Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 00:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe
-
Size
486KB
-
MD5
d7e39b4c0bea6c2dd7eb1fc3db3eb528
-
SHA1
a73e93441b64a796ec28a95d7e161c86861a130f
-
SHA256
c8f3add6357f9387623d09c9249c4341522d5dcbb33e80661a104bd1053ca04d
-
SHA512
bce9f049c53590056fee4c8d9e5a0bedcd6ccee06ea42e845244b03c3d8a6bbeb8b886f555378590b21fb602734eaadf135edc854fa1355580a5d05f2c0a5a51
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7odl7S3cv1W+tmZwHZunLC4gBzFXWclXPP4Yq:/U5rCOTeiDodlGWlkG+m15rfNm5LNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2108 12D5.tmp 2616 1333.tmp 1204 228E.tmp 2760 13BF.tmp 2660 140D.tmp 2560 144C.tmp 2548 149A.tmp 2696 14F7.tmp 2536 1545.tmp 2420 1593.tmp 2320 15D2.tmp 1216 1620.tmp 2512 165E.tmp 2824 169C.tmp 112 16DB.tmp 828 1748.tmp 2140 1786.tmp 1028 17C5.tmp 1512 1803.tmp 1620 1842.tmp 2004 1890.tmp 1996 18DE.tmp 2372 191C.tmp 2348 197A.tmp 1908 19C8.tmp 2208 1A06.tmp 1552 1A44.tmp 2196 1A83.tmp 336 1AD1.tmp 864 1B0F.tmp 580 1B4E.tmp 1400 1B9C.tmp 1672 1BDA.tmp 1780 1C18.tmp 1048 1C57.tmp 492 1C95.tmp 2068 1CD4.tmp 412 1D12.tmp 2464 1D50.tmp 872 1D8F.tmp 1724 1DCD.tmp 1684 1E0C.tmp 1788 1E4A.tmp 1608 1E88.tmp 1500 1EC7.tmp 2400 1F05.tmp 3056 1F34.tmp 2948 1F72.tmp 1616 1FB1.tmp 2472 1FEF.tmp 3004 202E.tmp 2936 206C.tmp 1228 20AA.tmp 1932 20E9.tmp 1924 2127.tmp 2148 2194.tmp 2108 21D3.tmp 2728 2211.tmp 2308 2250.tmp 1204 228E.tmp 2072 22CC.tmp 2784 230B.tmp 2908 2349.tmp 2560 144C.tmp -
Loads dropped DLL 64 IoCs
pid Process 2148 2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe 2108 12D5.tmp 2616 1333.tmp 1204 228E.tmp 2760 13BF.tmp 2660 140D.tmp 2560 144C.tmp 2548 149A.tmp 2696 14F7.tmp 2536 1545.tmp 2420 1593.tmp 2320 15D2.tmp 1216 1620.tmp 2512 165E.tmp 2824 169C.tmp 112 16DB.tmp 828 1748.tmp 2140 1786.tmp 1028 17C5.tmp 1512 1803.tmp 1620 1842.tmp 2004 1890.tmp 1996 18DE.tmp 2372 191C.tmp 2348 197A.tmp 1908 19C8.tmp 2208 1A06.tmp 1552 1A44.tmp 2196 1A83.tmp 336 1AD1.tmp 864 1B0F.tmp 580 1B4E.tmp 1400 1B9C.tmp 1672 1BDA.tmp 1780 1C18.tmp 1048 1C57.tmp 492 1C95.tmp 2068 1CD4.tmp 412 1D12.tmp 2464 1D50.tmp 872 1D8F.tmp 1724 1DCD.tmp 1684 1E0C.tmp 1788 1E4A.tmp 1608 1E88.tmp 1500 1EC7.tmp 2400 1F05.tmp 3056 1F34.tmp 2948 1F72.tmp 1616 1FB1.tmp 2472 1FEF.tmp 3004 202E.tmp 2936 206C.tmp 1228 20AA.tmp 1932 20E9.tmp 1520 2166.tmp 2148 2194.tmp 2108 21D3.tmp 2728 2211.tmp 2308 2250.tmp 1204 228E.tmp 2072 22CC.tmp 2784 230B.tmp 2908 2349.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2108 2148 2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe 28 PID 2148 wrote to memory of 2108 2148 2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe 28 PID 2148 wrote to memory of 2108 2148 2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe 28 PID 2148 wrote to memory of 2108 2148 2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe 28 PID 2108 wrote to memory of 2616 2108 12D5.tmp 29 PID 2108 wrote to memory of 2616 2108 12D5.tmp 29 PID 2108 wrote to memory of 2616 2108 12D5.tmp 29 PID 2108 wrote to memory of 2616 2108 12D5.tmp 29 PID 2616 wrote to memory of 1204 2616 1333.tmp 56 PID 2616 wrote to memory of 1204 2616 1333.tmp 56 PID 2616 wrote to memory of 1204 2616 1333.tmp 56 PID 2616 wrote to memory of 1204 2616 1333.tmp 56 PID 1204 wrote to memory of 2760 1204 228E.tmp 31 PID 1204 wrote to memory of 2760 1204 228E.tmp 31 PID 1204 wrote to memory of 2760 1204 228E.tmp 31 PID 1204 wrote to memory of 2760 1204 228E.tmp 31 PID 2760 wrote to memory of 2660 2760 13BF.tmp 32 PID 2760 wrote to memory of 2660 2760 13BF.tmp 32 PID 2760 wrote to memory of 2660 2760 13BF.tmp 32 PID 2760 wrote to memory of 2660 2760 13BF.tmp 32 PID 2660 wrote to memory of 2560 2660 140D.tmp 132 PID 2660 wrote to memory of 2560 2660 140D.tmp 132 PID 2660 wrote to memory of 2560 2660 140D.tmp 132 PID 2660 wrote to memory of 2560 2660 140D.tmp 132 PID 2560 wrote to memory of 2548 2560 144C.tmp 33 PID 2560 wrote to memory of 2548 2560 144C.tmp 33 PID 2560 wrote to memory of 2548 2560 144C.tmp 33 PID 2560 wrote to memory of 2548 2560 144C.tmp 33 PID 2548 wrote to memory of 2696 2548 149A.tmp 131 PID 2548 wrote to memory of 2696 2548 149A.tmp 131 PID 2548 wrote to memory of 2696 2548 149A.tmp 131 PID 2548 wrote to memory of 2696 2548 149A.tmp 131 PID 2696 wrote to memory of 2536 2696 14F7.tmp 130 PID 2696 wrote to memory of 2536 2696 14F7.tmp 130 PID 2696 wrote to memory of 2536 2696 14F7.tmp 130 PID 2696 wrote to memory of 2536 2696 14F7.tmp 130 PID 2536 wrote to memory of 2420 2536 1545.tmp 129 PID 2536 wrote to memory of 2420 2536 1545.tmp 129 PID 2536 wrote to memory of 2420 2536 1545.tmp 129 PID 2536 wrote to memory of 2420 2536 1545.tmp 129 PID 2420 wrote to memory of 2320 2420 1593.tmp 34 PID 2420 wrote to memory of 2320 2420 1593.tmp 34 PID 2420 wrote to memory of 2320 2420 1593.tmp 34 PID 2420 wrote to memory of 2320 2420 1593.tmp 34 PID 2320 wrote to memory of 1216 2320 15D2.tmp 128 PID 2320 wrote to memory of 1216 2320 15D2.tmp 128 PID 2320 wrote to memory of 1216 2320 15D2.tmp 128 PID 2320 wrote to memory of 1216 2320 15D2.tmp 128 PID 1216 wrote to memory of 2512 1216 1620.tmp 127 PID 1216 wrote to memory of 2512 1216 1620.tmp 127 PID 1216 wrote to memory of 2512 1216 1620.tmp 127 PID 1216 wrote to memory of 2512 1216 1620.tmp 127 PID 2512 wrote to memory of 2824 2512 165E.tmp 126 PID 2512 wrote to memory of 2824 2512 165E.tmp 126 PID 2512 wrote to memory of 2824 2512 165E.tmp 126 PID 2512 wrote to memory of 2824 2512 165E.tmp 126 PID 2824 wrote to memory of 112 2824 169C.tmp 125 PID 2824 wrote to memory of 112 2824 169C.tmp 125 PID 2824 wrote to memory of 112 2824 169C.tmp 125 PID 2824 wrote to memory of 112 2824 169C.tmp 125 PID 112 wrote to memory of 828 112 16DB.tmp 124 PID 112 wrote to memory of 828 112 16DB.tmp 124 PID 112 wrote to memory of 828 112 16DB.tmp 124 PID 112 wrote to memory of 828 112 16DB.tmp 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_d7e39b4c0bea6c2dd7eb1fc3db3eb528_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\12D5.tmp"C:\Users\Admin\AppData\Local\Temp\12D5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\1333.tmp"C:\Users\Admin\AppData\Local\Temp\1333.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\1371.tmp"C:\Users\Admin\AppData\Local\Temp\1371.tmp"4⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\13BF.tmp"C:\Users\Admin\AppData\Local\Temp\13BF.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\2211.tmp"C:\Users\Admin\AppData\Local\Temp\2211.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\14F7.tmp"C:\Users\Admin\AppData\Local\Temp\14F7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\15D2.tmp"C:\Users\Admin\AppData\Local\Temp\15D2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\1620.tmp"C:\Users\Admin\AppData\Local\Temp\1620.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\191C.tmp"C:\Users\Admin\AppData\Local\Temp\191C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\18DE.tmp"C:\Users\Admin\AppData\Local\Temp\18DE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
C:\Users\Admin\AppData\Local\Temp\1A06.tmp"C:\Users\Admin\AppData\Local\Temp\1A06.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\1A44.tmp"C:\Users\Admin\AppData\Local\Temp\1A44.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\1A83.tmp"C:\Users\Admin\AppData\Local\Temp\1A83.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864 -
C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\1C18.tmp"C:\Users\Admin\AppData\Local\Temp\1C18.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\1C57.tmp"C:\Users\Admin\AppData\Local\Temp\1C57.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\1C95.tmp"C:\Users\Admin\AppData\Local\Temp\1C95.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:492 -
C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\1D12.tmp"C:\Users\Admin\AppData\Local\Temp\1D12.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:412 -
C:\Users\Admin\AppData\Local\Temp\1D50.tmp"C:\Users\Admin\AppData\Local\Temp\1D50.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:872 -
C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\1E88.tmp"C:\Users\Admin\AppData\Local\Temp\1E88.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\1EC7.tmp"C:\Users\Admin\AppData\Local\Temp\1EC7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\1F05.tmp"C:\Users\Admin\AppData\Local\Temp\1F05.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\206C.tmp"C:\Users\Admin\AppData\Local\Temp\206C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\20E9.tmp"C:\Users\Admin\AppData\Local\Temp\20E9.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\2127.tmp"C:\Users\Admin\AppData\Local\Temp\2127.tmp"2⤵
- Executes dropped EXE
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\22CC.tmp"C:\Users\Admin\AppData\Local\Temp\22CC.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\230B.tmp"C:\Users\Admin\AppData\Local\Temp\230B.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\2349.tmp"C:\Users\Admin\AppData\Local\Temp\2349.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"1⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\23C6.tmp"C:\Users\Admin\AppData\Local\Temp\23C6.tmp"2⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\2404.tmp"C:\Users\Admin\AppData\Local\Temp\2404.tmp"3⤵PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\2443.tmp"C:\Users\Admin\AppData\Local\Temp\2443.tmp"1⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"2⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\24C0.tmp"C:\Users\Admin\AppData\Local\Temp\24C0.tmp"3⤵PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\24FE.tmp"C:\Users\Admin\AppData\Local\Temp\24FE.tmp"1⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\253C.tmp"C:\Users\Admin\AppData\Local\Temp\253C.tmp"2⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\257B.tmp"C:\Users\Admin\AppData\Local\Temp\257B.tmp"3⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp"4⤵PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2607.tmp"C:\Users\Admin\AppData\Local\Temp\2607.tmp"1⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\2646.tmp"C:\Users\Admin\AppData\Local\Temp\2646.tmp"2⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2684.tmp"C:\Users\Admin\AppData\Local\Temp\2684.tmp"3⤵PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\26C2.tmp"C:\Users\Admin\AppData\Local\Temp\26C2.tmp"1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\2701.tmp"C:\Users\Admin\AppData\Local\Temp\2701.tmp"2⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\277E.tmp"C:\Users\Admin\AppData\Local\Temp\277E.tmp"1⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\27BC.tmp"C:\Users\Admin\AppData\Local\Temp\27BC.tmp"2⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\2858.tmp"C:\Users\Admin\AppData\Local\Temp\2858.tmp"1⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2896.tmp"C:\Users\Admin\AppData\Local\Temp\2896.tmp"2⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\28D5.tmp"C:\Users\Admin\AppData\Local\Temp\28D5.tmp"3⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\2913.tmp"C:\Users\Admin\AppData\Local\Temp\2913.tmp"4⤵PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"1⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"2⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"3⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"4⤵PID:1624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"1⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"2⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\2B16.tmp"C:\Users\Admin\AppData\Local\Temp\2B16.tmp"1⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2B54.tmp"C:\Users\Admin\AppData\Local\Temp\2B54.tmp"2⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2B93.tmp"C:\Users\Admin\AppData\Local\Temp\2B93.tmp"3⤵PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"1⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2C10.tmp"C:\Users\Admin\AppData\Local\Temp\2C10.tmp"2⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"1⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"2⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"3⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"4⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"5⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"6⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"7⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2E60.tmp"C:\Users\Admin\AppData\Local\Temp\2E60.tmp"8⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"9⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2EED.tmp"C:\Users\Admin\AppData\Local\Temp\2EED.tmp"10⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"11⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2F98.tmp"C:\Users\Admin\AppData\Local\Temp\2F98.tmp"12⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"13⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"14⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"15⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\30D0.tmp"C:\Users\Admin\AppData\Local\Temp\30D0.tmp"16⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\313E.tmp"C:\Users\Admin\AppData\Local\Temp\313E.tmp"17⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\317C.tmp"C:\Users\Admin\AppData\Local\Temp\317C.tmp"18⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"19⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\3266.tmp"C:\Users\Admin\AppData\Local\Temp\3266.tmp"20⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"21⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3331.tmp"C:\Users\Admin\AppData\Local\Temp\3331.tmp"22⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"23⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"24⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"25⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"26⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"27⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"28⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"29⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"30⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"31⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\360E.tmp"C:\Users\Admin\AppData\Local\Temp\360E.tmp"32⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"33⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"34⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"35⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"36⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"37⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"38⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"39⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"40⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"41⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"42⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"43⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\38FB.tmp"C:\Users\Admin\AppData\Local\Temp\38FB.tmp"44⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"45⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"46⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\39B6.tmp"C:\Users\Admin\AppData\Local\Temp\39B6.tmp"47⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\39F4.tmp"C:\Users\Admin\AppData\Local\Temp\39F4.tmp"48⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3A33.tmp"C:\Users\Admin\AppData\Local\Temp\3A33.tmp"49⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\3A71.tmp"C:\Users\Admin\AppData\Local\Temp\3A71.tmp"50⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"51⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3AEE.tmp"C:\Users\Admin\AppData\Local\Temp\3AEE.tmp"52⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"53⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3B6B.tmp"C:\Users\Admin\AppData\Local\Temp\3B6B.tmp"54⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"55⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"56⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"57⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"58⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"59⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"60⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3D20.tmp"C:\Users\Admin\AppData\Local\Temp\3D20.tmp"61⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3D5E.tmp"C:\Users\Admin\AppData\Local\Temp\3D5E.tmp"62⤵PID:496
-
C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"63⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"64⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\3E19.tmp"C:\Users\Admin\AppData\Local\Temp\3E19.tmp"65⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\3E58.tmp"C:\Users\Admin\AppData\Local\Temp\3E58.tmp"66⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"67⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\3EE4.tmp"C:\Users\Admin\AppData\Local\Temp\3EE4.tmp"68⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3F22.tmp"C:\Users\Admin\AppData\Local\Temp\3F22.tmp"69⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3F61.tmp"C:\Users\Admin\AppData\Local\Temp\3F61.tmp"70⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"71⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"72⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\402C.tmp"C:\Users\Admin\AppData\Local\Temp\402C.tmp"73⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\406A.tmp"C:\Users\Admin\AppData\Local\Temp\406A.tmp"74⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\40A8.tmp"C:\Users\Admin\AppData\Local\Temp\40A8.tmp"75⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\40E7.tmp"C:\Users\Admin\AppData\Local\Temp\40E7.tmp"76⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\4125.tmp"C:\Users\Admin\AppData\Local\Temp\4125.tmp"77⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\4164.tmp"C:\Users\Admin\AppData\Local\Temp\4164.tmp"78⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\41A2.tmp"C:\Users\Admin\AppData\Local\Temp\41A2.tmp"79⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\41E0.tmp"C:\Users\Admin\AppData\Local\Temp\41E0.tmp"80⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\421F.tmp"C:\Users\Admin\AppData\Local\Temp\421F.tmp"81⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\425D.tmp"C:\Users\Admin\AppData\Local\Temp\425D.tmp"82⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\429C.tmp"C:\Users\Admin\AppData\Local\Temp\429C.tmp"83⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\42DA.tmp"C:\Users\Admin\AppData\Local\Temp\42DA.tmp"84⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\4318.tmp"C:\Users\Admin\AppData\Local\Temp\4318.tmp"85⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\4357.tmp"C:\Users\Admin\AppData\Local\Temp\4357.tmp"86⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\4395.tmp"C:\Users\Admin\AppData\Local\Temp\4395.tmp"87⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\43D4.tmp"C:\Users\Admin\AppData\Local\Temp\43D4.tmp"88⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\4412.tmp"C:\Users\Admin\AppData\Local\Temp\4412.tmp"89⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\4450.tmp"C:\Users\Admin\AppData\Local\Temp\4450.tmp"90⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\448F.tmp"C:\Users\Admin\AppData\Local\Temp\448F.tmp"91⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\44CD.tmp"C:\Users\Admin\AppData\Local\Temp\44CD.tmp"92⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\450C.tmp"C:\Users\Admin\AppData\Local\Temp\450C.tmp"93⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\454A.tmp"C:\Users\Admin\AppData\Local\Temp\454A.tmp"94⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\4588.tmp"C:\Users\Admin\AppData\Local\Temp\4588.tmp"95⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\45C7.tmp"C:\Users\Admin\AppData\Local\Temp\45C7.tmp"96⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\4605.tmp"C:\Users\Admin\AppData\Local\Temp\4605.tmp"97⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\4644.tmp"C:\Users\Admin\AppData\Local\Temp\4644.tmp"98⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\4682.tmp"C:\Users\Admin\AppData\Local\Temp\4682.tmp"99⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\46C0.tmp"C:\Users\Admin\AppData\Local\Temp\46C0.tmp"100⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\46FF.tmp"C:\Users\Admin\AppData\Local\Temp\46FF.tmp"101⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\473D.tmp"C:\Users\Admin\AppData\Local\Temp\473D.tmp"102⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\477C.tmp"C:\Users\Admin\AppData\Local\Temp\477C.tmp"103⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\47BA.tmp"C:\Users\Admin\AppData\Local\Temp\47BA.tmp"104⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\47F8.tmp"C:\Users\Admin\AppData\Local\Temp\47F8.tmp"105⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\4837.tmp"C:\Users\Admin\AppData\Local\Temp\4837.tmp"106⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\4875.tmp"C:\Users\Admin\AppData\Local\Temp\4875.tmp"107⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\48B4.tmp"C:\Users\Admin\AppData\Local\Temp\48B4.tmp"108⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\48F2.tmp"C:\Users\Admin\AppData\Local\Temp\48F2.tmp"109⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\4930.tmp"C:\Users\Admin\AppData\Local\Temp\4930.tmp"110⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"111⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\49AD.tmp"C:\Users\Admin\AppData\Local\Temp\49AD.tmp"112⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\49EC.tmp"C:\Users\Admin\AppData\Local\Temp\49EC.tmp"113⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"114⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\4A68.tmp"C:\Users\Admin\AppData\Local\Temp\4A68.tmp"115⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"116⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\4AE5.tmp"C:\Users\Admin\AppData\Local\Temp\4AE5.tmp"117⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"118⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\4B62.tmp"C:\Users\Admin\AppData\Local\Temp\4B62.tmp"119⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"120⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"121⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"122⤵PID:764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-