Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 00:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe
-
Size
488KB
-
MD5
c6d7e769d33899ca33b3fa360d0b590f
-
SHA1
b7cd8e0d0ec870c7253473325a381e44b8e9183d
-
SHA256
124fa2256129c66522cb7e4d1b89da88a09392a96edc82c07279a14d2d65ec6f
-
SHA512
4257b216ec4ca2eb6a5c1169fbed7e789c6ac66b997d0de0c301f0d29a992732d09741c39af799cce7664ee9911e5b113a7381634b292f29f512ac7504bb794d
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7detZv9Y9QhpmrRhWkNfOJieiQRp9VLCtSx89:/U5rCOTeiDC+upmr+kgniqpzxLFM9NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2404 1DFC.tmp 2256 1E4A.tmp 2972 1E98.tmp 2228 1ED6.tmp 2784 1F15.tmp 2672 1F63.tmp 2820 1FB1.tmp 2840 1FEF.tmp 756 203D.tmp 2776 2FF6.tmp 2580 20D9.tmp 2292 2127.tmp 1740 2185.tmp 2916 21D3.tmp 1984 31BA.tmp 2112 225F.tmp 2876 229E.tmp 1512 22EC.tmp 2892 2349.tmp 1576 2397.tmp 2268 23F5.tmp 1776 2433.tmp 1436 2491.tmp 864 24CF.tmp 1928 250E.tmp 1236 254C.tmp 1916 258A.tmp 2188 25D8.tmp 2532 2617.tmp 1704 2655.tmp 336 2694.tmp 996 26D2.tmp 1096 2710.tmp 2996 275E.tmp 2400 279D.tmp 652 27DB.tmp 412 281A.tmp 2500 2858.tmp 1152 2887.tmp 1528 28C5.tmp 1788 2904.tmp 1372 2942.tmp 1856 2980.tmp 3024 29BF.tmp 1264 29FD.tmp 880 2A2C.tmp 240 2A6A.tmp 2524 2AA9.tmp 1552 2AE7.tmp 2772 2B26.tmp 816 2B64.tmp 2196 2BA2.tmp 888 2BE1.tmp 1752 2C1F.tmp 1584 2C5E.tmp 384 2C9C.tmp 1268 2CDA.tmp 2408 2D19.tmp 2364 2D57.tmp 2252 2D96.tmp 2360 2DD4.tmp 3000 2E12.tmp 2788 2E51.tmp 1988 2E8F.tmp -
Loads dropped DLL 64 IoCs
pid Process 1268 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 2404 1DFC.tmp 2256 1E4A.tmp 2972 1E98.tmp 2228 1ED6.tmp 2784 1F15.tmp 2672 1F63.tmp 2820 1FB1.tmp 2840 1FEF.tmp 756 203D.tmp 2776 2FF6.tmp 2580 20D9.tmp 2292 2127.tmp 1740 2185.tmp 2916 21D3.tmp 1984 31BA.tmp 2112 225F.tmp 2876 229E.tmp 1512 22EC.tmp 2892 2349.tmp 1576 2397.tmp 2268 23F5.tmp 1776 2433.tmp 1436 2491.tmp 864 24CF.tmp 1928 250E.tmp 1236 254C.tmp 1916 258A.tmp 2188 25D8.tmp 2532 2617.tmp 1704 2655.tmp 336 2694.tmp 996 26D2.tmp 1096 2710.tmp 2996 275E.tmp 2400 279D.tmp 652 27DB.tmp 412 281A.tmp 2500 2858.tmp 1152 2887.tmp 1528 28C5.tmp 1788 2904.tmp 1372 2942.tmp 1856 2980.tmp 3024 29BF.tmp 1264 29FD.tmp 880 2A2C.tmp 240 2A6A.tmp 2524 2AA9.tmp 1552 2AE7.tmp 2772 2B26.tmp 816 2B64.tmp 2196 2BA2.tmp 888 2BE1.tmp 1752 2C1F.tmp 1584 2C5E.tmp 384 2C9C.tmp 1268 2CDA.tmp 2408 2D19.tmp 2364 2D57.tmp 2252 2D96.tmp 2360 2DD4.tmp 3000 2E12.tmp 2788 2E51.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2404 1268 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 28 PID 1268 wrote to memory of 2404 1268 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 28 PID 1268 wrote to memory of 2404 1268 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 28 PID 1268 wrote to memory of 2404 1268 2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe 28 PID 2404 wrote to memory of 2256 2404 1DFC.tmp 29 PID 2404 wrote to memory of 2256 2404 1DFC.tmp 29 PID 2404 wrote to memory of 2256 2404 1DFC.tmp 29 PID 2404 wrote to memory of 2256 2404 1DFC.tmp 29 PID 2256 wrote to memory of 2972 2256 1E4A.tmp 30 PID 2256 wrote to memory of 2972 2256 1E4A.tmp 30 PID 2256 wrote to memory of 2972 2256 1E4A.tmp 30 PID 2256 wrote to memory of 2972 2256 1E4A.tmp 30 PID 2972 wrote to memory of 2228 2972 1E98.tmp 102 PID 2972 wrote to memory of 2228 2972 1E98.tmp 102 PID 2972 wrote to memory of 2228 2972 1E98.tmp 102 PID 2972 wrote to memory of 2228 2972 1E98.tmp 102 PID 2228 wrote to memory of 2784 2228 1ED6.tmp 31 PID 2228 wrote to memory of 2784 2228 1ED6.tmp 31 PID 2228 wrote to memory of 2784 2228 1ED6.tmp 31 PID 2228 wrote to memory of 2784 2228 1ED6.tmp 31 PID 2784 wrote to memory of 2672 2784 1F15.tmp 101 PID 2784 wrote to memory of 2672 2784 1F15.tmp 101 PID 2784 wrote to memory of 2672 2784 1F15.tmp 101 PID 2784 wrote to memory of 2672 2784 1F15.tmp 101 PID 2672 wrote to memory of 2820 2672 1F63.tmp 100 PID 2672 wrote to memory of 2820 2672 1F63.tmp 100 PID 2672 wrote to memory of 2820 2672 1F63.tmp 100 PID 2672 wrote to memory of 2820 2672 1F63.tmp 100 PID 2820 wrote to memory of 2840 2820 1FB1.tmp 99 PID 2820 wrote to memory of 2840 2820 1FB1.tmp 99 PID 2820 wrote to memory of 2840 2820 1FB1.tmp 99 PID 2820 wrote to memory of 2840 2820 1FB1.tmp 99 PID 2840 wrote to memory of 756 2840 1FEF.tmp 98 PID 2840 wrote to memory of 756 2840 1FEF.tmp 98 PID 2840 wrote to memory of 756 2840 1FEF.tmp 98 PID 2840 wrote to memory of 756 2840 1FEF.tmp 98 PID 756 wrote to memory of 2776 756 203D.tmp 64 PID 756 wrote to memory of 2776 756 203D.tmp 64 PID 756 wrote to memory of 2776 756 203D.tmp 64 PID 756 wrote to memory of 2776 756 203D.tmp 64 PID 2776 wrote to memory of 2580 2776 2FF6.tmp 97 PID 2776 wrote to memory of 2580 2776 2FF6.tmp 97 PID 2776 wrote to memory of 2580 2776 2FF6.tmp 97 PID 2776 wrote to memory of 2580 2776 2FF6.tmp 97 PID 2580 wrote to memory of 2292 2580 20D9.tmp 96 PID 2580 wrote to memory of 2292 2580 20D9.tmp 96 PID 2580 wrote to memory of 2292 2580 20D9.tmp 96 PID 2580 wrote to memory of 2292 2580 20D9.tmp 96 PID 2292 wrote to memory of 1740 2292 2127.tmp 95 PID 2292 wrote to memory of 1740 2292 2127.tmp 95 PID 2292 wrote to memory of 1740 2292 2127.tmp 95 PID 2292 wrote to memory of 1740 2292 2127.tmp 95 PID 1740 wrote to memory of 2916 1740 2185.tmp 94 PID 1740 wrote to memory of 2916 1740 2185.tmp 94 PID 1740 wrote to memory of 2916 1740 2185.tmp 94 PID 1740 wrote to memory of 2916 1740 2185.tmp 94 PID 2916 wrote to memory of 1984 2916 21D3.tmp 104 PID 2916 wrote to memory of 1984 2916 21D3.tmp 104 PID 2916 wrote to memory of 1984 2916 21D3.tmp 104 PID 2916 wrote to memory of 1984 2916 21D3.tmp 104 PID 1984 wrote to memory of 2112 1984 31BA.tmp 92 PID 1984 wrote to memory of 2112 1984 31BA.tmp 92 PID 1984 wrote to memory of 2112 1984 31BA.tmp 92 PID 1984 wrote to memory of 2112 1984 31BA.tmp 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_c6d7e769d33899ca33b3fa360d0b590f_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\1E98.tmp"C:\Users\Admin\AppData\Local\Temp\1E98.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E215.tmp"C:\Users\Admin\AppData\Local\Temp\E215.tmp"3⤵PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\1F15.tmp"C:\Users\Admin\AppData\Local\Temp\1F15.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\1F63.tmp"C:\Users\Admin\AppData\Local\Temp\1F63.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\208B.tmp"C:\Users\Admin\AppData\Local\Temp\208B.tmp"1⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"2⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"3⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"4⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"5⤵PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\2127.tmp"C:\Users\Admin\AppData\Local\Temp\2127.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2491.tmp"C:\Users\Admin\AppData\Local\Temp\2491.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\24CF.tmp"C:\Users\Admin\AppData\Local\Temp\24CF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864 -
C:\Users\Admin\AppData\Local\Temp\250E.tmp"C:\Users\Admin\AppData\Local\Temp\250E.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996 -
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\275E.tmp"C:\Users\Admin\AppData\Local\Temp\275E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\279D.tmp"C:\Users\Admin\AppData\Local\Temp\279D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\27DB.tmp"C:\Users\Admin\AppData\Local\Temp\27DB.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:652 -
C:\Users\Admin\AppData\Local\Temp\281A.tmp"C:\Users\Admin\AppData\Local\Temp\281A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:412 -
C:\Users\Admin\AppData\Local\Temp\2858.tmp"C:\Users\Admin\AppData\Local\Temp\2858.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\28C5.tmp"C:\Users\Admin\AppData\Local\Temp\28C5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\2904.tmp"C:\Users\Admin\AppData\Local\Temp\2904.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:240 -
C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\2B26.tmp"C:\Users\Admin\AppData\Local\Temp\2B26.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\2B64.tmp"C:\Users\Admin\AppData\Local\Temp\2B64.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\2D19.tmp"C:\Users\Admin\AppData\Local\Temp\2D19.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:384
-
C:\Users\Admin\AppData\Local\Temp\2D57.tmp"C:\Users\Admin\AppData\Local\Temp\2D57.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\2D96.tmp"C:\Users\Admin\AppData\Local\Temp\2D96.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\2E12.tmp"C:\Users\Admin\AppData\Local\Temp\2E12.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\2E51.tmp"C:\Users\Admin\AppData\Local\Temp\2E51.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\E32E.tmp"C:\Users\Admin\AppData\Local\Temp\E32E.tmp"3⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\E35D.tmp"C:\Users\Admin\AppData\Local\Temp\E35D.tmp"4⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\E39B.tmp"C:\Users\Admin\AppData\Local\Temp\E39B.tmp"5⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\E3DA.tmp"C:\Users\Admin\AppData\Local\Temp\E3DA.tmp"6⤵PID:2652
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"1⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"2⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"1⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"2⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"1⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\20D9.tmp"C:\Users\Admin\AppData\Local\Temp\20D9.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"1⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\312E.tmp"C:\Users\Admin\AppData\Local\Temp\312E.tmp"1⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\316C.tmp"C:\Users\Admin\AppData\Local\Temp\316C.tmp"2⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\31BA.tmp"C:\Users\Admin\AppData\Local\Temp\31BA.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"4⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"5⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\3295.tmp"C:\Users\Admin\AppData\Local\Temp\3295.tmp"6⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"7⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\3331.tmp"C:\Users\Admin\AppData\Local\Temp\3331.tmp"8⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"9⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"10⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"11⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"12⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"13⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\34F5.tmp"C:\Users\Admin\AppData\Local\Temp\34F5.tmp"14⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\3543.tmp"C:\Users\Admin\AppData\Local\Temp\3543.tmp"15⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"16⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"17⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"18⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\366C.tmp"C:\Users\Admin\AppData\Local\Temp\366C.tmp"19⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"20⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"21⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"22⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"23⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"24⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"25⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"26⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"27⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"28⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\38FB.tmp"C:\Users\Admin\AppData\Local\Temp\38FB.tmp"29⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"30⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"31⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\39B6.tmp"C:\Users\Admin\AppData\Local\Temp\39B6.tmp"32⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\39F4.tmp"C:\Users\Admin\AppData\Local\Temp\39F4.tmp"33⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\3A33.tmp"C:\Users\Admin\AppData\Local\Temp\3A33.tmp"34⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3A71.tmp"C:\Users\Admin\AppData\Local\Temp\3A71.tmp"35⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"36⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\3AFE.tmp"C:\Users\Admin\AppData\Local\Temp\3AFE.tmp"37⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\3B3C.tmp"C:\Users\Admin\AppData\Local\Temp\3B3C.tmp"38⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"39⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"40⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"41⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3C36.tmp"C:\Users\Admin\AppData\Local\Temp\3C36.tmp"42⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\3C74.tmp"C:\Users\Admin\AppData\Local\Temp\3C74.tmp"43⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3CB2.tmp"C:\Users\Admin\AppData\Local\Temp\3CB2.tmp"44⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"45⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"46⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"47⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3DAC.tmp"C:\Users\Admin\AppData\Local\Temp\3DAC.tmp"48⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\3DEA.tmp"C:\Users\Admin\AppData\Local\Temp\3DEA.tmp"49⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\3E38.tmp"C:\Users\Admin\AppData\Local\Temp\3E38.tmp"50⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\3E86.tmp"C:\Users\Admin\AppData\Local\Temp\3E86.tmp"51⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"52⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp"53⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"54⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3F80.tmp"C:\Users\Admin\AppData\Local\Temp\3F80.tmp"55⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"56⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\3FED.tmp"C:\Users\Admin\AppData\Local\Temp\3FED.tmp"57⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\402C.tmp"C:\Users\Admin\AppData\Local\Temp\402C.tmp"58⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\407A.tmp"C:\Users\Admin\AppData\Local\Temp\407A.tmp"59⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\40B8.tmp"C:\Users\Admin\AppData\Local\Temp\40B8.tmp"60⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\40F6.tmp"C:\Users\Admin\AppData\Local\Temp\40F6.tmp"61⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\4135.tmp"C:\Users\Admin\AppData\Local\Temp\4135.tmp"62⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\4183.tmp"C:\Users\Admin\AppData\Local\Temp\4183.tmp"63⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\41C1.tmp"C:\Users\Admin\AppData\Local\Temp\41C1.tmp"64⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\4200.tmp"C:\Users\Admin\AppData\Local\Temp\4200.tmp"65⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\423E.tmp"C:\Users\Admin\AppData\Local\Temp\423E.tmp"66⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\427C.tmp"C:\Users\Admin\AppData\Local\Temp\427C.tmp"67⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\42BB.tmp"C:\Users\Admin\AppData\Local\Temp\42BB.tmp"68⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\42F9.tmp"C:\Users\Admin\AppData\Local\Temp\42F9.tmp"69⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\4338.tmp"C:\Users\Admin\AppData\Local\Temp\4338.tmp"70⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\4376.tmp"C:\Users\Admin\AppData\Local\Temp\4376.tmp"71⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\43B4.tmp"C:\Users\Admin\AppData\Local\Temp\43B4.tmp"72⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\43F3.tmp"C:\Users\Admin\AppData\Local\Temp\43F3.tmp"73⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\4441.tmp"C:\Users\Admin\AppData\Local\Temp\4441.tmp"74⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\447F.tmp"C:\Users\Admin\AppData\Local\Temp\447F.tmp"75⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\44BE.tmp"C:\Users\Admin\AppData\Local\Temp\44BE.tmp"76⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\44FC.tmp"C:\Users\Admin\AppData\Local\Temp\44FC.tmp"77⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\453A.tmp"C:\Users\Admin\AppData\Local\Temp\453A.tmp"78⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\4579.tmp"C:\Users\Admin\AppData\Local\Temp\4579.tmp"79⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\45B7.tmp"C:\Users\Admin\AppData\Local\Temp\45B7.tmp"80⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\45F6.tmp"C:\Users\Admin\AppData\Local\Temp\45F6.tmp"81⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\4634.tmp"C:\Users\Admin\AppData\Local\Temp\4634.tmp"82⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\4682.tmp"C:\Users\Admin\AppData\Local\Temp\4682.tmp"83⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\46C0.tmp"C:\Users\Admin\AppData\Local\Temp\46C0.tmp"84⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\46FF.tmp"C:\Users\Admin\AppData\Local\Temp\46FF.tmp"85⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\473D.tmp"C:\Users\Admin\AppData\Local\Temp\473D.tmp"86⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\477C.tmp"C:\Users\Admin\AppData\Local\Temp\477C.tmp"87⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\47BA.tmp"C:\Users\Admin\AppData\Local\Temp\47BA.tmp"88⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\47F8.tmp"C:\Users\Admin\AppData\Local\Temp\47F8.tmp"89⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\4837.tmp"C:\Users\Admin\AppData\Local\Temp\4837.tmp"90⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\4875.tmp"C:\Users\Admin\AppData\Local\Temp\4875.tmp"91⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\48B4.tmp"C:\Users\Admin\AppData\Local\Temp\48B4.tmp"92⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\48F2.tmp"C:\Users\Admin\AppData\Local\Temp\48F2.tmp"93⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\4930.tmp"C:\Users\Admin\AppData\Local\Temp\4930.tmp"94⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"95⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\49AD.tmp"C:\Users\Admin\AppData\Local\Temp\49AD.tmp"96⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\49EC.tmp"C:\Users\Admin\AppData\Local\Temp\49EC.tmp"97⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"98⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\4A68.tmp"C:\Users\Admin\AppData\Local\Temp\4A68.tmp"99⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"100⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\4AE5.tmp"C:\Users\Admin\AppData\Local\Temp\4AE5.tmp"101⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"102⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\4B62.tmp"C:\Users\Admin\AppData\Local\Temp\4B62.tmp"103⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\4BB0.tmp"C:\Users\Admin\AppData\Local\Temp\4BB0.tmp"104⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\4BEE.tmp"C:\Users\Admin\AppData\Local\Temp\4BEE.tmp"105⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\4C2D.tmp"C:\Users\Admin\AppData\Local\Temp\4C2D.tmp"106⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\4C6B.tmp"C:\Users\Admin\AppData\Local\Temp\4C6B.tmp"107⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\4CAA.tmp"C:\Users\Admin\AppData\Local\Temp\4CAA.tmp"108⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\4CE8.tmp"C:\Users\Admin\AppData\Local\Temp\4CE8.tmp"109⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\4D26.tmp"C:\Users\Admin\AppData\Local\Temp\4D26.tmp"110⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\4D65.tmp"C:\Users\Admin\AppData\Local\Temp\4D65.tmp"111⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\4DA3.tmp"C:\Users\Admin\AppData\Local\Temp\4DA3.tmp"112⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\4DE2.tmp"C:\Users\Admin\AppData\Local\Temp\4DE2.tmp"113⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\4E20.tmp"C:\Users\Admin\AppData\Local\Temp\4E20.tmp"114⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\4E5E.tmp"C:\Users\Admin\AppData\Local\Temp\4E5E.tmp"115⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"116⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"117⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"118⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\4F58.tmp"C:\Users\Admin\AppData\Local\Temp\4F58.tmp"119⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\4F96.tmp"C:\Users\Admin\AppData\Local\Temp\4F96.tmp"120⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"C:\Users\Admin\AppData\Local\Temp\4FD5.tmp"121⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp"122⤵PID:2696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-