Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe
-
Size
486KB
-
MD5
b341701b0e9f9f817fb38748f5e58104
-
SHA1
9199da81b5c3fef4fb2462add8fcf657ab1673f6
-
SHA256
860aea89156db53a3fbe4319afa4b3c26262c5bf0bb2bbbfe3cc8a0608ba43ac
-
SHA512
f3390d1f7398e3bce8a6d8abfb33a9356f175729e127e3b3cea84282afc04c765af2a8adf05fb8802ffae1e4f1b051034140886eacedc6fec23afa4a3e573387
-
SSDEEP
12288:/U5rCOTeiDnDCEbwIwEoSvoRQLN5yYZrnPFCHiNZ:/UQOJDDCFL98frnPFCHiN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2112 8768.tmp 3012 87C6.tmp 2940 8814.tmp 604 8871.tmp 940 88B0.tmp 624 97DC.tmp 1744 892D.tmp 2808 896B.tmp 2404 89B9.tmp 2732 89F7.tmp 2676 8A45.tmp 2816 8A84.tmp 1956 8AD2.tmp 2656 8B10.tmp 2124 8B6E.tmp 2592 8BAC.tmp 2220 8BEB.tmp 1612 8C39.tmp 2168 8C77.tmp 1800 8CB5.tmp 272 8CF4.tmp 1912 8D51.tmp 340 8D9F.tmp 1496 8DDE.tmp 864 8E1C.tmp 2416 8E5B.tmp 1256 8E99.tmp 2584 8EE7.tmp 1464 8F25.tmp 2852 8F64.tmp 2864 8FA2.tmp 2880 8FE1.tmp 2824 901F.tmp 2472 905D.tmp 1488 909C.tmp 2216 90CB.tmp 408 9109.tmp 1592 9147.tmp 3028 9186.tmp 1532 91C4.tmp 972 9203.tmp 968 9241.tmp 396 927F.tmp 1032 92BE.tmp 1780 92ED.tmp 1020 932B.tmp 2696 9369.tmp 2072 9398.tmp 2052 93D7.tmp 2212 9415.tmp 2332 9453.tmp 1996 9492.tmp 1448 94D0.tmp 1704 950F.tmp 1652 954D.tmp 1560 957C.tmp 1548 95BA.tmp 2992 95F9.tmp 2156 9637.tmp 2076 9675.tmp 600 96B4.tmp 2804 96F2.tmp 680 9731.tmp 992 976F.tmp -
Loads dropped DLL 64 IoCs
pid Process 1984 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 2112 8768.tmp 3012 87C6.tmp 2940 8814.tmp 604 8871.tmp 940 88B0.tmp 624 97DC.tmp 1744 892D.tmp 2808 896B.tmp 2404 89B9.tmp 2732 89F7.tmp 2676 8A45.tmp 2816 8A84.tmp 1956 8AD2.tmp 2656 8B10.tmp 2124 8B6E.tmp 2592 8BAC.tmp 2220 8BEB.tmp 1612 8C39.tmp 2168 8C77.tmp 1800 8CB5.tmp 272 8CF4.tmp 1912 8D51.tmp 340 8D9F.tmp 1496 8DDE.tmp 864 8E1C.tmp 2416 8E5B.tmp 1256 8E99.tmp 2584 8EE7.tmp 1464 8F25.tmp 2852 8F64.tmp 2864 8FA2.tmp 2880 8FE1.tmp 2824 901F.tmp 2472 905D.tmp 1488 909C.tmp 2216 90CB.tmp 408 9109.tmp 1592 9147.tmp 3028 9186.tmp 1532 91C4.tmp 972 9203.tmp 968 9241.tmp 396 927F.tmp 1032 92BE.tmp 1780 92ED.tmp 1020 932B.tmp 2696 9369.tmp 2072 9398.tmp 2052 93D7.tmp 2212 9415.tmp 2332 9453.tmp 1996 9492.tmp 1448 94D0.tmp 1704 950F.tmp 1652 954D.tmp 1560 957C.tmp 1548 95BA.tmp 2992 95F9.tmp 2156 9637.tmp 2076 9675.tmp 600 96B4.tmp 2804 96F2.tmp 680 9731.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2112 1984 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 28 PID 1984 wrote to memory of 2112 1984 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 28 PID 1984 wrote to memory of 2112 1984 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 28 PID 1984 wrote to memory of 2112 1984 2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe 28 PID 2112 wrote to memory of 3012 2112 8768.tmp 29 PID 2112 wrote to memory of 3012 2112 8768.tmp 29 PID 2112 wrote to memory of 3012 2112 8768.tmp 29 PID 2112 wrote to memory of 3012 2112 8768.tmp 29 PID 3012 wrote to memory of 2940 3012 87C6.tmp 30 PID 3012 wrote to memory of 2940 3012 87C6.tmp 30 PID 3012 wrote to memory of 2940 3012 87C6.tmp 30 PID 3012 wrote to memory of 2940 3012 87C6.tmp 30 PID 2940 wrote to memory of 604 2940 8814.tmp 31 PID 2940 wrote to memory of 604 2940 8814.tmp 31 PID 2940 wrote to memory of 604 2940 8814.tmp 31 PID 2940 wrote to memory of 604 2940 8814.tmp 31 PID 604 wrote to memory of 940 604 8871.tmp 32 PID 604 wrote to memory of 940 604 8871.tmp 32 PID 604 wrote to memory of 940 604 8871.tmp 32 PID 604 wrote to memory of 940 604 8871.tmp 32 PID 940 wrote to memory of 624 940 88B0.tmp 64 PID 940 wrote to memory of 624 940 88B0.tmp 64 PID 940 wrote to memory of 624 940 88B0.tmp 64 PID 940 wrote to memory of 624 940 88B0.tmp 64 PID 624 wrote to memory of 1744 624 97DC.tmp 33 PID 624 wrote to memory of 1744 624 97DC.tmp 33 PID 624 wrote to memory of 1744 624 97DC.tmp 33 PID 624 wrote to memory of 1744 624 97DC.tmp 33 PID 1744 wrote to memory of 2808 1744 892D.tmp 100 PID 1744 wrote to memory of 2808 1744 892D.tmp 100 PID 1744 wrote to memory of 2808 1744 892D.tmp 100 PID 1744 wrote to memory of 2808 1744 892D.tmp 100 PID 2808 wrote to memory of 2404 2808 896B.tmp 35 PID 2808 wrote to memory of 2404 2808 896B.tmp 35 PID 2808 wrote to memory of 2404 2808 896B.tmp 35 PID 2808 wrote to memory of 2404 2808 896B.tmp 35 PID 2404 wrote to memory of 2732 2404 89B9.tmp 99 PID 2404 wrote to memory of 2732 2404 89B9.tmp 99 PID 2404 wrote to memory of 2732 2404 89B9.tmp 99 PID 2404 wrote to memory of 2732 2404 89B9.tmp 99 PID 2732 wrote to memory of 2676 2732 89F7.tmp 98 PID 2732 wrote to memory of 2676 2732 89F7.tmp 98 PID 2732 wrote to memory of 2676 2732 89F7.tmp 98 PID 2732 wrote to memory of 2676 2732 89F7.tmp 98 PID 2676 wrote to memory of 2816 2676 8A45.tmp 97 PID 2676 wrote to memory of 2816 2676 8A45.tmp 97 PID 2676 wrote to memory of 2816 2676 8A45.tmp 97 PID 2676 wrote to memory of 2816 2676 8A45.tmp 97 PID 2816 wrote to memory of 1956 2816 8A84.tmp 96 PID 2816 wrote to memory of 1956 2816 8A84.tmp 96 PID 2816 wrote to memory of 1956 2816 8A84.tmp 96 PID 2816 wrote to memory of 1956 2816 8A84.tmp 96 PID 1956 wrote to memory of 2656 1956 8AD2.tmp 36 PID 1956 wrote to memory of 2656 1956 8AD2.tmp 36 PID 1956 wrote to memory of 2656 1956 8AD2.tmp 36 PID 1956 wrote to memory of 2656 1956 8AD2.tmp 36 PID 2656 wrote to memory of 2124 2656 8B10.tmp 95 PID 2656 wrote to memory of 2124 2656 8B10.tmp 95 PID 2656 wrote to memory of 2124 2656 8B10.tmp 95 PID 2656 wrote to memory of 2124 2656 8B10.tmp 95 PID 2124 wrote to memory of 2592 2124 8B6E.tmp 94 PID 2124 wrote to memory of 2592 2124 8B6E.tmp 94 PID 2124 wrote to memory of 2592 2124 8B6E.tmp 94 PID 2124 wrote to memory of 2592 2124 8B6E.tmp 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_b341701b0e9f9f817fb38748f5e58104_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\8768.tmp"C:\Users\Admin\AppData\Local\Temp\8768.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\87C6.tmp"C:\Users\Admin\AppData\Local\Temp\87C6.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\8814.tmp"C:\Users\Admin\AppData\Local\Temp\8814.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\8871.tmp"C:\Users\Admin\AppData\Local\Temp\8871.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\88B0.tmp"C:\Users\Admin\AppData\Local\Temp\88B0.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\88EE.tmp"C:\Users\Admin\AppData\Local\Temp\88EE.tmp"7⤵PID:624
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\892D.tmp"C:\Users\Admin\AppData\Local\Temp\892D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\896B.tmp"C:\Users\Admin\AppData\Local\Temp\896B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\89B9.tmp"C:\Users\Admin\AppData\Local\Temp\89B9.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\89F7.tmp"C:\Users\Admin\AppData\Local\Temp\89F7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\8B10.tmp"C:\Users\Admin\AppData\Local\Temp\8B10.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\8B6E.tmp"C:\Users\Admin\AppData\Local\Temp\8B6E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\8D9F.tmp"C:\Users\Admin\AppData\Local\Temp\8D9F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:340 -
C:\Users\Admin\AppData\Local\Temp\8DDE.tmp"C:\Users\Admin\AppData\Local\Temp\8DDE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\8E5B.tmp"C:\Users\Admin\AppData\Local\Temp\8E5B.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\8E99.tmp"C:\Users\Admin\AppData\Local\Temp\8E99.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\8EE7.tmp"C:\Users\Admin\AppData\Local\Temp\8EE7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\8F25.tmp"C:\Users\Admin\AppData\Local\Temp\8F25.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\8F64.tmp"C:\Users\Admin\AppData\Local\Temp\8F64.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\8FE1.tmp"C:\Users\Admin\AppData\Local\Temp\8FE1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\901F.tmp"C:\Users\Admin\AppData\Local\Temp\901F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\905D.tmp"C:\Users\Admin\AppData\Local\Temp\905D.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\8FA2.tmp"C:\Users\Admin\AppData\Local\Temp\8FA2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864
-
C:\Users\Admin\AppData\Local\Temp\9109.tmp"C:\Users\Admin\AppData\Local\Temp\9109.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:408 -
C:\Users\Admin\AppData\Local\Temp\9147.tmp"C:\Users\Admin\AppData\Local\Temp\9147.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\9186.tmp"C:\Users\Admin\AppData\Local\Temp\9186.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\91C4.tmp"C:\Users\Admin\AppData\Local\Temp\91C4.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\9203.tmp"C:\Users\Admin\AppData\Local\Temp\9203.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:972 -
C:\Users\Admin\AppData\Local\Temp\9241.tmp"C:\Users\Admin\AppData\Local\Temp\9241.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\92ED.tmp"C:\Users\Admin\AppData\Local\Temp\92ED.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\932B.tmp"C:\Users\Admin\AppData\Local\Temp\932B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\92BE.tmp"C:\Users\Admin\AppData\Local\Temp\92BE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032
-
C:\Users\Admin\AppData\Local\Temp\9398.tmp"C:\Users\Admin\AppData\Local\Temp\9398.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\93D7.tmp"C:\Users\Admin\AppData\Local\Temp\93D7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\9415.tmp"C:\Users\Admin\AppData\Local\Temp\9415.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\9453.tmp"C:\Users\Admin\AppData\Local\Temp\9453.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\9492.tmp"C:\Users\Admin\AppData\Local\Temp\9492.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\94D0.tmp"C:\Users\Admin\AppData\Local\Temp\94D0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\950F.tmp"C:\Users\Admin\AppData\Local\Temp\950F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\957C.tmp"C:\Users\Admin\AppData\Local\Temp\957C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\95BA.tmp"C:\Users\Admin\AppData\Local\Temp\95BA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\95F9.tmp"C:\Users\Admin\AppData\Local\Temp\95F9.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\9637.tmp"C:\Users\Admin\AppData\Local\Temp\9637.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\9675.tmp"C:\Users\Admin\AppData\Local\Temp\9675.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\96B4.tmp"C:\Users\Admin\AppData\Local\Temp\96B4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600 -
C:\Users\Admin\AppData\Local\Temp\96F2.tmp"C:\Users\Admin\AppData\Local\Temp\96F2.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\9731.tmp"C:\Users\Admin\AppData\Local\Temp\9731.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:680
-
-
-
C:\Users\Admin\AppData\Local\Temp\97AD.tmp"C:\Users\Admin\AppData\Local\Temp\97AD.tmp"1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\97DC.tmp"C:\Users\Admin\AppData\Local\Temp\97DC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\981B.tmp"C:\Users\Admin\AppData\Local\Temp\981B.tmp"3⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\9859.tmp"C:\Users\Admin\AppData\Local\Temp\9859.tmp"4⤵PID:2624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\976F.tmp"C:\Users\Admin\AppData\Local\Temp\976F.tmp"1⤵
- Executes dropped EXE
PID:992
-
C:\Users\Admin\AppData\Local\Temp\98C6.tmp"C:\Users\Admin\AppData\Local\Temp\98C6.tmp"1⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\9905.tmp"C:\Users\Admin\AppData\Local\Temp\9905.tmp"2⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\9943.tmp"C:\Users\Admin\AppData\Local\Temp\9943.tmp"3⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\9981.tmp"C:\Users\Admin\AppData\Local\Temp\9981.tmp"4⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\99C0.tmp"C:\Users\Admin\AppData\Local\Temp\99C0.tmp"5⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"6⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"7⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"8⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\9B75.tmp"C:\Users\Admin\AppData\Local\Temp\9B75.tmp"9⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\9BF1.tmp"C:\Users\Admin\AppData\Local\Temp\9BF1.tmp"10⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\9C30.tmp"C:\Users\Admin\AppData\Local\Temp\9C30.tmp"11⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\9C8D.tmp"C:\Users\Admin\AppData\Local\Temp\9C8D.tmp"12⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\9CDB.tmp"C:\Users\Admin\AppData\Local\Temp\9CDB.tmp"13⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\9D29.tmp"C:\Users\Admin\AppData\Local\Temp\9D29.tmp"14⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\9D77.tmp"C:\Users\Admin\AppData\Local\Temp\9D77.tmp"15⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\9DB6.tmp"C:\Users\Admin\AppData\Local\Temp\9DB6.tmp"16⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\9DF4.tmp"C:\Users\Admin\AppData\Local\Temp\9DF4.tmp"17⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\9E33.tmp"C:\Users\Admin\AppData\Local\Temp\9E33.tmp"18⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\9E71.tmp"C:\Users\Admin\AppData\Local\Temp\9E71.tmp"19⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\9EAF.tmp"C:\Users\Admin\AppData\Local\Temp\9EAF.tmp"20⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\9EEE.tmp"C:\Users\Admin\AppData\Local\Temp\9EEE.tmp"21⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\9F2C.tmp"C:\Users\Admin\AppData\Local\Temp\9F2C.tmp"22⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\9F6B.tmp"C:\Users\Admin\AppData\Local\Temp\9F6B.tmp"23⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\9FA9.tmp"C:\Users\Admin\AppData\Local\Temp\9FA9.tmp"24⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\9FE7.tmp"C:\Users\Admin\AppData\Local\Temp\9FE7.tmp"25⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\A026.tmp"C:\Users\Admin\AppData\Local\Temp\A026.tmp"26⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\A064.tmp"C:\Users\Admin\AppData\Local\Temp\A064.tmp"27⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\A0A3.tmp"C:\Users\Admin\AppData\Local\Temp\A0A3.tmp"28⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\A0E1.tmp"C:\Users\Admin\AppData\Local\Temp\A0E1.tmp"29⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\A11F.tmp"C:\Users\Admin\AppData\Local\Temp\A11F.tmp"30⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\A15E.tmp"C:\Users\Admin\AppData\Local\Temp\A15E.tmp"31⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\A1AC.tmp"C:\Users\Admin\AppData\Local\Temp\A1AC.tmp"32⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\A1EA.tmp"C:\Users\Admin\AppData\Local\Temp\A1EA.tmp"33⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\A229.tmp"C:\Users\Admin\AppData\Local\Temp\A229.tmp"34⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\A267.tmp"C:\Users\Admin\AppData\Local\Temp\A267.tmp"35⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\A2A5.tmp"C:\Users\Admin\AppData\Local\Temp\A2A5.tmp"36⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\A2E4.tmp"C:\Users\Admin\AppData\Local\Temp\A2E4.tmp"37⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\A332.tmp"C:\Users\Admin\AppData\Local\Temp\A332.tmp"38⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\A370.tmp"C:\Users\Admin\AppData\Local\Temp\A370.tmp"39⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\A3AF.tmp"C:\Users\Admin\AppData\Local\Temp\A3AF.tmp"40⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\A3ED.tmp"C:\Users\Admin\AppData\Local\Temp\A3ED.tmp"41⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\A42B.tmp"C:\Users\Admin\AppData\Local\Temp\A42B.tmp"42⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\A46A.tmp"C:\Users\Admin\AppData\Local\Temp\A46A.tmp"43⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\A4A8.tmp"C:\Users\Admin\AppData\Local\Temp\A4A8.tmp"44⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\A4E7.tmp"C:\Users\Admin\AppData\Local\Temp\A4E7.tmp"45⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\A525.tmp"C:\Users\Admin\AppData\Local\Temp\A525.tmp"46⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\A573.tmp"C:\Users\Admin\AppData\Local\Temp\A573.tmp"47⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"48⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\A5F0.tmp"C:\Users\Admin\AppData\Local\Temp\A5F0.tmp"49⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\A62E.tmp"C:\Users\Admin\AppData\Local\Temp\A62E.tmp"50⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\A66D.tmp"C:\Users\Admin\AppData\Local\Temp\A66D.tmp"51⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\A6BB.tmp"C:\Users\Admin\AppData\Local\Temp\A6BB.tmp"52⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\A6F9.tmp"C:\Users\Admin\AppData\Local\Temp\A6F9.tmp"53⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\A737.tmp"C:\Users\Admin\AppData\Local\Temp\A737.tmp"54⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\A776.tmp"C:\Users\Admin\AppData\Local\Temp\A776.tmp"55⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\A7B4.tmp"C:\Users\Admin\AppData\Local\Temp\A7B4.tmp"56⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"57⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\A841.tmp"C:\Users\Admin\AppData\Local\Temp\A841.tmp"58⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\A87F.tmp"C:\Users\Admin\AppData\Local\Temp\A87F.tmp"59⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\A8BD.tmp"C:\Users\Admin\AppData\Local\Temp\A8BD.tmp"60⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\A8FC.tmp"C:\Users\Admin\AppData\Local\Temp\A8FC.tmp"61⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\A93A.tmp"C:\Users\Admin\AppData\Local\Temp\A93A.tmp"62⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\A979.tmp"C:\Users\Admin\AppData\Local\Temp\A979.tmp"63⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\A9B7.tmp"C:\Users\Admin\AppData\Local\Temp\A9B7.tmp"64⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\A9F5.tmp"C:\Users\Admin\AppData\Local\Temp\A9F5.tmp"65⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\AA34.tmp"C:\Users\Admin\AppData\Local\Temp\AA34.tmp"66⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\AA72.tmp"C:\Users\Admin\AppData\Local\Temp\AA72.tmp"67⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\AAB1.tmp"C:\Users\Admin\AppData\Local\Temp\AAB1.tmp"68⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\AAEF.tmp"C:\Users\Admin\AppData\Local\Temp\AAEF.tmp"69⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\AB2D.tmp"C:\Users\Admin\AppData\Local\Temp\AB2D.tmp"70⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\AB6C.tmp"C:\Users\Admin\AppData\Local\Temp\AB6C.tmp"71⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\ABAA.tmp"C:\Users\Admin\AppData\Local\Temp\ABAA.tmp"72⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\ABE9.tmp"C:\Users\Admin\AppData\Local\Temp\ABE9.tmp"73⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\AC27.tmp"C:\Users\Admin\AppData\Local\Temp\AC27.tmp"74⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\AC75.tmp"C:\Users\Admin\AppData\Local\Temp\AC75.tmp"75⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\ACB3.tmp"C:\Users\Admin\AppData\Local\Temp\ACB3.tmp"76⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\ACF2.tmp"C:\Users\Admin\AppData\Local\Temp\ACF2.tmp"77⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\AD30.tmp"C:\Users\Admin\AppData\Local\Temp\AD30.tmp"78⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\AD6F.tmp"C:\Users\Admin\AppData\Local\Temp\AD6F.tmp"79⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\ADBD.tmp"C:\Users\Admin\AppData\Local\Temp\ADBD.tmp"80⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\ADFB.tmp"C:\Users\Admin\AppData\Local\Temp\ADFB.tmp"81⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\AE49.tmp"C:\Users\Admin\AppData\Local\Temp\AE49.tmp"82⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\AE97.tmp"C:\Users\Admin\AppData\Local\Temp\AE97.tmp"83⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\AED5.tmp"C:\Users\Admin\AppData\Local\Temp\AED5.tmp"84⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\AF14.tmp"C:\Users\Admin\AppData\Local\Temp\AF14.tmp"85⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\AF52.tmp"C:\Users\Admin\AppData\Local\Temp\AF52.tmp"86⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\AF91.tmp"C:\Users\Admin\AppData\Local\Temp\AF91.tmp"87⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\AFCF.tmp"C:\Users\Admin\AppData\Local\Temp\AFCF.tmp"88⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\B00D.tmp"C:\Users\Admin\AppData\Local\Temp\B00D.tmp"89⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\B04C.tmp"C:\Users\Admin\AppData\Local\Temp\B04C.tmp"90⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\B08A.tmp"C:\Users\Admin\AppData\Local\Temp\B08A.tmp"91⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\B0D8.tmp"C:\Users\Admin\AppData\Local\Temp\B0D8.tmp"92⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\B117.tmp"C:\Users\Admin\AppData\Local\Temp\B117.tmp"93⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\B155.tmp"C:\Users\Admin\AppData\Local\Temp\B155.tmp"94⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\B193.tmp"C:\Users\Admin\AppData\Local\Temp\B193.tmp"95⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\B1D2.tmp"C:\Users\Admin\AppData\Local\Temp\B1D2.tmp"96⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\B210.tmp"C:\Users\Admin\AppData\Local\Temp\B210.tmp"97⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\B24F.tmp"C:\Users\Admin\AppData\Local\Temp\B24F.tmp"98⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\B28D.tmp"C:\Users\Admin\AppData\Local\Temp\B28D.tmp"99⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\B2DB.tmp"C:\Users\Admin\AppData\Local\Temp\B2DB.tmp"100⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\B319.tmp"C:\Users\Admin\AppData\Local\Temp\B319.tmp"101⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\B367.tmp"C:\Users\Admin\AppData\Local\Temp\B367.tmp"102⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\B3A6.tmp"C:\Users\Admin\AppData\Local\Temp\B3A6.tmp"103⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\B3E4.tmp"C:\Users\Admin\AppData\Local\Temp\B3E4.tmp"104⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\B423.tmp"C:\Users\Admin\AppData\Local\Temp\B423.tmp"105⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\B461.tmp"C:\Users\Admin\AppData\Local\Temp\B461.tmp"106⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\B49F.tmp"C:\Users\Admin\AppData\Local\Temp\B49F.tmp"107⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\B4DE.tmp"C:\Users\Admin\AppData\Local\Temp\B4DE.tmp"108⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\B51C.tmp"C:\Users\Admin\AppData\Local\Temp\B51C.tmp"109⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\B55B.tmp"C:\Users\Admin\AppData\Local\Temp\B55B.tmp"110⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\B5A9.tmp"C:\Users\Admin\AppData\Local\Temp\B5A9.tmp"111⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\B5F7.tmp"C:\Users\Admin\AppData\Local\Temp\B5F7.tmp"112⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\B635.tmp"C:\Users\Admin\AppData\Local\Temp\B635.tmp"113⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\B683.tmp"C:\Users\Admin\AppData\Local\Temp\B683.tmp"114⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\B6C1.tmp"C:\Users\Admin\AppData\Local\Temp\B6C1.tmp"115⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\B700.tmp"C:\Users\Admin\AppData\Local\Temp\B700.tmp"116⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\B73E.tmp"C:\Users\Admin\AppData\Local\Temp\B73E.tmp"117⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\B77D.tmp"C:\Users\Admin\AppData\Local\Temp\B77D.tmp"118⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\B7BB.tmp"C:\Users\Admin\AppData\Local\Temp\B7BB.tmp"119⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\B7F9.tmp"C:\Users\Admin\AppData\Local\Temp\B7F9.tmp"120⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\B838.tmp"C:\Users\Admin\AppData\Local\Temp\B838.tmp"121⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\B876.tmp"C:\Users\Admin\AppData\Local\Temp\B876.tmp"122⤵PID:2208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-