Local\Temp\2E41.tmp"95⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2E80.tmp"C:\Users\Admin\AppData\Local\Temp\2E80.tmp"96⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2EBE.tmp"C:\Users\Admin\AppData\Local\Temp\2EBE.tmp"97⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"98⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"99⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2F89.tmp"C:\Users\Admin\AppData\Local\Temp\2F89.tmp"100⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"101⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3006.tmp"C:\Users\Admin\AppData\Local\Temp\3006.tmp"102⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3044.tmp"C:\Users\Admin\AppData\Local\Temp\3044.tmp"103⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\3082.tmp"C:\Users\Admin\AppData\Local\Temp\3082.tmp"104⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\30C1.tmp"C:\Users\Admin\AppData\Local\Temp\30C1.tmp"105⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"106⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\313E.tmp"C:\Users\Admin\AppData\Local\Temp\313E.tmp"107⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\317C.tmp"C:\Users\Admin\AppData\Local\Temp\317C.tmp"108⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\31BA.tmp"C:\Users\Admin\AppData\Local\Temp\31BA.tmp"109⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\31F9.tmp"C:\Users\Admin\AppData\Local\Temp\31F9.tmp"110⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3237.tmp"C:\Users\Admin\AppData\Local\Temp\3237.tmp"111⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\3276.tmp"C:\Users\Admin\AppData\Local\Temp\3276.tmp"112⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\32B4.tmp"C:\Users\Admin\AppData\Local\Temp\32B4.tmp"113⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"114⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\3331.tmp"C:\Users\Admin\AppData\Local\Temp\3331.tmp"115⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"116⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"117⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"118⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"119⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"120⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"121⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"122⤵PID:2160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-