Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 08:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe
-
Size
486KB
-
MD5
6eae01955de23b50aec7486e0bef57a0
-
SHA1
ace70b791d538d19d5ad4bd8f50257d629d85805
-
SHA256
d97f1378f8b933b2923b62f523d65b85bddf24ae7008207c5ac1d2517f32a7a3
-
SHA512
2dd48ace71d0df325cca2887c1a83668a962f6f6a63c3c26fc87911ff38d79d227068f8e4c93e2be8dad050c50675131ebe7eb619e423a0fa40e346f09c803cb
-
SSDEEP
12288:/U5rCOTeiDe8R7/GWUUCoWWj8dnwb/NZ:/UQOJDe8R7+W8l4/N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1680 CDC.tmp 804 D2A.tmp 1980 D78.tmp 1076 2C10.tmp 1652 E14.tmp 2644 E72.tmp 2592 2D28.tmp 2748 EFE.tmp 2756 F4C.tmp 2480 2E60.tmp 2680 FD9.tmp 2492 1027.tmp 2484 1065.tmp 2068 10A4.tmp 1452 3073.tmp 2724 30C1.tmp 2428 117E.tmp 2640 11DC.tmp 1632 122A.tmp 2792 1297.tmp 2820 12D5.tmp 1296 32C4.tmp 1276 1381.tmp 2248 232A.tmp 2984 140D.tmp 2272 145B.tmp 1884 149A.tmp 1964 14D8.tmp 2236 24A0.tmp 1584 1555.tmp 780 1593.tmp 384 15D2.tmp 1868 1610.tmp 844 164E.tmp 2320 168D.tmp 1492 16CB.tmp 332 170A.tmp 1764 1748.tmp 2896 1786.tmp 2404 37D2.tmp 1672 3811.tmp 980 385F.tmp 960 389D.tmp 3068 38DC.tmp 1096 18ED.tmp 1284 192C.tmp 2268 196A.tmp 2128 39E5.tmp 2136 19E7.tmp 2080 1A25.tmp 2172 1A64.tmp 2852 1AA2.tmp 1116 1AD1.tmp 2032 1B0F.tmp 2520 1B4E.tmp 3024 1B8C.tmp 2196 1BCA.tmp 2368 1C09.tmp 1640 1C47.tmp 2856 1C86.tmp 2240 1CC4.tmp 2632 1D02.tmp 2192 1D41.tmp 2636 1D7F.tmp -
Loads dropped DLL 64 IoCs
pid Process 2932 2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe 1680 2B16.tmp 804 D2A.tmp 1980 D78.tmp 1076 2C10.tmp 1652 E14.tmp 2644 E72.tmp 2592 2D28.tmp 2748 EFE.tmp 2756 F4C.tmp 2480 2E60.tmp 2680 FD9.tmp 2492 1027.tmp 2484 1065.tmp 2068 10A4.tmp 1452 3073.tmp 2724 30C1.tmp 2428 117E.tmp 2640 11DC.tmp 1632 122A.tmp 2792 1297.tmp 2820 12D5.tmp 1296 32C4.tmp 1276 1381.tmp 2248 232A.tmp 2984 140D.tmp 2272 145B.tmp 1884 149A.tmp 1964 14D8.tmp 2236 24A0.tmp 1584 1555.tmp 780 1593.tmp 384 15D2.tmp 1868 1610.tmp 844 164E.tmp 2320 168D.tmp 1492 16CB.tmp 332 170A.tmp 1764 1748.tmp 2896 1786.tmp 2404 37D2.tmp 1672 3811.tmp 980 385F.tmp 960 389D.tmp 3068 38DC.tmp 1096 18ED.tmp 1284 192C.tmp 2268 196A.tmp 2128 39E5.tmp 2136 19E7.tmp 2080 1A25.tmp 2172 1A64.tmp 2852 1AA2.tmp 1116 1AD1.tmp 2032 1B0F.tmp 2520 1B4E.tmp 3024 1B8C.tmp 2196 1BCA.tmp 2368 1C09.tmp 1640 1C47.tmp 2856 1C86.tmp 2240 1CC4.tmp 2632 1D02.tmp 2192 1D41.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1680 2932 2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe 28 PID 2932 wrote to memory of 1680 2932 2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe 28 PID 2932 wrote to memory of 1680 2932 2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe 28 PID 2932 wrote to memory of 1680 2932 2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe 28 PID 1680 wrote to memory of 804 1680 2B16.tmp 29 PID 1680 wrote to memory of 804 1680 2B16.tmp 29 PID 1680 wrote to memory of 804 1680 2B16.tmp 29 PID 1680 wrote to memory of 804 1680 2B16.tmp 29 PID 804 wrote to memory of 1980 804 D2A.tmp 122 PID 804 wrote to memory of 1980 804 D2A.tmp 122 PID 804 wrote to memory of 1980 804 D2A.tmp 122 PID 804 wrote to memory of 1980 804 D2A.tmp 122 PID 1980 wrote to memory of 1076 1980 D78.tmp 153 PID 1980 wrote to memory of 1076 1980 D78.tmp 153 PID 1980 wrote to memory of 1076 1980 D78.tmp 153 PID 1980 wrote to memory of 1076 1980 D78.tmp 153 PID 1076 wrote to memory of 1652 1076 2C10.tmp 30 PID 1076 wrote to memory of 1652 1076 2C10.tmp 30 PID 1076 wrote to memory of 1652 1076 2C10.tmp 30 PID 1076 wrote to memory of 1652 1076 2C10.tmp 30 PID 1652 wrote to memory of 2644 1652 E14.tmp 118 PID 1652 wrote to memory of 2644 1652 E14.tmp 118 PID 1652 wrote to memory of 2644 1652 E14.tmp 118 PID 1652 wrote to memory of 2644 1652 E14.tmp 118 PID 2644 wrote to memory of 2592 2644 E72.tmp 155 PID 2644 wrote to memory of 2592 2644 E72.tmp 155 PID 2644 wrote to memory of 2592 2644 E72.tmp 155 PID 2644 wrote to memory of 2592 2644 E72.tmp 155 PID 2592 wrote to memory of 2748 2592 2D28.tmp 117 PID 2592 wrote to memory of 2748 2592 2D28.tmp 117 PID 2592 wrote to memory of 2748 2592 2D28.tmp 117 PID 2592 wrote to memory of 2748 2592 2D28.tmp 117 PID 2748 wrote to memory of 2756 2748 EFE.tmp 115 PID 2748 wrote to memory of 2756 2748 EFE.tmp 115 PID 2748 wrote to memory of 2756 2748 EFE.tmp 115 PID 2748 wrote to memory of 2756 2748 EFE.tmp 115 PID 2756 wrote to memory of 2480 2756 F4C.tmp 162 PID 2756 wrote to memory of 2480 2756 F4C.tmp 162 PID 2756 wrote to memory of 2480 2756 F4C.tmp 162 PID 2756 wrote to memory of 2480 2756 F4C.tmp 162 PID 2480 wrote to memory of 2680 2480 2E60.tmp 106 PID 2480 wrote to memory of 2680 2480 2E60.tmp 106 PID 2480 wrote to memory of 2680 2480 2E60.tmp 106 PID 2480 wrote to memory of 2680 2480 2E60.tmp 106 PID 2680 wrote to memory of 2492 2680 FD9.tmp 32 PID 2680 wrote to memory of 2492 2680 FD9.tmp 32 PID 2680 wrote to memory of 2492 2680 FD9.tmp 32 PID 2680 wrote to memory of 2492 2680 FD9.tmp 32 PID 2492 wrote to memory of 2484 2492 1027.tmp 103 PID 2492 wrote to memory of 2484 2492 1027.tmp 103 PID 2492 wrote to memory of 2484 2492 1027.tmp 103 PID 2492 wrote to memory of 2484 2492 1027.tmp 103 PID 2484 wrote to memory of 2068 2484 1065.tmp 102 PID 2484 wrote to memory of 2068 2484 1065.tmp 102 PID 2484 wrote to memory of 2068 2484 1065.tmp 102 PID 2484 wrote to memory of 2068 2484 1065.tmp 102 PID 2068 wrote to memory of 1452 2068 10A4.tmp 170 PID 2068 wrote to memory of 1452 2068 10A4.tmp 170 PID 2068 wrote to memory of 1452 2068 10A4.tmp 170 PID 2068 wrote to memory of 1452 2068 10A4.tmp 170 PID 1452 wrote to memory of 2724 1452 3073.tmp 171 PID 1452 wrote to memory of 2724 1452 3073.tmp 171 PID 1452 wrote to memory of 2724 1452 3073.tmp 171 PID 1452 wrote to memory of 2724 1452 3073.tmp 171
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_6eae01955de23b50aec7486e0bef57a0_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\CDC.tmp"C:\Users\Admin\AppData\Local\Temp\CDC.tmp"2⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\2B54.tmp"C:\Users\Admin\AppData\Local\Temp\2B54.tmp"3⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2B93.tmp"C:\Users\Admin\AppData\Local\Temp\2B93.tmp"4⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"5⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2C10.tmp"C:\Users\Admin\AppData\Local\Temp\2C10.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"7⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"8⤵PID:2548
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"1⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\EFE.tmp"C:\Users\Admin\AppData\Local\Temp\EFE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\1027.tmp"C:\Users\Admin\AppData\Local\Temp\1027.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\1065.tmp"C:\Users\Admin\AppData\Local\Temp\1065.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\933B.tmp"C:\Users\Admin\AppData\Local\Temp\933B.tmp"3⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\9379.tmp"C:\Users\Admin\AppData\Local\Temp\9379.tmp"4⤵PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\117E.tmp"C:\Users\Admin\AppData\Local\Temp\117E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\11DC.tmp"C:\Users\Admin\AppData\Local\Temp\11DC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\1381.tmp"C:\Users\Admin\AppData\Local\Temp\1381.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\13CF.tmp"C:\Users\Admin\AppData\Local\Temp\13CF.tmp"2⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\2368.tmp"C:\Users\Admin\AppData\Local\Temp\2368.tmp"3⤵PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:780 -
C:\Users\Admin\AppData\Local\Temp\15D2.tmp"C:\Users\Admin\AppData\Local\Temp\15D2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1610.tmp"C:\Users\Admin\AppData\Local\Temp\1610.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\164E.tmp"C:\Users\Admin\AppData\Local\Temp\164E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:844 -
C:\Users\Admin\AppData\Local\Temp\168D.tmp"C:\Users\Admin\AppData\Local\Temp\168D.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\170A.tmp"C:\Users\Admin\AppData\Local\Temp\170A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:332 -
C:\Users\Admin\AppData\Local\Temp\1748.tmp"C:\Users\Admin\AppData\Local\Temp\1748.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\1786.tmp"C:\Users\Admin\AppData\Local\Temp\1786.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\9AD9.tmp"C:\Users\Admin\AppData\Local\Temp\9AD9.tmp"2⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"3⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\C9A5.tmp"C:\Users\Admin\AppData\Local\Temp\C9A5.tmp"4⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\C9D4.tmp"C:\Users\Admin\AppData\Local\Temp\C9D4.tmp"5⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\CA13.tmp"C:\Users\Admin\AppData\Local\Temp\CA13.tmp"6⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\CA51.tmp"C:\Users\Admin\AppData\Local\Temp\CA51.tmp"7⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\CA8F.tmp"C:\Users\Admin\AppData\Local\Temp\CA8F.tmp"8⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\CABE.tmp"C:\Users\Admin\AppData\Local\Temp\CABE.tmp"9⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\CAFD.tmp"C:\Users\Admin\AppData\Local\Temp\CAFD.tmp"10⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\CB3B.tmp"C:\Users\Admin\AppData\Local\Temp\CB3B.tmp"11⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\CB79.tmp"C:\Users\Admin\AppData\Local\Temp\CB79.tmp"12⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\CBB8.tmp"C:\Users\Admin\AppData\Local\Temp\CBB8.tmp"13⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\CBF6.tmp"C:\Users\Admin\AppData\Local\Temp\CBF6.tmp"14⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\CC35.tmp"C:\Users\Admin\AppData\Local\Temp\CC35.tmp"15⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\CC73.tmp"C:\Users\Admin\AppData\Local\Temp\CC73.tmp"16⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\CCB1.tmp"C:\Users\Admin\AppData\Local\Temp\CCB1.tmp"17⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\CCF0.tmp"C:\Users\Admin\AppData\Local\Temp\CCF0.tmp"18⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\CD2E.tmp"C:\Users\Admin\AppData\Local\Temp\CD2E.tmp"19⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\CD6D.tmp"C:\Users\Admin\AppData\Local\Temp\CD6D.tmp"20⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\CDAB.tmp"C:\Users\Admin\AppData\Local\Temp\CDAB.tmp"21⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\CDE9.tmp"C:\Users\Admin\AppData\Local\Temp\CDE9.tmp"22⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\CE28.tmp"C:\Users\Admin\AppData\Local\Temp\CE28.tmp"23⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\CE66.tmp"C:\Users\Admin\AppData\Local\Temp\CE66.tmp"24⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\CE95.tmp"C:\Users\Admin\AppData\Local\Temp\CE95.tmp"25⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\CED3.tmp"C:\Users\Admin\AppData\Local\Temp\CED3.tmp"26⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\CF12.tmp"C:\Users\Admin\AppData\Local\Temp\CF12.tmp"27⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\CF50.tmp"C:\Users\Admin\AppData\Local\Temp\CF50.tmp"28⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\CF8F.tmp"C:\Users\Admin\AppData\Local\Temp\CF8F.tmp"29⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\CFCD.tmp"C:\Users\Admin\AppData\Local\Temp\CFCD.tmp"30⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\D00B.tmp"C:\Users\Admin\AppData\Local\Temp\D00B.tmp"31⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\D04A.tmp"C:\Users\Admin\AppData\Local\Temp\D04A.tmp"32⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\D088.tmp"C:\Users\Admin\AppData\Local\Temp\D088.tmp"33⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\D0C7.tmp"C:\Users\Admin\AppData\Local\Temp\D0C7.tmp"34⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\D124.tmp"C:\Users\Admin\AppData\Local\Temp\D124.tmp"35⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\D163.tmp"C:\Users\Admin\AppData\Local\Temp\D163.tmp"36⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\D1A1.tmp"C:\Users\Admin\AppData\Local\Temp\D1A1.tmp"37⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\D1DF.tmp"C:\Users\Admin\AppData\Local\Temp\D1DF.tmp"38⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\D21E.tmp"C:\Users\Admin\AppData\Local\Temp\D21E.tmp"39⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\D24D.tmp"C:\Users\Admin\AppData\Local\Temp\D24D.tmp"40⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\D28B.tmp"C:\Users\Admin\AppData\Local\Temp\D28B.tmp"41⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\D2C9.tmp"C:\Users\Admin\AppData\Local\Temp\D2C9.tmp"42⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\D308.tmp"C:\Users\Admin\AppData\Local\Temp\D308.tmp"43⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\D346.tmp"C:\Users\Admin\AppData\Local\Temp\D346.tmp"44⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\D385.tmp"C:\Users\Admin\AppData\Local\Temp\D385.tmp"45⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\D3C3.tmp"C:\Users\Admin\AppData\Local\Temp\D3C3.tmp"46⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\D401.tmp"C:\Users\Admin\AppData\Local\Temp\D401.tmp"47⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\D440.tmp"C:\Users\Admin\AppData\Local\Temp\D440.tmp"48⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\D47E.tmp"C:\Users\Admin\AppData\Local\Temp\D47E.tmp"49⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\D4BD.tmp"C:\Users\Admin\AppData\Local\Temp\D4BD.tmp"50⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\D4FB.tmp"C:\Users\Admin\AppData\Local\Temp\D4FB.tmp"51⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\D539.tmp"C:\Users\Admin\AppData\Local\Temp\D539.tmp"52⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\D578.tmp"C:\Users\Admin\AppData\Local\Temp\D578.tmp"53⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\D5B6.tmp"C:\Users\Admin\AppData\Local\Temp\D5B6.tmp"54⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\D5F5.tmp"C:\Users\Admin\AppData\Local\Temp\D5F5.tmp"55⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\D633.tmp"C:\Users\Admin\AppData\Local\Temp\D633.tmp"56⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\D671.tmp"C:\Users\Admin\AppData\Local\Temp\D671.tmp"57⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\D6B0.tmp"C:\Users\Admin\AppData\Local\Temp\D6B0.tmp"58⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\D6EE.tmp"C:\Users\Admin\AppData\Local\Temp\D6EE.tmp"59⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\D72D.tmp"C:\Users\Admin\AppData\Local\Temp\D72D.tmp"60⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\D76B.tmp"C:\Users\Admin\AppData\Local\Temp\D76B.tmp"61⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\D7A9.tmp"C:\Users\Admin\AppData\Local\Temp\D7A9.tmp"62⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\D7E8.tmp"C:\Users\Admin\AppData\Local\Temp\D7E8.tmp"63⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\D826.tmp"C:\Users\Admin\AppData\Local\Temp\D826.tmp"64⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\D865.tmp"C:\Users\Admin\AppData\Local\Temp\D865.tmp"65⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\D8A3.tmp"C:\Users\Admin\AppData\Local\Temp\D8A3.tmp"66⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\D8E1.tmp"C:\Users\Admin\AppData\Local\Temp\D8E1.tmp"67⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\D910.tmp"C:\Users\Admin\AppData\Local\Temp\D910.tmp"68⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\D94F.tmp"C:\Users\Admin\AppData\Local\Temp\D94F.tmp"69⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\D98D.tmp"C:\Users\Admin\AppData\Local\Temp\D98D.tmp"70⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\D9CB.tmp"C:\Users\Admin\AppData\Local\Temp\D9CB.tmp"71⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\DA0A.tmp"C:\Users\Admin\AppData\Local\Temp\DA0A.tmp"72⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\DA48.tmp"C:\Users\Admin\AppData\Local\Temp\DA48.tmp"73⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\DA87.tmp"C:\Users\Admin\AppData\Local\Temp\DA87.tmp"74⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\DAC5.tmp"C:\Users\Admin\AppData\Local\Temp\DAC5.tmp"75⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\DB03.tmp"C:\Users\Admin\AppData\Local\Temp\DB03.tmp"76⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\DB42.tmp"C:\Users\Admin\AppData\Local\Temp\DB42.tmp"77⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\DB80.tmp"C:\Users\Admin\AppData\Local\Temp\DB80.tmp"78⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\DBBF.tmp"C:\Users\Admin\AppData\Local\Temp\DBBF.tmp"79⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\DBFD.tmp"C:\Users\Admin\AppData\Local\Temp\DBFD.tmp"80⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\DC3B.tmp"C:\Users\Admin\AppData\Local\Temp\DC3B.tmp"81⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\DC7A.tmp"C:\Users\Admin\AppData\Local\Temp\DC7A.tmp"82⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\DCB8.tmp"C:\Users\Admin\AppData\Local\Temp\DCB8.tmp"83⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\DCF7.tmp"C:\Users\Admin\AppData\Local\Temp\DCF7.tmp"84⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\DD35.tmp"C:\Users\Admin\AppData\Local\Temp\DD35.tmp"85⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\DD64.tmp"C:\Users\Admin\AppData\Local\Temp\DD64.tmp"86⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\DDA2.tmp"C:\Users\Admin\AppData\Local\Temp\DDA2.tmp"87⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\DDE1.tmp"C:\Users\Admin\AppData\Local\Temp\DDE1.tmp"88⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\DE1F.tmp"C:\Users\Admin\AppData\Local\Temp\DE1F.tmp"89⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\DE5E.tmp"C:\Users\Admin\AppData\Local\Temp\DE5E.tmp"90⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\DE9C.tmp"C:\Users\Admin\AppData\Local\Temp\DE9C.tmp"91⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\DEDA.tmp"C:\Users\Admin\AppData\Local\Temp\DEDA.tmp"92⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\DF19.tmp"C:\Users\Admin\AppData\Local\Temp\DF19.tmp"93⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\DF57.tmp"C:\Users\Admin\AppData\Local\Temp\DF57.tmp"94⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\DF96.tmp"C:\Users\Admin\AppData\Local\Temp\DF96.tmp"95⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\DFD4.tmp"C:\Users\Admin\AppData\Local\Temp\DFD4.tmp"96⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\E012.tmp"C:\Users\Admin\AppData\Local\Temp\E012.tmp"97⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\E051.tmp"C:\Users\Admin\AppData\Local\Temp\E051.tmp"98⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\E08F.tmp"C:\Users\Admin\AppData\Local\Temp\E08F.tmp"99⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\E0CE.tmp"C:\Users\Admin\AppData\Local\Temp\E0CE.tmp"100⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\E10C.tmp"C:\Users\Admin\AppData\Local\Temp\E10C.tmp"101⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\E14A.tmp"C:\Users\Admin\AppData\Local\Temp\E14A.tmp"102⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\E189.tmp"C:\Users\Admin\AppData\Local\Temp\E189.tmp"103⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\E1C7.tmp"C:\Users\Admin\AppData\Local\Temp\E1C7.tmp"104⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\E206.tmp"C:\Users\Admin\AppData\Local\Temp\E206.tmp"105⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\E244.tmp"C:\Users\Admin\AppData\Local\Temp\E244.tmp"106⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\E273.tmp"C:\Users\Admin\AppData\Local\Temp\E273.tmp"107⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\E2B1.tmp"C:\Users\Admin\AppData\Local\Temp\E2B1.tmp"108⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\E2F0.tmp"C:\Users\Admin\AppData\Local\Temp\E2F0.tmp"109⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\E32E.tmp"C:\Users\Admin\AppData\Local\Temp\E32E.tmp"110⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\E36C.tmp"C:\Users\Admin\AppData\Local\Temp\E36C.tmp"111⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\E3AB.tmp"C:\Users\Admin\AppData\Local\Temp\E3AB.tmp"112⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\E3E9.tmp"C:\Users\Admin\AppData\Local\Temp\E3E9.tmp"113⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\E428.tmp"C:\Users\Admin\AppData\Local\Temp\E428.tmp"114⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\E466.tmp"C:\Users\Admin\AppData\Local\Temp\E466.tmp"115⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\E4B4.tmp"C:\Users\Admin\AppData\Local\Temp\E4B4.tmp"116⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\E4F2.tmp"C:\Users\Admin\AppData\Local\Temp\E4F2.tmp"117⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\E531.tmp"C:\Users\Admin\AppData\Local\Temp\E531.tmp"118⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\E56F.tmp"C:\Users\Admin\AppData\Local\Temp\E56F.tmp"119⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\E5AE.tmp"C:\Users\Admin\AppData\Local\Temp\E5AE.tmp"120⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\E5EC.tmp"C:\Users\Admin\AppData\Local\Temp\E5EC.tmp"121⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\E62A.tmp"C:\Users\Admin\AppData\Local\Temp\E62A.tmp"122⤵PID:2036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-