Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 06:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe
-
Size
487KB
-
MD5
9b92424ed4ef1c5f2f5ed146931a22f4
-
SHA1
ce62a11b8ee43f2baec95ba19c35f9106b7a8a3f
-
SHA256
694a7b8c91eb85b10d6439d414d1956f96d6d19510ce1ea426b481cf2d2c3e39
-
SHA512
116adff88eae68f1fab80fc6a997b391e688b25744d25a1f691c65f6d6e7d5c01f6cd79baba3637279423cee0528b25cf652e0524fd4e59ee56789984b9b722e
-
SSDEEP
12288:yU5rCOTeiNRi4uJrc18K/adnQWd86FsEON9w0CjbZ:yUQOJNcJY1R0nnsL9Eb
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1632 116E.tmp 2200 11AD.tmp 1660 11EB.tmp 2664 1239.tmp 2764 1287.tmp 2760 12C6.tmp 3044 1323.tmp 2396 1362.tmp 2600 13B0.tmp 2940 13EE.tmp 2568 145B.tmp 2696 14A9.tmp 2284 14F7.tmp 2632 1545.tmp 2976 15A3.tmp 2948 15E1.tmp 2548 162F.tmp 2836 167D.tmp 1820 16BC.tmp 2908 1719.tmp 2952 1758.tmp 2244 17A6.tmp 1760 17F4.tmp 1584 1842.tmp 1740 1880.tmp 2092 18BE.tmp 2488 190C.tmp 2300 194B.tmp 2052 197A.tmp 1420 19B8.tmp 684 19F6.tmp 796 1A35.tmp 1036 1A73.tmp 652 1AB2.tmp 564 1AF0.tmp 1808 1B2E.tmp 1952 1B6D.tmp 1144 1BAB.tmp 1964 1BEA.tmp 1260 1C28.tmp 836 1C66.tmp 1356 1CE3.tmp 1316 1D60.tmp 1636 1DAE.tmp 1948 1E0C.tmp 912 1E4A.tmp 1152 1E98.tmp 1032 1ED6.tmp 1684 1F24.tmp 1252 1F63.tmp 1528 1FA1.tmp 992 1FE0.tmp 1504 201E.tmp 2356 205C.tmp 1616 209B.tmp 1604 20D9.tmp 2500 2118.tmp 1708 2156.tmp 2208 21A4.tmp 1692 21E2.tmp 2656 2221.tmp 2704 226F.tmp 2400 22AD.tmp 2724 22EC.tmp -
Loads dropped DLL 64 IoCs
pid Process 2536 2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe 1632 116E.tmp 2200 11AD.tmp 1660 11EB.tmp 2664 1239.tmp 2764 1287.tmp 2760 12C6.tmp 3044 1323.tmp 2396 1362.tmp 2600 13B0.tmp 2940 13EE.tmp 2568 145B.tmp 2696 14A9.tmp 2284 14F7.tmp 2632 1545.tmp 2976 15A3.tmp 2948 15E1.tmp 2548 162F.tmp 2836 167D.tmp 1820 16BC.tmp 2908 1719.tmp 2952 1758.tmp 2244 17A6.tmp 1760 17F4.tmp 1584 1842.tmp 1740 1880.tmp 2092 18BE.tmp 2488 190C.tmp 2300 194B.tmp 2052 197A.tmp 1420 19B8.tmp 684 19F6.tmp 796 1A35.tmp 1036 1A73.tmp 652 1AB2.tmp 564 1AF0.tmp 1808 1B2E.tmp 1952 1B6D.tmp 1144 1BAB.tmp 1964 1BEA.tmp 1260 1C28.tmp 836 1C66.tmp 1356 1CE3.tmp 1316 1D60.tmp 1636 1DAE.tmp 1948 1E0C.tmp 912 1E4A.tmp 1152 1E98.tmp 1032 1ED6.tmp 1684 1F24.tmp 1252 1F63.tmp 1528 1FA1.tmp 992 1FE0.tmp 1504 201E.tmp 2356 205C.tmp 1616 209B.tmp 1604 20D9.tmp 2500 2118.tmp 1708 2156.tmp 2208 21A4.tmp 1692 21E2.tmp 2656 2221.tmp 2704 226F.tmp 2400 22AD.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1632 2536 2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe 28 PID 2536 wrote to memory of 1632 2536 2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe 28 PID 2536 wrote to memory of 1632 2536 2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe 28 PID 2536 wrote to memory of 1632 2536 2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe 28 PID 1632 wrote to memory of 2200 1632 116E.tmp 29 PID 1632 wrote to memory of 2200 1632 116E.tmp 29 PID 1632 wrote to memory of 2200 1632 116E.tmp 29 PID 1632 wrote to memory of 2200 1632 116E.tmp 29 PID 2200 wrote to memory of 1660 2200 11AD.tmp 30 PID 2200 wrote to memory of 1660 2200 11AD.tmp 30 PID 2200 wrote to memory of 1660 2200 11AD.tmp 30 PID 2200 wrote to memory of 1660 2200 11AD.tmp 30 PID 1660 wrote to memory of 2664 1660 11EB.tmp 31 PID 1660 wrote to memory of 2664 1660 11EB.tmp 31 PID 1660 wrote to memory of 2664 1660 11EB.tmp 31 PID 1660 wrote to memory of 2664 1660 11EB.tmp 31 PID 2664 wrote to memory of 2764 2664 1239.tmp 32 PID 2664 wrote to memory of 2764 2664 1239.tmp 32 PID 2664 wrote to memory of 2764 2664 1239.tmp 32 PID 2664 wrote to memory of 2764 2664 1239.tmp 32 PID 2764 wrote to memory of 2760 2764 1287.tmp 33 PID 2764 wrote to memory of 2760 2764 1287.tmp 33 PID 2764 wrote to memory of 2760 2764 1287.tmp 33 PID 2764 wrote to memory of 2760 2764 1287.tmp 33 PID 2760 wrote to memory of 3044 2760 12C6.tmp 65 PID 2760 wrote to memory of 3044 2760 12C6.tmp 65 PID 2760 wrote to memory of 3044 2760 12C6.tmp 65 PID 2760 wrote to memory of 3044 2760 12C6.tmp 65 PID 3044 wrote to memory of 2396 3044 1323.tmp 34 PID 3044 wrote to memory of 2396 3044 1323.tmp 34 PID 3044 wrote to memory of 2396 3044 1323.tmp 34 PID 3044 wrote to memory of 2396 3044 1323.tmp 34 PID 2396 wrote to memory of 2600 2396 1362.tmp 36 PID 2396 wrote to memory of 2600 2396 1362.tmp 36 PID 2396 wrote to memory of 2600 2396 1362.tmp 36 PID 2396 wrote to memory of 2600 2396 1362.tmp 36 PID 2600 wrote to memory of 2940 2600 13B0.tmp 35 PID 2600 wrote to memory of 2940 2600 13B0.tmp 35 PID 2600 wrote to memory of 2940 2600 13B0.tmp 35 PID 2600 wrote to memory of 2940 2600 13B0.tmp 35 PID 2940 wrote to memory of 2568 2940 13EE.tmp 37 PID 2940 wrote to memory of 2568 2940 13EE.tmp 37 PID 2940 wrote to memory of 2568 2940 13EE.tmp 37 PID 2940 wrote to memory of 2568 2940 13EE.tmp 37 PID 2568 wrote to memory of 2696 2568 145B.tmp 64 PID 2568 wrote to memory of 2696 2568 145B.tmp 64 PID 2568 wrote to memory of 2696 2568 145B.tmp 64 PID 2568 wrote to memory of 2696 2568 145B.tmp 64 PID 2696 wrote to memory of 2284 2696 14A9.tmp 63 PID 2696 wrote to memory of 2284 2696 14A9.tmp 63 PID 2696 wrote to memory of 2284 2696 14A9.tmp 63 PID 2696 wrote to memory of 2284 2696 14A9.tmp 63 PID 2284 wrote to memory of 2632 2284 14F7.tmp 61 PID 2284 wrote to memory of 2632 2284 14F7.tmp 61 PID 2284 wrote to memory of 2632 2284 14F7.tmp 61 PID 2284 wrote to memory of 2632 2284 14F7.tmp 61 PID 2632 wrote to memory of 2976 2632 1545.tmp 60 PID 2632 wrote to memory of 2976 2632 1545.tmp 60 PID 2632 wrote to memory of 2976 2632 1545.tmp 60 PID 2632 wrote to memory of 2976 2632 1545.tmp 60 PID 2976 wrote to memory of 2948 2976 15A3.tmp 38 PID 2976 wrote to memory of 2948 2976 15A3.tmp 38 PID 2976 wrote to memory of 2948 2976 15A3.tmp 38 PID 2976 wrote to memory of 2948 2976 15A3.tmp 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_9b92424ed4ef1c5f2f5ed146931a22f4_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\116E.tmp"C:\Users\Admin\AppData\Local\Temp\116E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\11AD.tmp"C:\Users\Admin\AppData\Local\Temp\11AD.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\11EB.tmp"C:\Users\Admin\AppData\Local\Temp\11EB.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\1287.tmp"C:\Users\Admin\AppData\Local\Temp\1287.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\12C6.tmp"C:\Users\Admin\AppData\Local\Temp\12C6.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\1323.tmp"C:\Users\Admin\AppData\Local\Temp\1323.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1362.tmp"C:\Users\Admin\AppData\Local\Temp\1362.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\13B0.tmp"C:\Users\Admin\AppData\Local\Temp\13B0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\13EE.tmp"C:\Users\Admin\AppData\Local\Temp\13EE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\14A9.tmp"C:\Users\Admin\AppData\Local\Temp\14A9.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696
-
-
-
C:\Users\Admin\AppData\Local\Temp\15E1.tmp"C:\Users\Admin\AppData\Local\Temp\15E1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\162F.tmp"C:\Users\Admin\AppData\Local\Temp\162F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\16BC.tmp"C:\Users\Admin\AppData\Local\Temp\16BC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\17A6.tmp"C:\Users\Admin\AppData\Local\Temp\17A6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\17F4.tmp"C:\Users\Admin\AppData\Local\Temp\17F4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\1842.tmp"C:\Users\Admin\AppData\Local\Temp\1842.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\1880.tmp"C:\Users\Admin\AppData\Local\Temp\1880.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\18BE.tmp"C:\Users\Admin\AppData\Local\Temp\18BE.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\190C.tmp"C:\Users\Admin\AppData\Local\Temp\190C.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\194B.tmp"C:\Users\Admin\AppData\Local\Temp\194B.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\19B8.tmp"C:\Users\Admin\AppData\Local\Temp\19B8.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1420
-
-
-
C:\Users\Admin\AppData\Local\Temp\1A35.tmp"C:\Users\Admin\AppData\Local\Temp\1A35.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:796 -
C:\Users\Admin\AppData\Local\Temp\1A73.tmp"C:\Users\Admin\AppData\Local\Temp\1A73.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:652 -
C:\Users\Admin\AppData\Local\Temp\1AF0.tmp"C:\Users\Admin\AppData\Local\Temp\1AF0.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564 -
C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\1B6D.tmp"C:\Users\Admin\AppData\Local\Temp\1B6D.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1C28.tmp"C:\Users\Admin\AppData\Local\Temp\1C28.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\1D60.tmp"C:\Users\Admin\AppData\Local\Temp\1D60.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912 -
C:\Users\Admin\AppData\Local\Temp\1E98.tmp"C:\Users\Admin\AppData\Local\Temp\1E98.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\1F24.tmp"C:\Users\Admin\AppData\Local\Temp\1F24.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\1F63.tmp"C:\Users\Admin\AppData\Local\Temp\1F63.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Users\Admin\AppData\Local\Temp\201E.tmp"C:\Users\Admin\AppData\Local\Temp\201E.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\205C.tmp"C:\Users\Admin\AppData\Local\Temp\205C.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\209B.tmp"C:\Users\Admin\AppData\Local\Temp\209B.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\20D9.tmp"C:\Users\Admin\AppData\Local\Temp\20D9.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\2118.tmp"C:\Users\Admin\AppData\Local\Temp\2118.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\21A4.tmp"C:\Users\Admin\AppData\Local\Temp\21A4.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\21E2.tmp"C:\Users\Admin\AppData\Local\Temp\21E2.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\2221.tmp"C:\Users\Admin\AppData\Local\Temp\2221.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\226F.tmp"C:\Users\Admin\AppData\Local\Temp\226F.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\22AD.tmp"C:\Users\Admin\AppData\Local\Temp\22AD.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\22EC.tmp"C:\Users\Admin\AppData\Local\Temp\22EC.tmp"33⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\232A.tmp"C:\Users\Admin\AppData\Local\Temp\232A.tmp"34⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2368.tmp"C:\Users\Admin\AppData\Local\Temp\2368.tmp"35⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\23A7.tmp"C:\Users\Admin\AppData\Local\Temp\23A7.tmp"36⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"37⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2424.tmp"C:\Users\Admin\AppData\Local\Temp\2424.tmp"38⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"39⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\24CF.tmp"C:\Users\Admin\AppData\Local\Temp\24CF.tmp"40⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\250E.tmp"C:\Users\Admin\AppData\Local\Temp\250E.tmp"41⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"42⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\259A.tmp"C:\Users\Admin\AppData\Local\Temp\259A.tmp"43⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"44⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"45⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"46⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"47⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"48⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"49⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"50⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"51⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"52⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"53⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2848.tmp"C:\Users\Admin\AppData\Local\Temp\2848.tmp"54⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"55⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\28C5.tmp"C:\Users\Admin\AppData\Local\Temp\28C5.tmp"56⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2904.tmp"C:\Users\Admin\AppData\Local\Temp\2904.tmp"57⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2942.tmp"C:\Users\Admin\AppData\Local\Temp\2942.tmp"58⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"59⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"60⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\29FD.tmp"C:\Users\Admin\AppData\Local\Temp\29FD.tmp"61⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"62⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"63⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"64⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"65⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"66⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"67⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"68⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2C10.tmp"C:\Users\Admin\AppData\Local\Temp\2C10.tmp"69⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"70⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"71⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"72⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"73⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"74⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"75⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"76⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2E03.tmp"C:\Users\Admin\AppData\Local\Temp\2E03.tmp"77⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\2E41.tmp"C:\Users\Admin\AppData\Local\Temp\2E41.tmp"78⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"79⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"80⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"81⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"82⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2F89.tmp"C:\Users\Admin\AppData\Local\Temp\2F89.tmp"83⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"84⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\3006.tmp"C:\Users\Admin\AppData\Local\Temp\3006.tmp"85⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\3054.tmp"C:\Users\Admin\AppData\Local\Temp\3054.tmp"86⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"87⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\30D0.tmp"C:\Users\Admin\AppData\Local\Temp\30D0.tmp"88⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\310F.tmp"C:\Users\Admin\AppData\Local\Temp\310F.tmp"89⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"90⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\318C.tmp"C:\Users\Admin\AppData\Local\Temp\318C.tmp"91⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\31CA.tmp"C:\Users\Admin\AppData\Local\Temp\31CA.tmp"92⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"93⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"94⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"95⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"96⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"97⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"98⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"99⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"100⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"101⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"102⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3478.tmp"C:\Users\Admin\AppData\Local\Temp\3478.tmp"103⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"104⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\34F5.tmp"C:\Users\Admin\AppData\Local\Temp\34F5.tmp"105⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"106⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3572.tmp"C:\Users\Admin\AppData\Local\Temp\3572.tmp"107⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\35B0.tmp"C:\Users\Admin\AppData\Local\Temp\35B0.tmp"108⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\35EF.tmp"C:\Users\Admin\AppData\Local\Temp\35EF.tmp"109⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\362D.tmp"C:\Users\Admin\AppData\Local\Temp\362D.tmp"110⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\366C.tmp"C:\Users\Admin\AppData\Local\Temp\366C.tmp"111⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\36AA.tmp"C:\Users\Admin\AppData\Local\Temp\36AA.tmp"112⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\36E8.tmp"C:\Users\Admin\AppData\Local\Temp\36E8.tmp"113⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3717.tmp"C:\Users\Admin\AppData\Local\Temp\3717.tmp"114⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\37A4.tmp"C:\Users\Admin\AppData\Local\Temp\37A4.tmp"115⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\37E2.tmp"C:\Users\Admin\AppData\Local\Temp\37E2.tmp"116⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"117⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"118⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"119⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\38FB.tmp"C:\Users\Admin\AppData\Local\Temp\38FB.tmp"120⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"121⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"122⤵PID:764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-