Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 19:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe
-
Size
486KB
-
MD5
b3a088cd132a9352605b5b45435b81a7
-
SHA1
5b9e746e8b5cf5f1892f10559507273238cce0ab
-
SHA256
e69dbba964cf4ae90b26219aa09ed6b9d05ae5b6ed00bafafa8c626858b5b8f7
-
SHA512
6d51ebb83b79a0a289ea4e146829b1a8d855a6e85d025574f96bf02a6e35113c6110253e9ed644da3ba86f3f2d5d7df796f40fa98c21d71c8d96f74932d680f7
-
SSDEEP
6144:Borf3lPvovsgZnqG2C7mOTeiLfD7LX9egDEZJaDXWK2jjvLvE2UO7y6K7sELcA6b:oU5rCOTeiDkgDEZJ4XqzvmLAELcAWNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2824 12E5.tmp 2084 1342.tmp 2732 13A0.tmp 2936 13DE.tmp 2676 141D.tmp 2712 146B.tmp 3032 14A9.tmp 2164 14E8.tmp 2580 1536.tmp 3012 15C2.tmp 2564 1610.tmp 2876 165E.tmp 2796 169C.tmp 3020 1719.tmp 1360 1758.tmp 1004 17C5.tmp 2432 1803.tmp 1452 1842.tmp 1484 1890.tmp 1260 18DE.tmp 2168 191C.tmp 852 195A.tmp 1692 1999.tmp 2176 19D7.tmp 2200 1A16.tmp 2492 1A54.tmp 2944 1AA2.tmp 1872 1AE0.tmp 2952 1B1F.tmp 788 1B5D.tmp 868 1B9C.tmp 1404 1BDA.tmp 2940 1C18.tmp 984 1C57.tmp 1880 1C95.tmp 1608 1CD4.tmp 2104 1D22.tmp 448 1D50.tmp 2284 1D8F.tmp 2488 1DCD.tmp 1508 1E0C.tmp 816 1E4A.tmp 1796 1EB7.tmp 2160 1F15.tmp 296 1F72.tmp 1580 1FB1.tmp 2128 201E.tmp 1952 207C.tmp 3056 20BA.tmp 1928 20F8.tmp 1132 2146.tmp 2992 2185.tmp 348 21C3.tmp 2264 2202.tmp 2976 2240.tmp 1960 227E.tmp 1536 22BD.tmp 2328 22FB.tmp 2824 233A.tmp 2748 2388.tmp 2768 23C6.tmp 2732 2404.tmp 2740 2443.tmp 2668 2491.tmp -
Loads dropped DLL 64 IoCs
pid Process 2440 2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe 2824 12E5.tmp 2084 1342.tmp 2732 13A0.tmp 2936 13DE.tmp 2676 141D.tmp 2712 146B.tmp 3032 14A9.tmp 2164 14E8.tmp 2580 1536.tmp 3012 15C2.tmp 2564 1610.tmp 2876 165E.tmp 2796 169C.tmp 3020 1719.tmp 1360 1758.tmp 1004 17C5.tmp 2432 1803.tmp 1452 1842.tmp 1484 1890.tmp 1260 18DE.tmp 2168 191C.tmp 852 195A.tmp 1692 1999.tmp 2176 19D7.tmp 2200 1A16.tmp 2492 1A54.tmp 2944 1AA2.tmp 1872 1AE0.tmp 2952 1B1F.tmp 788 1B5D.tmp 868 1B9C.tmp 1404 1BDA.tmp 2940 1C18.tmp 984 1C57.tmp 1880 1C95.tmp 1608 1CD4.tmp 2104 1D22.tmp 448 1D50.tmp 2284 1D8F.tmp 2488 1DCD.tmp 1508 1E0C.tmp 816 1E4A.tmp 1796 1EB7.tmp 2160 1F15.tmp 296 1F72.tmp 1580 1FB1.tmp 2128 201E.tmp 1952 207C.tmp 3056 20BA.tmp 1928 20F8.tmp 1132 2146.tmp 2992 2185.tmp 348 21C3.tmp 2264 2202.tmp 2976 2240.tmp 1960 227E.tmp 1536 22BD.tmp 2328 22FB.tmp 2824 233A.tmp 2748 2388.tmp 2768 23C6.tmp 2732 2404.tmp 2740 2443.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2824 2440 2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe 28 PID 2440 wrote to memory of 2824 2440 2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe 28 PID 2440 wrote to memory of 2824 2440 2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe 28 PID 2440 wrote to memory of 2824 2440 2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe 28 PID 2824 wrote to memory of 2084 2824 12E5.tmp 29 PID 2824 wrote to memory of 2084 2824 12E5.tmp 29 PID 2824 wrote to memory of 2084 2824 12E5.tmp 29 PID 2824 wrote to memory of 2084 2824 12E5.tmp 29 PID 2084 wrote to memory of 2732 2084 1342.tmp 30 PID 2084 wrote to memory of 2732 2084 1342.tmp 30 PID 2084 wrote to memory of 2732 2084 1342.tmp 30 PID 2084 wrote to memory of 2732 2084 1342.tmp 30 PID 2732 wrote to memory of 2936 2732 13A0.tmp 31 PID 2732 wrote to memory of 2936 2732 13A0.tmp 31 PID 2732 wrote to memory of 2936 2732 13A0.tmp 31 PID 2732 wrote to memory of 2936 2732 13A0.tmp 31 PID 2936 wrote to memory of 2676 2936 13DE.tmp 36 PID 2936 wrote to memory of 2676 2936 13DE.tmp 36 PID 2936 wrote to memory of 2676 2936 13DE.tmp 36 PID 2936 wrote to memory of 2676 2936 13DE.tmp 36 PID 2676 wrote to memory of 2712 2676 141D.tmp 35 PID 2676 wrote to memory of 2712 2676 141D.tmp 35 PID 2676 wrote to memory of 2712 2676 141D.tmp 35 PID 2676 wrote to memory of 2712 2676 141D.tmp 35 PID 2712 wrote to memory of 3032 2712 146B.tmp 34 PID 2712 wrote to memory of 3032 2712 146B.tmp 34 PID 2712 wrote to memory of 3032 2712 146B.tmp 34 PID 2712 wrote to memory of 3032 2712 146B.tmp 34 PID 3032 wrote to memory of 2164 3032 14A9.tmp 32 PID 3032 wrote to memory of 2164 3032 14A9.tmp 32 PID 3032 wrote to memory of 2164 3032 14A9.tmp 32 PID 3032 wrote to memory of 2164 3032 14A9.tmp 32 PID 2164 wrote to memory of 2580 2164 14E8.tmp 33 PID 2164 wrote to memory of 2580 2164 14E8.tmp 33 PID 2164 wrote to memory of 2580 2164 14E8.tmp 33 PID 2164 wrote to memory of 2580 2164 14E8.tmp 33 PID 2580 wrote to memory of 3012 2580 1536.tmp 68 PID 2580 wrote to memory of 3012 2580 1536.tmp 68 PID 2580 wrote to memory of 3012 2580 1536.tmp 68 PID 2580 wrote to memory of 3012 2580 1536.tmp 68 PID 3012 wrote to memory of 2564 3012 15C2.tmp 67 PID 3012 wrote to memory of 2564 3012 15C2.tmp 67 PID 3012 wrote to memory of 2564 3012 15C2.tmp 67 PID 3012 wrote to memory of 2564 3012 15C2.tmp 67 PID 2564 wrote to memory of 2876 2564 1610.tmp 66 PID 2564 wrote to memory of 2876 2564 1610.tmp 66 PID 2564 wrote to memory of 2876 2564 1610.tmp 66 PID 2564 wrote to memory of 2876 2564 1610.tmp 66 PID 2876 wrote to memory of 2796 2876 165E.tmp 65 PID 2876 wrote to memory of 2796 2876 165E.tmp 65 PID 2876 wrote to memory of 2796 2876 165E.tmp 65 PID 2876 wrote to memory of 2796 2876 165E.tmp 65 PID 2796 wrote to memory of 3020 2796 169C.tmp 64 PID 2796 wrote to memory of 3020 2796 169C.tmp 64 PID 2796 wrote to memory of 3020 2796 169C.tmp 64 PID 2796 wrote to memory of 3020 2796 169C.tmp 64 PID 3020 wrote to memory of 1360 3020 1719.tmp 63 PID 3020 wrote to memory of 1360 3020 1719.tmp 63 PID 3020 wrote to memory of 1360 3020 1719.tmp 63 PID 3020 wrote to memory of 1360 3020 1719.tmp 63 PID 1360 wrote to memory of 1004 1360 1758.tmp 62 PID 1360 wrote to memory of 1004 1360 1758.tmp 62 PID 1360 wrote to memory of 1004 1360 1758.tmp 62 PID 1360 wrote to memory of 1004 1360 1758.tmp 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_b3a088cd132a9352605b5b45435b81a7_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\12E5.tmp"C:\Users\Admin\AppData\Local\Temp\12E5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\1342.tmp"C:\Users\Admin\AppData\Local\Temp\1342.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\13A0.tmp"C:\Users\Admin\AppData\Local\Temp\13A0.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\13DE.tmp"C:\Users\Admin\AppData\Local\Temp\13DE.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14E8.tmp"C:\Users\Admin\AppData\Local\Temp\14E8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\1536.tmp"C:\Users\Admin\AppData\Local\Temp\1536.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\15C2.tmp"C:\Users\Admin\AppData\Local\Temp\15C2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\14A9.tmp"C:\Users\Admin\AppData\Local\Temp\14A9.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032
-
C:\Users\Admin\AppData\Local\Temp\146B.tmp"C:\Users\Admin\AppData\Local\Temp\146B.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712
-
C:\Users\Admin\AppData\Local\Temp\1890.tmp"C:\Users\Admin\AppData\Local\Temp\1890.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\18DE.tmp"C:\Users\Admin\AppData\Local\Temp\18DE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\1999.tmp"C:\Users\Admin\AppData\Local\Temp\1999.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\19D7.tmp"C:\Users\Admin\AppData\Local\Temp\19D7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\1A16.tmp"C:\Users\Admin\AppData\Local\Temp\1A16.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\1A54.tmp"C:\Users\Admin\AppData\Local\Temp\1A54.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\195A.tmp"C:\Users\Admin\AppData\Local\Temp\195A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:852
-
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\1C18.tmp"C:\Users\Admin\AppData\Local\Temp\1C18.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\1C57.tmp"C:\Users\Admin\AppData\Local\Temp\1C57.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:984 -
C:\Users\Admin\AppData\Local\Temp\1C95.tmp"C:\Users\Admin\AppData\Local\Temp\1C95.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"C:\Users\Admin\AppData\Local\Temp\1CD4.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1D22.tmp"C:\Users\Admin\AppData\Local\Temp\1D22.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\1D50.tmp"C:\Users\Admin\AppData\Local\Temp\1D50.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448 -
C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\191C.tmp"C:\Users\Admin\AppData\Local\Temp\191C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168
-
C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\1F15.tmp"C:\Users\Admin\AppData\Local\Temp\1F15.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:296 -
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\201E.tmp"C:\Users\Admin\AppData\Local\Temp\201E.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\207C.tmp"C:\Users\Admin\AppData\Local\Temp\207C.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\20F8.tmp"C:\Users\Admin\AppData\Local\Temp\20F8.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\2146.tmp"C:\Users\Admin\AppData\Local\Temp\2146.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:348 -
C:\Users\Admin\AppData\Local\Temp\2202.tmp"C:\Users\Admin\AppData\Local\Temp\2202.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\22BD.tmp"C:\Users\Admin\AppData\Local\Temp\22BD.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\233A.tmp"C:\Users\Admin\AppData\Local\Temp\233A.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\23C6.tmp"C:\Users\Admin\AppData\Local\Temp\23C6.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\2404.tmp"C:\Users\Admin\AppData\Local\Temp\2404.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\2443.tmp"C:\Users\Admin\AppData\Local\Temp\2443.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\2491.tmp"C:\Users\Admin\AppData\Local\Temp\2491.tmp"24⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\24CF.tmp"C:\Users\Admin\AppData\Local\Temp\24CF.tmp"25⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\250E.tmp"C:\Users\Admin\AppData\Local\Temp\250E.tmp"26⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"27⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"28⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"29⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"30⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"31⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"32⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"33⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"34⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"35⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"36⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"37⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"38⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\2858.tmp"C:\Users\Admin\AppData\Local\Temp\2858.tmp"39⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\28A6.tmp"C:\Users\Admin\AppData\Local\Temp\28A6.tmp"40⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\28E4.tmp"C:\Users\Admin\AppData\Local\Temp\28E4.tmp"41⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"42⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"43⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"44⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\29FD.tmp"C:\Users\Admin\AppData\Local\Temp\29FD.tmp"45⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"46⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"47⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"48⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"49⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2B35.tmp"C:\Users\Admin\AppData\Local\Temp\2B35.tmp"50⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2B74.tmp"C:\Users\Admin\AppData\Local\Temp\2B74.tmp"51⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2BB2.tmp"C:\Users\Admin\AppData\Local\Temp\2BB2.tmp"52⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"53⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"54⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"55⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"56⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2CEA.tmp"C:\Users\Admin\AppData\Local\Temp\2CEA.tmp"57⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\2D38.tmp"C:\Users\Admin\AppData\Local\Temp\2D38.tmp"58⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2D76.tmp"C:\Users\Admin\AppData\Local\Temp\2D76.tmp"59⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"60⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"61⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"62⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\2E70.tmp"C:\Users\Admin\AppData\Local\Temp\2E70.tmp"63⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"64⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2EED.tmp"C:\Users\Admin\AppData\Local\Temp\2EED.tmp"65⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"66⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"67⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"68⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"69⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"70⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"71⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"72⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\30F0.tmp"C:\Users\Admin\AppData\Local\Temp\30F0.tmp"73⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\312E.tmp"C:\Users\Admin\AppData\Local\Temp\312E.tmp"74⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\316C.tmp"C:\Users\Admin\AppData\Local\Temp\316C.tmp"75⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\31AB.tmp"C:\Users\Admin\AppData\Local\Temp\31AB.tmp"76⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"77⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3228.tmp"C:\Users\Admin\AppData\Local\Temp\3228.tmp"78⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\3266.tmp"C:\Users\Admin\AppData\Local\Temp\3266.tmp"79⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"80⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\32E3.tmp"C:\Users\Admin\AppData\Local\Temp\32E3.tmp"81⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"82⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\3360.tmp"C:\Users\Admin\AppData\Local\Temp\3360.tmp"83⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"84⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"85⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"86⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"87⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"88⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"89⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3514.tmp"C:\Users\Admin\AppData\Local\Temp\3514.tmp"90⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"91⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"92⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"93⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\360E.tmp"C:\Users\Admin\AppData\Local\Temp\360E.tmp"94⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"95⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"96⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"97⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"98⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"99⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"100⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"101⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"102⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"103⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"104⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"105⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"106⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\3958.tmp"C:\Users\Admin\AppData\Local\Temp\3958.tmp"107⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\3997.tmp"C:\Users\Admin\AppData\Local\Temp\3997.tmp"108⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"109⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3A14.tmp"C:\Users\Admin\AppData\Local\Temp\3A14.tmp"110⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\3A52.tmp"C:\Users\Admin\AppData\Local\Temp\3A52.tmp"111⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3A90.tmp"C:\Users\Admin\AppData\Local\Temp\3A90.tmp"112⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"113⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"114⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"115⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"116⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\3BC8.tmp"C:\Users\Admin\AppData\Local\Temp\3BC8.tmp"117⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3C07.tmp"C:\Users\Admin\AppData\Local\Temp\3C07.tmp"118⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3C45.tmp"C:\Users\Admin\AppData\Local\Temp\3C45.tmp"119⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3C84.tmp"C:\Users\Admin\AppData\Local\Temp\3C84.tmp"120⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"121⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\3D00.tmp"C:\Users\Admin\AppData\Local\Temp\3D00.tmp"122⤵PID:2212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-