Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 03:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe
-
Size
486KB
-
MD5
afff63868f8277a8986ea8af5a0f570f
-
SHA1
82896d31c39aed63a36cee547390d830ca85f54c
-
SHA256
45a1df5b98d26b14686e41a5af2f20354629faf8212eaf8a303d373b78f3cbe5
-
SHA512
4ed6bc3ad21329a21d637ac7edba9ef974ea00dc7d201ec50695c2cb7277ae456d808524c93d34d1963a9550fa90eeb3a55e94622451715edd154967e3eba9b5
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7BwPn4p2MBfoeP5vWY0VpLv2VfYSU/xQvnTsz:/U5rCOTeiD2nq3BvWNVpSVfY5QwNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 804 FA94.tmp 1844 FAE2.tmp 2348 FB30.tmp 1804 FB6F.tmp 2648 FBBD.tmp 2756 FBFB.tmp 2816 FC3A.tmp 2780 FC78.tmp 2520 FCB6.tmp 2752 FD04.tmp 2536 FD43.tmp 2552 FDA0.tmp 1704 FDFE.tmp 1636 FE4C.tmp 2688 FE9A.tmp 2556 FED8.tmp 2800 FF36.tmp 1948 FF94.tmp 2840 FFF1.tmp 2912 30.tmp 1560 7E.tmp 2936 CC.tmp 1292 10A.tmp 1136 158.tmp 1132 10A4.tmp 2076 1E4.tmp 2368 223.tmp 2256 261.tmp 1272 2A0.tmp 392 2DE.tmp 488 31C.tmp 764 35B.tmp 584 399.tmp 568 3D8.tmp 1956 416.tmp 1716 454.tmp 1780 493.tmp 1268 4D1.tmp 2104 510.tmp 1612 54E.tmp 1548 58C.tmp 1228 5BB.tmp 548 5FA.tmp 2416 638.tmp 624 686.tmp 960 6C4.tmp 3008 703.tmp 2288 741.tmp 2976 780.tmp 2032 7BE.tmp 2096 7FC.tmp 1756 82B.tmp 3004 86A.tmp 1524 898.tmp 1596 8D7.tmp 2460 915.tmp 1680 954.tmp 1736 992.tmp 1836 9E0.tmp 2600 A1E.tmp 2292 A5D.tmp 2744 A8C.tmp 2500 ABA.tmp 2776 AF9.tmp -
Loads dropped DLL 64 IoCs
pid Process 2264 2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe 804 FA94.tmp 1844 FAE2.tmp 2348 FB30.tmp 1804 FB6F.tmp 2648 FBBD.tmp 2756 FBFB.tmp 2816 FC3A.tmp 2780 FC78.tmp 2520 FCB6.tmp 2752 FD04.tmp 2536 FD43.tmp 2552 FDA0.tmp 1704 FDFE.tmp 1636 FE4C.tmp 2688 FE9A.tmp 2556 FED8.tmp 2800 FF36.tmp 1948 FF94.tmp 2840 FFF1.tmp 2912 30.tmp 1560 7E.tmp 2936 CC.tmp 1292 10A.tmp 1136 158.tmp 1132 10A4.tmp 2076 1E4.tmp 2368 223.tmp 2256 261.tmp 1272 2A0.tmp 392 2DE.tmp 488 31C.tmp 764 35B.tmp 584 399.tmp 568 3D8.tmp 1956 416.tmp 1716 454.tmp 1780 493.tmp 1268 4D1.tmp 2104 510.tmp 1612 54E.tmp 1548 58C.tmp 1228 5BB.tmp 548 5FA.tmp 2416 638.tmp 624 686.tmp 960 6C4.tmp 3008 703.tmp 2288 741.tmp 2976 780.tmp 2032 7BE.tmp 2096 7FC.tmp 1756 82B.tmp 3004 86A.tmp 1524 898.tmp 1596 8D7.tmp 2460 915.tmp 1680 954.tmp 1736 992.tmp 1836 9E0.tmp 2600 A1E.tmp 2292 A5D.tmp 2744 A8C.tmp 2500 ABA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 804 2264 2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe 28 PID 2264 wrote to memory of 804 2264 2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe 28 PID 2264 wrote to memory of 804 2264 2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe 28 PID 2264 wrote to memory of 804 2264 2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe 28 PID 804 wrote to memory of 1844 804 FA94.tmp 29 PID 804 wrote to memory of 1844 804 FA94.tmp 29 PID 804 wrote to memory of 1844 804 FA94.tmp 29 PID 804 wrote to memory of 1844 804 FA94.tmp 29 PID 1844 wrote to memory of 2348 1844 FAE2.tmp 30 PID 1844 wrote to memory of 2348 1844 FAE2.tmp 30 PID 1844 wrote to memory of 2348 1844 FAE2.tmp 30 PID 1844 wrote to memory of 2348 1844 FAE2.tmp 30 PID 2348 wrote to memory of 1804 2348 FB30.tmp 121 PID 2348 wrote to memory of 1804 2348 FB30.tmp 121 PID 2348 wrote to memory of 1804 2348 FB30.tmp 121 PID 2348 wrote to memory of 1804 2348 FB30.tmp 121 PID 1804 wrote to memory of 2648 1804 FB6F.tmp 120 PID 1804 wrote to memory of 2648 1804 FB6F.tmp 120 PID 1804 wrote to memory of 2648 1804 FB6F.tmp 120 PID 1804 wrote to memory of 2648 1804 FB6F.tmp 120 PID 2648 wrote to memory of 2756 2648 FBBD.tmp 119 PID 2648 wrote to memory of 2756 2648 FBBD.tmp 119 PID 2648 wrote to memory of 2756 2648 FBBD.tmp 119 PID 2648 wrote to memory of 2756 2648 FBBD.tmp 119 PID 2756 wrote to memory of 2816 2756 FBFB.tmp 118 PID 2756 wrote to memory of 2816 2756 FBFB.tmp 118 PID 2756 wrote to memory of 2816 2756 FBFB.tmp 118 PID 2756 wrote to memory of 2816 2756 FBFB.tmp 118 PID 2816 wrote to memory of 2780 2816 FC3A.tmp 31 PID 2816 wrote to memory of 2780 2816 FC3A.tmp 31 PID 2816 wrote to memory of 2780 2816 FC3A.tmp 31 PID 2816 wrote to memory of 2780 2816 FC3A.tmp 31 PID 2780 wrote to memory of 2520 2780 FC78.tmp 117 PID 2780 wrote to memory of 2520 2780 FC78.tmp 117 PID 2780 wrote to memory of 2520 2780 FC78.tmp 117 PID 2780 wrote to memory of 2520 2780 FC78.tmp 117 PID 2520 wrote to memory of 2752 2520 FCB6.tmp 116 PID 2520 wrote to memory of 2752 2520 FCB6.tmp 116 PID 2520 wrote to memory of 2752 2520 FCB6.tmp 116 PID 2520 wrote to memory of 2752 2520 FCB6.tmp 116 PID 2752 wrote to memory of 2536 2752 FD04.tmp 115 PID 2752 wrote to memory of 2536 2752 FD04.tmp 115 PID 2752 wrote to memory of 2536 2752 FD04.tmp 115 PID 2752 wrote to memory of 2536 2752 FD04.tmp 115 PID 2536 wrote to memory of 2552 2536 FD43.tmp 114 PID 2536 wrote to memory of 2552 2536 FD43.tmp 114 PID 2536 wrote to memory of 2552 2536 FD43.tmp 114 PID 2536 wrote to memory of 2552 2536 FD43.tmp 114 PID 2552 wrote to memory of 1704 2552 FDA0.tmp 113 PID 2552 wrote to memory of 1704 2552 FDA0.tmp 113 PID 2552 wrote to memory of 1704 2552 FDA0.tmp 113 PID 2552 wrote to memory of 1704 2552 FDA0.tmp 113 PID 1704 wrote to memory of 1636 1704 FDFE.tmp 112 PID 1704 wrote to memory of 1636 1704 FDFE.tmp 112 PID 1704 wrote to memory of 1636 1704 FDFE.tmp 112 PID 1704 wrote to memory of 1636 1704 FDFE.tmp 112 PID 1636 wrote to memory of 2688 1636 FE4C.tmp 111 PID 1636 wrote to memory of 2688 1636 FE4C.tmp 111 PID 1636 wrote to memory of 2688 1636 FE4C.tmp 111 PID 1636 wrote to memory of 2688 1636 FE4C.tmp 111 PID 2688 wrote to memory of 2556 2688 FE9A.tmp 110 PID 2688 wrote to memory of 2556 2688 FE9A.tmp 110 PID 2688 wrote to memory of 2556 2688 FE9A.tmp 110 PID 2688 wrote to memory of 2556 2688 FE9A.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_afff63868f8277a8986ea8af5a0f570f_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\FA94.tmp"C:\Users\Admin\AppData\Local\Temp\FA94.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\FAE2.tmp"C:\Users\Admin\AppData\Local\Temp\FAE2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\FB30.tmp"C:\Users\Admin\AppData\Local\Temp\FB30.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\FB6F.tmp"C:\Users\Admin\AppData\Local\Temp\FB6F.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FC78.tmp"C:\Users\Admin\AppData\Local\Temp\FC78.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\FCB6.tmp"C:\Users\Admin\AppData\Local\Temp\FCB6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\10A.tmp"C:\Users\Admin\AppData\Local\Temp\10A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\158.tmp"C:\Users\Admin\AppData\Local\Temp\158.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\196.tmp"C:\Users\Admin\AppData\Local\Temp\196.tmp"1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\261.tmp"C:\Users\Admin\AppData\Local\Temp\261.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\2A0.tmp"C:\Users\Admin\AppData\Local\Temp\2A0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\2DE.tmp"C:\Users\Admin\AppData\Local\Temp\2DE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:392 -
C:\Users\Admin\AppData\Local\Temp\31C.tmp"C:\Users\Admin\AppData\Local\Temp\31C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:488
-
-
C:\Users\Admin\AppData\Local\Temp\35B.tmp"C:\Users\Admin\AppData\Local\Temp\35B.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Users\Admin\AppData\Local\Temp\399.tmp"C:\Users\Admin\AppData\Local\Temp\399.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:584 -
C:\Users\Admin\AppData\Local\Temp\3D8.tmp"C:\Users\Admin\AppData\Local\Temp\3D8.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:568
-
-
-
C:\Users\Admin\AppData\Local\Temp\416.tmp"C:\Users\Admin\AppData\Local\Temp\416.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\454.tmp"C:\Users\Admin\AppData\Local\Temp\454.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\4D1.tmp"C:\Users\Admin\AppData\Local\Temp\4D1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\510.tmp"C:\Users\Admin\AppData\Local\Temp\510.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\493.tmp"C:\Users\Admin\AppData\Local\Temp\493.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780
-
C:\Users\Admin\AppData\Local\Temp\58C.tmp"C:\Users\Admin\AppData\Local\Temp\58C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\5BB.tmp"C:\Users\Admin\AppData\Local\Temp\5BB.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\638.tmp"C:\Users\Admin\AppData\Local\Temp\638.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\686.tmp"C:\Users\Admin\AppData\Local\Temp\686.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\5FA.tmp"C:\Users\Admin\AppData\Local\Temp\5FA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:548
-
C:\Users\Admin\AppData\Local\Temp\6C4.tmp"C:\Users\Admin\AppData\Local\Temp\6C4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Users\Admin\AppData\Local\Temp\703.tmp"C:\Users\Admin\AppData\Local\Temp\703.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\741.tmp"C:\Users\Admin\AppData\Local\Temp\741.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\7FC.tmp"C:\Users\Admin\AppData\Local\Temp\7FC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\82B.tmp"C:\Users\Admin\AppData\Local\Temp\82B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\898.tmp"C:\Users\Admin\AppData\Local\Temp\898.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\8D7.tmp"C:\Users\Admin\AppData\Local\Temp\8D7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\954.tmp"C:\Users\Admin\AppData\Local\Temp\954.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\992.tmp"C:\Users\Admin\AppData\Local\Temp\992.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\9E0.tmp"C:\Users\Admin\AppData\Local\Temp\9E0.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\A5D.tmp"C:\Users\Admin\AppData\Local\Temp\A5D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\A8C.tmp"C:\Users\Admin\AppData\Local\Temp\A8C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\ABA.tmp"C:\Users\Admin\AppData\Local\Temp\ABA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\AF9.tmp"C:\Users\Admin\AppData\Local\Temp\AF9.tmp"2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\B37.tmp"C:\Users\Admin\AppData\Local\Temp\B37.tmp"1⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\B66.tmp"C:\Users\Admin\AppData\Local\Temp\B66.tmp"2⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\BA4.tmp"C:\Users\Admin\AppData\Local\Temp\BA4.tmp"1⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\BD3.tmp"C:\Users\Admin\AppData\Local\Temp\BD3.tmp"2⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\C02.tmp"C:\Users\Admin\AppData\Local\Temp\C02.tmp"1⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"2⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\C7F.tmp"C:\Users\Admin\AppData\Local\Temp\C7F.tmp"3⤵PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"2⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"2⤵PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"1⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp"2⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\EFE.tmp"C:\Users\Admin\AppData\Local\Temp\EFE.tmp"3⤵PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp"1⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"1⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\F7B.tmp"C:\Users\Admin\AppData\Local\Temp\F7B.tmp"2⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\CC.tmp"C:\Users\Admin\AppData\Local\Temp\CC.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\FAA.tmp"C:\Users\Admin\AppData\Local\Temp\FAA.tmp"1⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\FE8.tmp"C:\Users\Admin\AppData\Local\Temp\FE8.tmp"2⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\1027.tmp"C:\Users\Admin\AppData\Local\Temp\1027.tmp"3⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\1065.tmp"C:\Users\Admin\AppData\Local\Temp\1065.tmp"4⤵PID:2728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D98.tmp"C:\Users\Admin\AppData\Local\Temp\D98.tmp"1⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\10A4.tmp"C:\Users\Admin\AppData\Local\Temp\10A4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\10E2.tmp"C:\Users\Admin\AppData\Local\Temp\10E2.tmp"2⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\1120.tmp"C:\Users\Admin\AppData\Local\Temp\1120.tmp"3⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\115F.tmp"C:\Users\Admin\AppData\Local\Temp\115F.tmp"4⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\119D.tmp"C:\Users\Admin\AppData\Local\Temp\119D.tmp"5⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\11DC.tmp"C:\Users\Admin\AppData\Local\Temp\11DC.tmp"6⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\121A.tmp"C:\Users\Admin\AppData\Local\Temp\121A.tmp"7⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\1258.tmp"C:\Users\Admin\AppData\Local\Temp\1258.tmp"8⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\12D5.tmp"C:\Users\Admin\AppData\Local\Temp\12D5.tmp"9⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\1352.tmp"C:\Users\Admin\AppData\Local\Temp\1352.tmp"10⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\13DE.tmp"C:\Users\Admin\AppData\Local\Temp\13DE.tmp"11⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\14B9.tmp"C:\Users\Admin\AppData\Local\Temp\14B9.tmp"12⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\1516.tmp"C:\Users\Admin\AppData\Local\Temp\1516.tmp"13⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\1564.tmp"C:\Users\Admin\AppData\Local\Temp\1564.tmp"14⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\15B2.tmp"C:\Users\Admin\AppData\Local\Temp\15B2.tmp"15⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\1600.tmp"C:\Users\Admin\AppData\Local\Temp\1600.tmp"16⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\163F.tmp"C:\Users\Admin\AppData\Local\Temp\163F.tmp"17⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\167D.tmp"C:\Users\Admin\AppData\Local\Temp\167D.tmp"18⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\16CB.tmp"C:\Users\Admin\AppData\Local\Temp\16CB.tmp"19⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"20⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp"21⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\1796.tmp"C:\Users\Admin\AppData\Local\Temp\1796.tmp"22⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\17D4.tmp"C:\Users\Admin\AppData\Local\Temp\17D4.tmp"23⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\1813.tmp"C:\Users\Admin\AppData\Local\Temp\1813.tmp"24⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\1851.tmp"C:\Users\Admin\AppData\Local\Temp\1851.tmp"25⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\1890.tmp"C:\Users\Admin\AppData\Local\Temp\1890.tmp"26⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\18DE.tmp"C:\Users\Admin\AppData\Local\Temp\18DE.tmp"27⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\191C.tmp"C:\Users\Admin\AppData\Local\Temp\191C.tmp"28⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\195A.tmp"C:\Users\Admin\AppData\Local\Temp\195A.tmp"29⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\19A8.tmp"C:\Users\Admin\AppData\Local\Temp\19A8.tmp"30⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"31⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\1A25.tmp"C:\Users\Admin\AppData\Local\Temp\1A25.tmp"32⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\1A64.tmp"C:\Users\Admin\AppData\Local\Temp\1A64.tmp"33⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"34⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"35⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"36⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\1B6D.tmp"C:\Users\Admin\AppData\Local\Temp\1B6D.tmp"37⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"38⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\1BF9.tmp"C:\Users\Admin\AppData\Local\Temp\1BF9.tmp"39⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\1C38.tmp"C:\Users\Admin\AppData\Local\Temp\1C38.tmp"40⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\1C76.tmp"C:\Users\Admin\AppData\Local\Temp\1C76.tmp"41⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\1CB4.tmp"C:\Users\Admin\AppData\Local\Temp\1CB4.tmp"42⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"43⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"44⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\1D70.tmp"C:\Users\Admin\AppData\Local\Temp\1D70.tmp"45⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"46⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"47⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"48⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\1E69.tmp"C:\Users\Admin\AppData\Local\Temp\1E69.tmp"49⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"C:\Users\Admin\AppData\Local\Temp\1EA8.tmp"50⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"C:\Users\Admin\AppData\Local\Temp\1EE6.tmp"51⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\1F24.tmp"C:\Users\Admin\AppData\Local\Temp\1F24.tmp"52⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"53⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"54⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"55⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"56⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\206C.tmp"C:\Users\Admin\AppData\Local\Temp\206C.tmp"57⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\20AA.tmp"C:\Users\Admin\AppData\Local\Temp\20AA.tmp"58⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\20E9.tmp"C:\Users\Admin\AppData\Local\Temp\20E9.tmp"59⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2127.tmp"C:\Users\Admin\AppData\Local\Temp\2127.tmp"60⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2166.tmp"C:\Users\Admin\AppData\Local\Temp\2166.tmp"61⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\21B4.tmp"C:\Users\Admin\AppData\Local\Temp\21B4.tmp"62⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\21F2.tmp"C:\Users\Admin\AppData\Local\Temp\21F2.tmp"63⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2230.tmp"C:\Users\Admin\AppData\Local\Temp\2230.tmp"64⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\226F.tmp"C:\Users\Admin\AppData\Local\Temp\226F.tmp"65⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\22AD.tmp"C:\Users\Admin\AppData\Local\Temp\22AD.tmp"66⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp"67⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\233A.tmp"C:\Users\Admin\AppData\Local\Temp\233A.tmp"68⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2378.tmp"C:\Users\Admin\AppData\Local\Temp\2378.tmp"69⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\23B6.tmp"C:\Users\Admin\AppData\Local\Temp\23B6.tmp"70⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\2404.tmp"C:\Users\Admin\AppData\Local\Temp\2404.tmp"71⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2443.tmp"C:\Users\Admin\AppData\Local\Temp\2443.tmp"72⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"73⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\24C0.tmp"C:\Users\Admin\AppData\Local\Temp\24C0.tmp"74⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\24FE.tmp"C:\Users\Admin\AppData\Local\Temp\24FE.tmp"75⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"76⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"77⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp"78⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"79⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"80⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"81⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"82⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"83⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"84⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"85⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"86⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"87⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2848.tmp"C:\Users\Admin\AppData\Local\Temp\2848.tmp"88⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\2896.tmp"C:\Users\Admin\AppData\Local\Temp\2896.tmp"89⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\28E4.tmp"C:\Users\Admin\AppData\Local\Temp\28E4.tmp"90⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2923.tmp"C:\Users\Admin\AppData\Local\Temp\2923.tmp"91⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2961.tmp"C:\Users\Admin\AppData\Local\Temp\2961.tmp"92⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\29A0.tmp"C:\Users\Admin\AppData\Local\Temp\29A0.tmp"93⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"94⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"95⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"96⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"97⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"98⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2B26.tmp"C:\Users\Admin\AppData\Local\Temp\2B26.tmp"99⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2B64.tmp"C:\Users\Admin\AppData\Local\Temp\2B64.tmp"100⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"101⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"102⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"103⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"104⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"105⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"106⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2D19.tmp"C:\Users\Admin\AppData\Local\Temp\2D19.tmp"107⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2D57.tmp"C:\Users\Admin\AppData\Local\Temp\2D57.tmp"108⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2D96.tmp"C:\Users\Admin\AppData\Local\Temp\2D96.tmp"109⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"110⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2E12.tmp"C:\Users\Admin\AppData\Local\Temp\2E12.tmp"111⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2E51.tmp"C:\Users\Admin\AppData\Local\Temp\2E51.tmp"112⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"113⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"114⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"115⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"116⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2F89.tmp"C:\Users\Admin\AppData\Local\Temp\2F89.tmp"117⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"118⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\3006.tmp"C:\Users\Admin\AppData\Local\Temp\3006.tmp"119⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3044.tmp"C:\Users\Admin\AppData\Local\Temp\3044.tmp"120⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\3082.tmp"C:\Users\Admin\AppData\Local\Temp\3082.tmp"121⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\30C1.tmp"C:\Users\Admin\AppData\Local\Temp\30C1.tmp"122⤵PID:2724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-