Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 14:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe
-
Size
486KB
-
MD5
3e3a79efa31e83198cfed1e2057f1fc6
-
SHA1
b5c26acaefd0e51b9173df57160640b7c849a429
-
SHA256
8292382bb1ce0bc26b049816914bdcc5b98370b9d59003a8c7cdb6c460d129a4
-
SHA512
d734f04a1b795de0590dfb303743c442ad95499720b053b5e3ca42962f4c09c5136f3d53ed6465c4e8a26f05b4994adf61a854dd6f4fe0371f49e489ebefa744
-
SSDEEP
12288:/U5rCOTeiDkRgovKZGb+93SKV0vSMPYNZ:/UQOJDD8i9iWTJN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2132 3A23.tmp 2700 3ADE.tmp 2808 3BA9.tmp 2752 3C64.tmp 2604 3CE1.tmp 2388 3DBC.tmp 2820 3E38.tmp 2596 3EA6.tmp 2660 3F51.tmp 2648 400C.tmp 2576 407A.tmp 2924 4144.tmp 2900 41E0.tmp 2636 426D.tmp 1712 4338.tmp 2492 4395.tmp 1864 4402.tmp 1972 44CD.tmp 524 454A.tmp 432 45B7.tmp 2848 4663.tmp 1704 46EF.tmp 1248 47E9.tmp 1092 4856.tmp 1156 48C3.tmp 2080 4940.tmp 2076 49BD.tmp 1768 4A2A.tmp 2780 4A88.tmp 3024 4C3C.tmp 2456 4D17.tmp 2160 4D65.tmp 848 4DC2.tmp 2128 4E10.tmp 1488 4E5E.tmp 2552 4EAC.tmp 1076 4F0A.tmp 700 4F68.tmp 2100 4FB6.tmp 1564 5004.tmp 964 5042.tmp 940 50A0.tmp 2044 50FD.tmp 1216 515B.tmp 1012 51B8.tmp 1552 5216.tmp 3048 5264.tmp 364 52B2.tmp 240 5310.tmp 2088 538C.tmp 1976 53DA.tmp 888 5428.tmp 2508 5476.tmp 1604 54E4.tmp 2788 5532.tmp 2052 558F.tmp 2132 55FC.tmp 2704 565A.tmp 2792 56B8.tmp 2856 5706.tmp 3004 5763.tmp 2728 57D0.tmp 2604 581E.tmp 2932 589B.tmp -
Loads dropped DLL 64 IoCs
pid Process 2548 2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe 2132 3A23.tmp 2700 3ADE.tmp 2808 3BA9.tmp 2752 3C64.tmp 2604 581E.tmp 2388 3DBC.tmp 2820 3E38.tmp 2596 3EA6.tmp 2660 3F51.tmp 2648 400C.tmp 2576 407A.tmp 2924 4144.tmp 2900 41E0.tmp 2636 426D.tmp 1712 4338.tmp 2492 4395.tmp 1864 4402.tmp 1972 44CD.tmp 524 454A.tmp 432 45B7.tmp 2848 4663.tmp 1704 46EF.tmp 1248 47E9.tmp 1092 4856.tmp 1156 48C3.tmp 2080 4940.tmp 2076 49BD.tmp 1768 4A2A.tmp 2780 4A88.tmp 3024 4C3C.tmp 2456 4D17.tmp 2160 4D65.tmp 848 4DC2.tmp 2128 4E10.tmp 1488 4E5E.tmp 2552 4EAC.tmp 1076 4F0A.tmp 700 4F68.tmp 2100 4FB6.tmp 1564 5004.tmp 964 5042.tmp 940 50A0.tmp 2044 50FD.tmp 1216 515B.tmp 1012 51B8.tmp 1552 5216.tmp 3048 5264.tmp 364 52B2.tmp 240 5310.tmp 2088 538C.tmp 1976 53DA.tmp 888 5428.tmp 2508 5476.tmp 1604 54E4.tmp 2788 5532.tmp 2052 558F.tmp 2132 55FC.tmp 2704 565A.tmp 2792 56B8.tmp 2856 5706.tmp 3004 5763.tmp 2728 57D0.tmp 2604 581E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2132 2548 2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe 28 PID 2548 wrote to memory of 2132 2548 2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe 28 PID 2548 wrote to memory of 2132 2548 2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe 28 PID 2548 wrote to memory of 2132 2548 2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe 28 PID 2132 wrote to memory of 2700 2132 3A23.tmp 29 PID 2132 wrote to memory of 2700 2132 3A23.tmp 29 PID 2132 wrote to memory of 2700 2132 3A23.tmp 29 PID 2132 wrote to memory of 2700 2132 3A23.tmp 29 PID 2700 wrote to memory of 2808 2700 3ADE.tmp 30 PID 2700 wrote to memory of 2808 2700 3ADE.tmp 30 PID 2700 wrote to memory of 2808 2700 3ADE.tmp 30 PID 2700 wrote to memory of 2808 2700 3ADE.tmp 30 PID 2808 wrote to memory of 2752 2808 3BA9.tmp 31 PID 2808 wrote to memory of 2752 2808 3BA9.tmp 31 PID 2808 wrote to memory of 2752 2808 3BA9.tmp 31 PID 2808 wrote to memory of 2752 2808 3BA9.tmp 31 PID 2752 wrote to memory of 2604 2752 3C64.tmp 32 PID 2752 wrote to memory of 2604 2752 3C64.tmp 32 PID 2752 wrote to memory of 2604 2752 3C64.tmp 32 PID 2752 wrote to memory of 2604 2752 3C64.tmp 32 PID 2604 wrote to memory of 2388 2604 581E.tmp 56 PID 2604 wrote to memory of 2388 2604 581E.tmp 56 PID 2604 wrote to memory of 2388 2604 581E.tmp 56 PID 2604 wrote to memory of 2388 2604 581E.tmp 56 PID 2388 wrote to memory of 2820 2388 3DBC.tmp 55 PID 2388 wrote to memory of 2820 2388 3DBC.tmp 55 PID 2388 wrote to memory of 2820 2388 3DBC.tmp 55 PID 2388 wrote to memory of 2820 2388 3DBC.tmp 55 PID 2820 wrote to memory of 2596 2820 3E38.tmp 54 PID 2820 wrote to memory of 2596 2820 3E38.tmp 54 PID 2820 wrote to memory of 2596 2820 3E38.tmp 54 PID 2820 wrote to memory of 2596 2820 3E38.tmp 54 PID 2596 wrote to memory of 2660 2596 3EA6.tmp 53 PID 2596 wrote to memory of 2660 2596 3EA6.tmp 53 PID 2596 wrote to memory of 2660 2596 3EA6.tmp 53 PID 2596 wrote to memory of 2660 2596 3EA6.tmp 53 PID 2660 wrote to memory of 2648 2660 3F51.tmp 51 PID 2660 wrote to memory of 2648 2660 3F51.tmp 51 PID 2660 wrote to memory of 2648 2660 3F51.tmp 51 PID 2660 wrote to memory of 2648 2660 3F51.tmp 51 PID 2648 wrote to memory of 2576 2648 400C.tmp 50 PID 2648 wrote to memory of 2576 2648 400C.tmp 50 PID 2648 wrote to memory of 2576 2648 400C.tmp 50 PID 2648 wrote to memory of 2576 2648 400C.tmp 50 PID 2576 wrote to memory of 2924 2576 407A.tmp 49 PID 2576 wrote to memory of 2924 2576 407A.tmp 49 PID 2576 wrote to memory of 2924 2576 407A.tmp 49 PID 2576 wrote to memory of 2924 2576 407A.tmp 49 PID 2924 wrote to memory of 2900 2924 4144.tmp 33 PID 2924 wrote to memory of 2900 2924 4144.tmp 33 PID 2924 wrote to memory of 2900 2924 4144.tmp 33 PID 2924 wrote to memory of 2900 2924 4144.tmp 33 PID 2900 wrote to memory of 2636 2900 41E0.tmp 48 PID 2900 wrote to memory of 2636 2900 41E0.tmp 48 PID 2900 wrote to memory of 2636 2900 41E0.tmp 48 PID 2900 wrote to memory of 2636 2900 41E0.tmp 48 PID 2636 wrote to memory of 1712 2636 426D.tmp 47 PID 2636 wrote to memory of 1712 2636 426D.tmp 47 PID 2636 wrote to memory of 1712 2636 426D.tmp 47 PID 2636 wrote to memory of 1712 2636 426D.tmp 47 PID 1712 wrote to memory of 2492 1712 4338.tmp 46 PID 1712 wrote to memory of 2492 1712 4338.tmp 46 PID 1712 wrote to memory of 2492 1712 4338.tmp 46 PID 1712 wrote to memory of 2492 1712 4338.tmp 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_3e3a79efa31e83198cfed1e2057f1fc6_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\3A23.tmp"C:\Users\Admin\AppData\Local\Temp\3A23.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"6⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41E0.tmp"C:\Users\Admin\AppData\Local\Temp\41E0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\426D.tmp"C:\Users\Admin\AppData\Local\Temp\426D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\4402.tmp"C:\Users\Admin\AppData\Local\Temp\4402.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\44CD.tmp"C:\Users\Admin\AppData\Local\Temp\44CD.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\45B7.tmp"C:\Users\Admin\AppData\Local\Temp\45B7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432 -
C:\Users\Admin\AppData\Local\Temp\4663.tmp"C:\Users\Admin\AppData\Local\Temp\4663.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\46EF.tmp"C:\Users\Admin\AppData\Local\Temp\46EF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\47E9.tmp"C:\Users\Admin\AppData\Local\Temp\47E9.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\4856.tmp"C:\Users\Admin\AppData\Local\Temp\4856.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\48C3.tmp"C:\Users\Admin\AppData\Local\Temp\48C3.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\4940.tmp"C:\Users\Admin\AppData\Local\Temp\4940.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\49BD.tmp"C:\Users\Admin\AppData\Local\Temp\49BD.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\4A88.tmp"C:\Users\Admin\AppData\Local\Temp\4A88.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\4D17.tmp"C:\Users\Admin\AppData\Local\Temp\4D17.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\4D65.tmp"C:\Users\Admin\AppData\Local\Temp\4D65.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\4DC2.tmp"C:\Users\Admin\AppData\Local\Temp\4DC2.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Users\Admin\AppData\Local\Temp\4E10.tmp"C:\Users\Admin\AppData\Local\Temp\4E10.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\4E5E.tmp"C:\Users\Admin\AppData\Local\Temp\4E5E.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:700 -
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\5042.tmp"C:\Users\Admin\AppData\Local\Temp\5042.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:964 -
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Users\Admin\AppData\Local\Temp\50FD.tmp"C:\Users\Admin\AppData\Local\Temp\50FD.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\515B.tmp"C:\Users\Admin\AppData\Local\Temp\515B.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\51B8.tmp"C:\Users\Admin\AppData\Local\Temp\51B8.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\5216.tmp"C:\Users\Admin\AppData\Local\Temp\5216.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\5264.tmp"C:\Users\Admin\AppData\Local\Temp\5264.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\52B2.tmp"C:\Users\Admin\AppData\Local\Temp\52B2.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:364 -
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:240 -
C:\Users\Admin\AppData\Local\Temp\538C.tmp"C:\Users\Admin\AppData\Local\Temp\538C.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\53DA.tmp"C:\Users\Admin\AppData\Local\Temp\53DA.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\5428.tmp"C:\Users\Admin\AppData\Local\Temp\5428.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Users\Admin\AppData\Local\Temp\5476.tmp"C:\Users\Admin\AppData\Local\Temp\5476.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\54E4.tmp"C:\Users\Admin\AppData\Local\Temp\54E4.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\5532.tmp"C:\Users\Admin\AppData\Local\Temp\5532.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\558F.tmp"C:\Users\Admin\AppData\Local\Temp\558F.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\55FC.tmp"C:\Users\Admin\AppData\Local\Temp\55FC.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\565A.tmp"C:\Users\Admin\AppData\Local\Temp\565A.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\56B8.tmp"C:\Users\Admin\AppData\Local\Temp\56B8.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\5706.tmp"C:\Users\Admin\AppData\Local\Temp\5706.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\5763.tmp"C:\Users\Admin\AppData\Local\Temp\5763.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\57D0.tmp"C:\Users\Admin\AppData\Local\Temp\57D0.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\581E.tmp"C:\Users\Admin\AppData\Local\Temp\581E.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\589B.tmp"C:\Users\Admin\AppData\Local\Temp\589B.tmp"43⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\5976.tmp"C:\Users\Admin\AppData\Local\Temp\5976.tmp"44⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\59F2.tmp"C:\Users\Admin\AppData\Local\Temp\59F2.tmp"45⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\5A60.tmp"C:\Users\Admin\AppData\Local\Temp\5A60.tmp"46⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"47⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\5B59.tmp"C:\Users\Admin\AppData\Local\Temp\5B59.tmp"48⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\5BC6.tmp"C:\Users\Admin\AppData\Local\Temp\5BC6.tmp"49⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\5C82.tmp"C:\Users\Admin\AppData\Local\Temp\5C82.tmp"50⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\5CD0.tmp"C:\Users\Admin\AppData\Local\Temp\5CD0.tmp"51⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\5D5C.tmp"C:\Users\Admin\AppData\Local\Temp\5D5C.tmp"52⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\5DF8.tmp"C:\Users\Admin\AppData\Local\Temp\5DF8.tmp"53⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\5E65.tmp"C:\Users\Admin\AppData\Local\Temp\5E65.tmp"54⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\5EC3.tmp"C:\Users\Admin\AppData\Local\Temp\5EC3.tmp"55⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\5F11.tmp"C:\Users\Admin\AppData\Local\Temp\5F11.tmp"56⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\5F7E.tmp"C:\Users\Admin\AppData\Local\Temp\5F7E.tmp"57⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\600A.tmp"C:\Users\Admin\AppData\Local\Temp\600A.tmp"58⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\60B6.tmp"C:\Users\Admin\AppData\Local\Temp\60B6.tmp"59⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\61FE.tmp"C:\Users\Admin\AppData\Local\Temp\61FE.tmp"60⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\62E8.tmp"C:\Users\Admin\AppData\Local\Temp\62E8.tmp"61⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\6364.tmp"C:\Users\Admin\AppData\Local\Temp\6364.tmp"62⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\63D2.tmp"C:\Users\Admin\AppData\Local\Temp\63D2.tmp"63⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\6420.tmp"C:\Users\Admin\AppData\Local\Temp\6420.tmp"64⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\647D.tmp"C:\Users\Admin\AppData\Local\Temp\647D.tmp"65⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\64DB.tmp"C:\Users\Admin\AppData\Local\Temp\64DB.tmp"66⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\6539.tmp"C:\Users\Admin\AppData\Local\Temp\6539.tmp"67⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\65B5.tmp"C:\Users\Admin\AppData\Local\Temp\65B5.tmp"68⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\6603.tmp"C:\Users\Admin\AppData\Local\Temp\6603.tmp"69⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\6651.tmp"C:\Users\Admin\AppData\Local\Temp\6651.tmp"70⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\66AF.tmp"C:\Users\Admin\AppData\Local\Temp\66AF.tmp"71⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\670D.tmp"C:\Users\Admin\AppData\Local\Temp\670D.tmp"72⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\675B.tmp"C:\Users\Admin\AppData\Local\Temp\675B.tmp"73⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\67A9.tmp"C:\Users\Admin\AppData\Local\Temp\67A9.tmp"74⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\67F7.tmp"C:\Users\Admin\AppData\Local\Temp\67F7.tmp"75⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\6864.tmp"C:\Users\Admin\AppData\Local\Temp\6864.tmp"76⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\68C1.tmp"C:\Users\Admin\AppData\Local\Temp\68C1.tmp"77⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\691F.tmp"C:\Users\Admin\AppData\Local\Temp\691F.tmp"78⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\696D.tmp"C:\Users\Admin\AppData\Local\Temp\696D.tmp"79⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\69DA.tmp"C:\Users\Admin\AppData\Local\Temp\69DA.tmp"80⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\6A47.tmp"C:\Users\Admin\AppData\Local\Temp\6A47.tmp"81⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\6A95.tmp"C:\Users\Admin\AppData\Local\Temp\6A95.tmp"82⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\6B03.tmp"C:\Users\Admin\AppData\Local\Temp\6B03.tmp"83⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\6B60.tmp"C:\Users\Admin\AppData\Local\Temp\6B60.tmp"84⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\6BFC.tmp"C:\Users\Admin\AppData\Local\Temp\6BFC.tmp"85⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\6C69.tmp"C:\Users\Admin\AppData\Local\Temp\6C69.tmp"86⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\6CC7.tmp"C:\Users\Admin\AppData\Local\Temp\6CC7.tmp"87⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\6D34.tmp"C:\Users\Admin\AppData\Local\Temp\6D34.tmp"88⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\6D92.tmp"C:\Users\Admin\AppData\Local\Temp\6D92.tmp"89⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\6DFF.tmp"C:\Users\Admin\AppData\Local\Temp\6DFF.tmp"90⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\6E5D.tmp"C:\Users\Admin\AppData\Local\Temp\6E5D.tmp"91⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\6EBA.tmp"C:\Users\Admin\AppData\Local\Temp\6EBA.tmp"92⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\6F18.tmp"C:\Users\Admin\AppData\Local\Temp\6F18.tmp"93⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\6F85.tmp"C:\Users\Admin\AppData\Local\Temp\6F85.tmp"94⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\7002.tmp"C:\Users\Admin\AppData\Local\Temp\7002.tmp"95⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\708E.tmp"C:\Users\Admin\AppData\Local\Temp\708E.tmp"96⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\70EC.tmp"C:\Users\Admin\AppData\Local\Temp\70EC.tmp"97⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\7149.tmp"C:\Users\Admin\AppData\Local\Temp\7149.tmp"98⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\71B7.tmp"C:\Users\Admin\AppData\Local\Temp\71B7.tmp"99⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\7214.tmp"C:\Users\Admin\AppData\Local\Temp\7214.tmp"100⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\7281.tmp"C:\Users\Admin\AppData\Local\Temp\7281.tmp"101⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\72FE.tmp"C:\Users\Admin\AppData\Local\Temp\72FE.tmp"102⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\736B.tmp"C:\Users\Admin\AppData\Local\Temp\736B.tmp"103⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\73C9.tmp"C:\Users\Admin\AppData\Local\Temp\73C9.tmp"104⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\7427.tmp"C:\Users\Admin\AppData\Local\Temp\7427.tmp"105⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"106⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"107⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\755F.tmp"C:\Users\Admin\AppData\Local\Temp\755F.tmp"108⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\75AD.tmp"C:\Users\Admin\AppData\Local\Temp\75AD.tmp"109⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\760A.tmp"C:\Users\Admin\AppData\Local\Temp\760A.tmp"110⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\7677.tmp"C:\Users\Admin\AppData\Local\Temp\7677.tmp"111⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\76C5.tmp"C:\Users\Admin\AppData\Local\Temp\76C5.tmp"112⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\77BF.tmp"C:\Users\Admin\AppData\Local\Temp\77BF.tmp"113⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\788A.tmp"C:\Users\Admin\AppData\Local\Temp\788A.tmp"114⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\78E7.tmp"C:\Users\Admin\AppData\Local\Temp\78E7.tmp"115⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\7945.tmp"C:\Users\Admin\AppData\Local\Temp\7945.tmp"116⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\79A3.tmp"C:\Users\Admin\AppData\Local\Temp\79A3.tmp"117⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\7A10.tmp"C:\Users\Admin\AppData\Local\Temp\7A10.tmp"118⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\7A6D.tmp"C:\Users\Admin\AppData\Local\Temp\7A6D.tmp"119⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\7ACB.tmp"C:\Users\Admin\AppData\Local\Temp\7ACB.tmp"120⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\7B29.tmp"C:\Users\Admin\AppData\Local\Temp\7B29.tmp"121⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\7B86.tmp"C:\Users\Admin\AppData\Local\Temp\7B86.tmp"122⤵PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-