Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 11:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe
-
Size
486KB
-
MD5
c12823c110ab549749d2f6f48a258e79
-
SHA1
0e948e4dca734266ba34431acf09bad990dba72c
-
SHA256
142ca3b9228db8072bdf874f965070d61c64f3add578adf8d2bae1d622208310
-
SHA512
5c44fd67ff993fe35b6dc9f0bdf6e14d24642f48751b06f6b5058e4406ede95d00f65b0d85b1b1c9a5e49d32918496c992fd29d31d0000d70f6c9ac59c5f3d0d
-
SSDEEP
12288:/U5rCOTeiDqyooA+bViiU5wROXmRjx0NZ:/UQOJDljbVi/DXSjx0N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2916 C12.tmp 2384 C7F.tmp 3052 CBD.tmp 1728 CFC.tmp 2596 D4A.tmp 2680 D98.tmp 2580 DD6.tmp 2744 E24.tmp 2808 E62.tmp 1776 EC0.tmp 2468 EFE.tmp 2624 F4C.tmp 3012 F8B.tmp 2964 FC9.tmp 2556 1017.tmp 320 1056.tmp 2444 1094.tmp 2340 10D2.tmp 1592 1111.tmp 2792 114F.tmp 1788 118E.tmp 1264 11DC.tmp 1372 121A.tmp 2068 1268.tmp 2940 12A6.tmp 1900 12F4.tmp 1768 1333.tmp 2064 1362.tmp 856 13A0.tmp 688 13DE.tmp 1056 141D.tmp 600 145B.tmp 1656 149A.tmp 1500 14D8.tmp 1392 1516.tmp 2428 1555.tmp 960 1593.tmp 452 15D2.tmp 2108 1610.tmp 2884 164E.tmp 2148 168D.tmp 1756 16CB.tmp 1672 170A.tmp 776 1748.tmp 1620 1786.tmp 296 17C5.tmp 1028 1803.tmp 2192 1832.tmp 280 1870.tmp 2900 18AF.tmp 3056 18ED.tmp 1824 192C.tmp 892 196A.tmp 2388 19A8.tmp 2912 19E7.tmp 2212 1A25.tmp 2936 1A54.tmp 2860 1A92.tmp 1300 1AD1.tmp 3016 1B0F.tmp 1064 1B4E.tmp 1728 CFC.tmp 2660 1BCA.tmp 1664 1C09.tmp -
Loads dropped DLL 64 IoCs
pid Process 3020 2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe 2916 C12.tmp 2384 C7F.tmp 3052 CBD.tmp 1728 CFC.tmp 2596 D4A.tmp 2680 D98.tmp 2580 DD6.tmp 2744 E24.tmp 2808 E62.tmp 1776 EC0.tmp 2468 EFE.tmp 2624 F4C.tmp 3012 F8B.tmp 2964 FC9.tmp 2556 1017.tmp 320 1056.tmp 2444 1094.tmp 2340 10D2.tmp 1592 1111.tmp 2792 114F.tmp 1788 118E.tmp 1264 11DC.tmp 1372 121A.tmp 2068 1268.tmp 2940 12A6.tmp 1900 12F4.tmp 1768 1333.tmp 2064 1362.tmp 856 13A0.tmp 688 13DE.tmp 1056 141D.tmp 600 145B.tmp 1656 149A.tmp 1500 14D8.tmp 1392 1516.tmp 2428 1555.tmp 960 1593.tmp 452 15D2.tmp 2108 1610.tmp 2884 164E.tmp 2148 168D.tmp 1756 16CB.tmp 1672 170A.tmp 776 1748.tmp 1620 1786.tmp 296 17C5.tmp 1028 1803.tmp 2192 1832.tmp 280 1870.tmp 2900 18AF.tmp 3056 18ED.tmp 1824 192C.tmp 892 196A.tmp 2388 19A8.tmp 2912 19E7.tmp 2212 1A25.tmp 2936 1A54.tmp 2860 1A92.tmp 1300 1AD1.tmp 3016 1B0F.tmp 1064 1B4E.tmp 1728 CFC.tmp 2660 1BCA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2916 3020 2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe 28 PID 3020 wrote to memory of 2916 3020 2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe 28 PID 3020 wrote to memory of 2916 3020 2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe 28 PID 3020 wrote to memory of 2916 3020 2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe 28 PID 2916 wrote to memory of 2384 2916 C12.tmp 29 PID 2916 wrote to memory of 2384 2916 C12.tmp 29 PID 2916 wrote to memory of 2384 2916 C12.tmp 29 PID 2916 wrote to memory of 2384 2916 C12.tmp 29 PID 2384 wrote to memory of 3052 2384 C7F.tmp 109 PID 2384 wrote to memory of 3052 2384 C7F.tmp 109 PID 2384 wrote to memory of 3052 2384 C7F.tmp 109 PID 2384 wrote to memory of 3052 2384 C7F.tmp 109 PID 3052 wrote to memory of 1728 3052 CBD.tmp 108 PID 3052 wrote to memory of 1728 3052 CBD.tmp 108 PID 3052 wrote to memory of 1728 3052 CBD.tmp 108 PID 3052 wrote to memory of 1728 3052 CBD.tmp 108 PID 1728 wrote to memory of 2596 1728 CFC.tmp 107 PID 1728 wrote to memory of 2596 1728 CFC.tmp 107 PID 1728 wrote to memory of 2596 1728 CFC.tmp 107 PID 1728 wrote to memory of 2596 1728 CFC.tmp 107 PID 2596 wrote to memory of 2680 2596 D4A.tmp 106 PID 2596 wrote to memory of 2680 2596 D4A.tmp 106 PID 2596 wrote to memory of 2680 2596 D4A.tmp 106 PID 2596 wrote to memory of 2680 2596 D4A.tmp 106 PID 2680 wrote to memory of 2580 2680 D98.tmp 105 PID 2680 wrote to memory of 2580 2680 D98.tmp 105 PID 2680 wrote to memory of 2580 2680 D98.tmp 105 PID 2680 wrote to memory of 2580 2680 D98.tmp 105 PID 2580 wrote to memory of 2744 2580 DD6.tmp 104 PID 2580 wrote to memory of 2744 2580 DD6.tmp 104 PID 2580 wrote to memory of 2744 2580 DD6.tmp 104 PID 2580 wrote to memory of 2744 2580 DD6.tmp 104 PID 2744 wrote to memory of 2808 2744 E24.tmp 103 PID 2744 wrote to memory of 2808 2744 E24.tmp 103 PID 2744 wrote to memory of 2808 2744 E24.tmp 103 PID 2744 wrote to memory of 2808 2744 E24.tmp 103 PID 2808 wrote to memory of 1776 2808 E62.tmp 102 PID 2808 wrote to memory of 1776 2808 E62.tmp 102 PID 2808 wrote to memory of 1776 2808 E62.tmp 102 PID 2808 wrote to memory of 1776 2808 E62.tmp 102 PID 1776 wrote to memory of 2468 1776 EC0.tmp 101 PID 1776 wrote to memory of 2468 1776 EC0.tmp 101 PID 1776 wrote to memory of 2468 1776 EC0.tmp 101 PID 1776 wrote to memory of 2468 1776 EC0.tmp 101 PID 2468 wrote to memory of 2624 2468 EFE.tmp 100 PID 2468 wrote to memory of 2624 2468 EFE.tmp 100 PID 2468 wrote to memory of 2624 2468 EFE.tmp 100 PID 2468 wrote to memory of 2624 2468 EFE.tmp 100 PID 2624 wrote to memory of 3012 2624 F4C.tmp 99 PID 2624 wrote to memory of 3012 2624 F4C.tmp 99 PID 2624 wrote to memory of 3012 2624 F4C.tmp 99 PID 2624 wrote to memory of 3012 2624 F4C.tmp 99 PID 3012 wrote to memory of 2964 3012 F8B.tmp 98 PID 3012 wrote to memory of 2964 3012 F8B.tmp 98 PID 3012 wrote to memory of 2964 3012 F8B.tmp 98 PID 3012 wrote to memory of 2964 3012 F8B.tmp 98 PID 2964 wrote to memory of 2556 2964 FC9.tmp 97 PID 2964 wrote to memory of 2556 2964 FC9.tmp 97 PID 2964 wrote to memory of 2556 2964 FC9.tmp 97 PID 2964 wrote to memory of 2556 2964 FC9.tmp 97 PID 2556 wrote to memory of 320 2556 1017.tmp 96 PID 2556 wrote to memory of 320 2556 1017.tmp 96 PID 2556 wrote to memory of 320 2556 1017.tmp 96 PID 2556 wrote to memory of 320 2556 1017.tmp 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_c12823c110ab549749d2f6f48a258e79_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\C12.tmp"C:\Users\Admin\AppData\Local\Temp\C12.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\C7F.tmp"C:\Users\Admin\AppData\Local\Temp\C7F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1111.tmp"C:\Users\Admin\AppData\Local\Temp\1111.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\114F.tmp"C:\Users\Admin\AppData\Local\Temp\114F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\121A.tmp"C:\Users\Admin\AppData\Local\Temp\121A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\1268.tmp"C:\Users\Admin\AppData\Local\Temp\1268.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\12A6.tmp"C:\Users\Admin\AppData\Local\Temp\12A6.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1362.tmp"C:\Users\Admin\AppData\Local\Temp\1362.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\13A0.tmp"C:\Users\Admin\AppData\Local\Temp\13A0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\13DE.tmp"C:\Users\Admin\AppData\Local\Temp\13DE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:688 -
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600 -
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\1516.tmp"C:\Users\Admin\AppData\Local\Temp\1516.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Users\Admin\AppData\Local\Temp\15D2.tmp"C:\Users\Admin\AppData\Local\Temp\15D2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:452
-
-
-
C:\Users\Admin\AppData\Local\Temp\164E.tmp"C:\Users\Admin\AppData\Local\Temp\164E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\168D.tmp"C:\Users\Admin\AppData\Local\Temp\168D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\16CB.tmp"C:\Users\Admin\AppData\Local\Temp\16CB.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\170A.tmp"C:\Users\Admin\AppData\Local\Temp\170A.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1610.tmp"C:\Users\Admin\AppData\Local\Temp\1610.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108
-
C:\Users\Admin\AppData\Local\Temp\1786.tmp"C:\Users\Admin\AppData\Local\Temp\1786.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\17C5.tmp"C:\Users\Admin\AppData\Local\Temp\17C5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\1832.tmp"C:\Users\Admin\AppData\Local\Temp\1832.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\1870.tmp"C:\Users\Admin\AppData\Local\Temp\1870.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:280
-
-
C:\Users\Admin\AppData\Local\Temp\18ED.tmp"C:\Users\Admin\AppData\Local\Temp\18ED.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\196A.tmp"C:\Users\Admin\AppData\Local\Temp\196A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Users\Admin\AppData\Local\Temp\19A8.tmp"C:\Users\Admin\AppData\Local\Temp\19A8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\18AF.tmp"C:\Users\Admin\AppData\Local\Temp\18AF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900
-
C:\Users\Admin\AppData\Local\Temp\1803.tmp"C:\Users\Admin\AppData\Local\Temp\1803.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028
-
C:\Users\Admin\AppData\Local\Temp\1A54.tmp"C:\Users\Admin\AppData\Local\Temp\1A54.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\1A92.tmp"C:\Users\Admin\AppData\Local\Temp\1A92.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1B8C.tmp"C:\Users\Admin\AppData\Local\Temp\1B8C.tmp"1⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\D4A.tmp"C:\Users\Admin\AppData\Local\Temp\D4A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\1C47.tmp"C:\Users\Admin\AppData\Local\Temp\1C47.tmp"1⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\1C76.tmp"C:\Users\Admin\AppData\Local\Temp\1C76.tmp"2⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"1⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"2⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\1D70.tmp"C:\Users\Admin\AppData\Local\Temp\1D70.tmp"3⤵PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"1⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"2⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\F4C.tmp"C:\Users\Admin\AppData\Local\Temp\F4C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\1E69.tmp"C:\Users\Admin\AppData\Local\Temp\1E69.tmp"1⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\1F15.tmp"C:\Users\Admin\AppData\Local\Temp\1F15.tmp"1⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\1F44.tmp"C:\Users\Admin\AppData\Local\Temp\1F44.tmp"2⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\1F82.tmp"C:\Users\Admin\AppData\Local\Temp\1F82.tmp"1⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"2⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"1⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\203D.tmp"C:\Users\Admin\AppData\Local\Temp\203D.tmp"2⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\207C.tmp"C:\Users\Admin\AppData\Local\Temp\207C.tmp"3⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"4⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"5⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2166.tmp"C:\Users\Admin\AppData\Local\Temp\2166.tmp"6⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\21A4.tmp"C:\Users\Admin\AppData\Local\Temp\21A4.tmp"7⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\21E2.tmp"C:\Users\Admin\AppData\Local\Temp\21E2.tmp"8⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"9⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"10⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\22CC.tmp"C:\Users\Admin\AppData\Local\Temp\22CC.tmp"11⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\232A.tmp"C:\Users\Admin\AppData\Local\Temp\232A.tmp"12⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"13⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\23C6.tmp"C:\Users\Admin\AppData\Local\Temp\23C6.tmp"14⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\2414.tmp"C:\Users\Admin\AppData\Local\Temp\2414.tmp"15⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\2462.tmp"C:\Users\Admin\AppData\Local\Temp\2462.tmp"16⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"17⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\251D.tmp"C:\Users\Admin\AppData\Local\Temp\251D.tmp"18⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"19⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\25AA.tmp"C:\Users\Admin\AppData\Local\Temp\25AA.tmp"20⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"21⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\2626.tmp"C:\Users\Admin\AppData\Local\Temp\2626.tmp"22⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"23⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"24⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\26E2.tmp"C:\Users\Admin\AppData\Local\Temp\26E2.tmp"25⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\2720.tmp"C:\Users\Admin\AppData\Local\Temp\2720.tmp"26⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\275E.tmp"C:\Users\Admin\AppData\Local\Temp\275E.tmp"27⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\27AC.tmp"C:\Users\Admin\AppData\Local\Temp\27AC.tmp"28⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"29⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2829.tmp"C:\Users\Admin\AppData\Local\Temp\2829.tmp"30⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2877.tmp"C:\Users\Admin\AppData\Local\Temp\2877.tmp"31⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"32⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"33⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"34⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"35⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"36⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"37⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"38⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"39⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"40⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"41⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\2B26.tmp"C:\Users\Admin\AppData\Local\Temp\2B26.tmp"42⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2B64.tmp"C:\Users\Admin\AppData\Local\Temp\2B64.tmp"43⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"44⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"45⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"46⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"47⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"48⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"49⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\2D19.tmp"C:\Users\Admin\AppData\Local\Temp\2D19.tmp"50⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2D57.tmp"C:\Users\Admin\AppData\Local\Temp\2D57.tmp"51⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2D96.tmp"C:\Users\Admin\AppData\Local\Temp\2D96.tmp"52⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"53⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2E12.tmp"C:\Users\Admin\AppData\Local\Temp\2E12.tmp"54⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2E51.tmp"C:\Users\Admin\AppData\Local\Temp\2E51.tmp"55⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"56⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"57⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"58⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"59⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2F89.tmp"C:\Users\Admin\AppData\Local\Temp\2F89.tmp"60⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"61⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\3006.tmp"C:\Users\Admin\AppData\Local\Temp\3006.tmp"62⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3044.tmp"C:\Users\Admin\AppData\Local\Temp\3044.tmp"63⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\3082.tmp"C:\Users\Admin\AppData\Local\Temp\3082.tmp"64⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\30C1.tmp"C:\Users\Admin\AppData\Local\Temp\30C1.tmp"65⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"66⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"67⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\318C.tmp"C:\Users\Admin\AppData\Local\Temp\318C.tmp"68⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\31CA.tmp"C:\Users\Admin\AppData\Local\Temp\31CA.tmp"69⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"70⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"71⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"72⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"73⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\3312.tmp"C:\Users\Admin\AppData\Local\Temp\3312.tmp"74⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"75⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"76⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"77⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"78⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"79⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"80⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\34C6.tmp"C:\Users\Admin\AppData\Local\Temp\34C6.tmp"81⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"82⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\3543.tmp"C:\Users\Admin\AppData\Local\Temp\3543.tmp"83⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3572.tmp"C:\Users\Admin\AppData\Local\Temp\3572.tmp"84⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\35B0.tmp"C:\Users\Admin\AppData\Local\Temp\35B0.tmp"85⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\35EF.tmp"C:\Users\Admin\AppData\Local\Temp\35EF.tmp"86⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\362D.tmp"C:\Users\Admin\AppData\Local\Temp\362D.tmp"87⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\366C.tmp"C:\Users\Admin\AppData\Local\Temp\366C.tmp"88⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\36AA.tmp"C:\Users\Admin\AppData\Local\Temp\36AA.tmp"89⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\36E8.tmp"C:\Users\Admin\AppData\Local\Temp\36E8.tmp"90⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\3727.tmp"C:\Users\Admin\AppData\Local\Temp\3727.tmp"91⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3765.tmp"C:\Users\Admin\AppData\Local\Temp\3765.tmp"92⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\37A4.tmp"C:\Users\Admin\AppData\Local\Temp\37A4.tmp"93⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\37E2.tmp"C:\Users\Admin\AppData\Local\Temp\37E2.tmp"94⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\3820.tmp"C:\Users\Admin\AppData\Local\Temp\3820.tmp"95⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\385F.tmp"C:\Users\Admin\AppData\Local\Temp\385F.tmp"96⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\389D.tmp"C:\Users\Admin\AppData\Local\Temp\389D.tmp"97⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\38DC.tmp"C:\Users\Admin\AppData\Local\Temp\38DC.tmp"98⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"99⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\3958.tmp"C:\Users\Admin\AppData\Local\Temp\3958.tmp"100⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\3997.tmp"C:\Users\Admin\AppData\Local\Temp\3997.tmp"101⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"102⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3A14.tmp"C:\Users\Admin\AppData\Local\Temp\3A14.tmp"103⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\3A52.tmp"C:\Users\Admin\AppData\Local\Temp\3A52.tmp"104⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\3A90.tmp"C:\Users\Admin\AppData\Local\Temp\3A90.tmp"105⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"106⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"107⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"108⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"109⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3BC8.tmp"C:\Users\Admin\AppData\Local\Temp\3BC8.tmp"110⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\3C07.tmp"C:\Users\Admin\AppData\Local\Temp\3C07.tmp"111⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3C45.tmp"C:\Users\Admin\AppData\Local\Temp\3C45.tmp"112⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\3C84.tmp"C:\Users\Admin\AppData\Local\Temp\3C84.tmp"113⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"114⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3D00.tmp"C:\Users\Admin\AppData\Local\Temp\3D00.tmp"115⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"116⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"117⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"118⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"119⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\3E38.tmp"C:\Users\Admin\AppData\Local\Temp\3E38.tmp"120⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\3E77.tmp"C:\Users\Admin\AppData\Local\Temp\3E77.tmp"121⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\3EB5.tmp"C:\Users\Admin\AppData\Local\Temp\3EB5.tmp"122⤵PID:2512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-