Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 02:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe
-
Size
486KB
-
MD5
1e53cfdbffd2feaef2cf1ffe4338686d
-
SHA1
624d20f67c9a06b5c8cb651c05c8bcccab07a7bf
-
SHA256
13cb34d2dc819f642e7295735605f2684dbea12c7848f96b6631f24c94215454
-
SHA512
2b0b097cdffe979a006685393024d1e0ec216470ffcaec758227c31910df3565f75ff1209562f925bc08da1ffb606bfcfe9c50a6bef6f143c277df58615af374
-
SSDEEP
12288:UU5rCOTeiDdbWfIO80x9k7pWfjkSjGgbOp5MLNZ:UUQOJDZWfZ8Gk7MfjkSj7LN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2340 1BDA.tmp 2676 1C66.tmp 2712 1CF3.tmp 2872 1D41.tmp 2808 1DAE.tmp 2804 1DEC.tmp 2836 1E3A.tmp 2572 1E79.tmp 2544 2F4A.tmp 1684 1F72.tmp 1960 1FB1.tmp 2412 1FEF.tmp 552 202E.tmp 2600 20CA.tmp 1644 2108.tmp 2440 2156.tmp 2444 2194.tmp 696 2250.tmp 1556 228E.tmp 1592 22EC.tmp 2040 233A.tmp 864 23A7.tmp 2472 23E5.tmp 2376 2433.tmp 1092 24A0.tmp 1956 24EE.tmp 1996 252D.tmp 2468 256B.tmp 540 25AA.tmp 488 25E8.tmp 1168 2636.tmp 960 2674.tmp 1792 26B3.tmp 1120 26F1.tmp 808 2730.tmp 2476 276E.tmp 2480 27AC.tmp 3032 27EB.tmp 704 2829.tmp 1680 2868.tmp 1476 2896.tmp 1308 28D5.tmp 1688 2913.tmp 1800 2952.tmp 928 2990.tmp 1484 29CE.tmp 2892 29FD.tmp 2984 2A3C.tmp 1500 2A7A.tmp 1004 2AB8.tmp 1216 2AF7.tmp 2076 2B35.tmp 2216 2B74.tmp 1968 2BB2.tmp 1516 2BF0.tmp 1548 2C1F.tmp 2932 2C5E.tmp 3040 2C9C.tmp 2860 2CCB.tmp 2260 2D09.tmp 2680 2D48.tmp 2716 2D86.tmp 1628 2DD4.tmp 2556 2E12.tmp -
Loads dropped DLL 64 IoCs
pid Process 2372 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 2340 1BDA.tmp 2676 1C66.tmp 2712 1CF3.tmp 2872 1D41.tmp 2808 1DAE.tmp 2804 1DEC.tmp 2836 1E3A.tmp 2572 1E79.tmp 2544 2F4A.tmp 1684 1F72.tmp 1960 1FB1.tmp 2412 1FEF.tmp 552 202E.tmp 2600 20CA.tmp 1644 2108.tmp 2440 2156.tmp 2444 2194.tmp 696 2250.tmp 1556 228E.tmp 1592 22EC.tmp 2040 233A.tmp 864 23A7.tmp 2472 23E5.tmp 2376 2433.tmp 1092 24A0.tmp 1956 24EE.tmp 1996 252D.tmp 2468 256B.tmp 540 25AA.tmp 488 25E8.tmp 1168 2636.tmp 960 2674.tmp 1792 26B3.tmp 1120 26F1.tmp 808 2730.tmp 2476 276E.tmp 2480 27AC.tmp 3032 27EB.tmp 704 2829.tmp 1680 2868.tmp 1476 2896.tmp 1308 28D5.tmp 1688 2913.tmp 1800 2952.tmp 928 2990.tmp 1484 29CE.tmp 2892 29FD.tmp 2984 2A3C.tmp 1500 2A7A.tmp 1004 2AB8.tmp 1216 2AF7.tmp 2076 2B35.tmp 2216 2B74.tmp 1968 2BB2.tmp 1516 2BF0.tmp 1548 2C1F.tmp 2932 2C5E.tmp 3040 2C9C.tmp 2860 2CCB.tmp 2260 2D09.tmp 2680 2D48.tmp 2716 2D86.tmp 1628 2DD4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2340 2372 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 28 PID 2372 wrote to memory of 2340 2372 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 28 PID 2372 wrote to memory of 2340 2372 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 28 PID 2372 wrote to memory of 2340 2372 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 28 PID 2340 wrote to memory of 2676 2340 1BDA.tmp 29 PID 2340 wrote to memory of 2676 2340 1BDA.tmp 29 PID 2340 wrote to memory of 2676 2340 1BDA.tmp 29 PID 2340 wrote to memory of 2676 2340 1BDA.tmp 29 PID 2676 wrote to memory of 2712 2676 1C66.tmp 30 PID 2676 wrote to memory of 2712 2676 1C66.tmp 30 PID 2676 wrote to memory of 2712 2676 1C66.tmp 30 PID 2676 wrote to memory of 2712 2676 1C66.tmp 30 PID 2712 wrote to memory of 2872 2712 1CF3.tmp 31 PID 2712 wrote to memory of 2872 2712 1CF3.tmp 31 PID 2712 wrote to memory of 2872 2712 1CF3.tmp 31 PID 2712 wrote to memory of 2872 2712 1CF3.tmp 31 PID 2872 wrote to memory of 2808 2872 1D41.tmp 32 PID 2872 wrote to memory of 2808 2872 1D41.tmp 32 PID 2872 wrote to memory of 2808 2872 1D41.tmp 32 PID 2872 wrote to memory of 2808 2872 1D41.tmp 32 PID 2808 wrote to memory of 2804 2808 1DAE.tmp 86 PID 2808 wrote to memory of 2804 2808 1DAE.tmp 86 PID 2808 wrote to memory of 2804 2808 1DAE.tmp 86 PID 2808 wrote to memory of 2804 2808 1DAE.tmp 86 PID 2804 wrote to memory of 2836 2804 1DEC.tmp 35 PID 2804 wrote to memory of 2836 2804 1DEC.tmp 35 PID 2804 wrote to memory of 2836 2804 1DEC.tmp 35 PID 2804 wrote to memory of 2836 2804 1DEC.tmp 35 PID 2836 wrote to memory of 2572 2836 1E3A.tmp 34 PID 2836 wrote to memory of 2572 2836 1E3A.tmp 34 PID 2836 wrote to memory of 2572 2836 1E3A.tmp 34 PID 2836 wrote to memory of 2572 2836 1E3A.tmp 34 PID 2572 wrote to memory of 2544 2572 1E79.tmp 96 PID 2572 wrote to memory of 2544 2572 1E79.tmp 96 PID 2572 wrote to memory of 2544 2572 1E79.tmp 96 PID 2572 wrote to memory of 2544 2572 1E79.tmp 96 PID 2544 wrote to memory of 1684 2544 2F4A.tmp 85 PID 2544 wrote to memory of 1684 2544 2F4A.tmp 85 PID 2544 wrote to memory of 1684 2544 2F4A.tmp 85 PID 2544 wrote to memory of 1684 2544 2F4A.tmp 85 PID 1684 wrote to memory of 1960 1684 1F72.tmp 84 PID 1684 wrote to memory of 1960 1684 1F72.tmp 84 PID 1684 wrote to memory of 1960 1684 1F72.tmp 84 PID 1684 wrote to memory of 1960 1684 1F72.tmp 84 PID 1960 wrote to memory of 2412 1960 1FB1.tmp 83 PID 1960 wrote to memory of 2412 1960 1FB1.tmp 83 PID 1960 wrote to memory of 2412 1960 1FB1.tmp 83 PID 1960 wrote to memory of 2412 1960 1FB1.tmp 83 PID 2412 wrote to memory of 552 2412 1FEF.tmp 36 PID 2412 wrote to memory of 552 2412 1FEF.tmp 36 PID 2412 wrote to memory of 552 2412 1FEF.tmp 36 PID 2412 wrote to memory of 552 2412 1FEF.tmp 36 PID 552 wrote to memory of 2600 552 202E.tmp 81 PID 552 wrote to memory of 2600 552 202E.tmp 81 PID 552 wrote to memory of 2600 552 202E.tmp 81 PID 552 wrote to memory of 2600 552 202E.tmp 81 PID 2600 wrote to memory of 1644 2600 20CA.tmp 80 PID 2600 wrote to memory of 1644 2600 20CA.tmp 80 PID 2600 wrote to memory of 1644 2600 20CA.tmp 80 PID 2600 wrote to memory of 1644 2600 20CA.tmp 80 PID 1644 wrote to memory of 2440 1644 2108.tmp 79 PID 1644 wrote to memory of 2440 1644 2108.tmp 79 PID 1644 wrote to memory of 2440 1644 2108.tmp 79 PID 1644 wrote to memory of 2440 1644 2108.tmp 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\1D41.tmp"C:\Users\Admin\AppData\Local\Temp\1D41.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"1⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\1E79.tmp"C:\Users\Admin\AppData\Local\Temp\1E79.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572
-
C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836
-
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\20CA.tmp"C:\Users\Admin\AppData\Local\Temp\20CA.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\2194.tmp"C:\Users\Admin\AppData\Local\Temp\2194.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\2433.tmp"C:\Users\Admin\AppData\Local\Temp\2433.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\24EE.tmp"C:\Users\Admin\AppData\Local\Temp\24EE.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\252D.tmp"C:\Users\Admin\AppData\Local\Temp\252D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:488 -
C:\Users\Admin\AppData\Local\Temp\2636.tmp"C:\Users\Admin\AppData\Local\Temp\2636.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\2674.tmp"C:\Users\Admin\AppData\Local\Temp\2674.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Users\Admin\AppData\Local\Temp\26B3.tmp"C:\Users\Admin\AppData\Local\Temp\26B3.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2730.tmp"C:\Users\Admin\AppData\Local\Temp\2730.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:808 -
C:\Users\Admin\AppData\Local\Temp\276E.tmp"C:\Users\Admin\AppData\Local\Temp\276E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\27AC.tmp"C:\Users\Admin\AppData\Local\Temp\27AC.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\26F1.tmp"C:\Users\Admin\AppData\Local\Temp\26F1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120
-
C:\Users\Admin\AppData\Local\Temp\2829.tmp"C:\Users\Admin\AppData\Local\Temp\2829.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:704 -
C:\Users\Admin\AppData\Local\Temp\2868.tmp"C:\Users\Admin\AppData\Local\Temp\2868.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\28D5.tmp"C:\Users\Admin\AppData\Local\Temp\28D5.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\2913.tmp"C:\Users\Admin\AppData\Local\Temp\2913.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\2952.tmp"C:\Users\Admin\AppData\Local\Temp\2952.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\2990.tmp"C:\Users\Admin\AppData\Local\Temp\2990.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\29CE.tmp"C:\Users\Admin\AppData\Local\Temp\29CE.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\29FD.tmp"C:\Users\Admin\AppData\Local\Temp\29FD.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\2B35.tmp"C:\Users\Admin\AppData\Local\Temp\2B35.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\2B74.tmp"C:\Users\Admin\AppData\Local\Temp\2B74.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\2BB2.tmp"C:\Users\Admin\AppData\Local\Temp\2BB2.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\2E12.tmp"C:\Users\Admin\AppData\Local\Temp\2E12.tmp"16⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\2E51.tmp"C:\Users\Admin\AppData\Local\Temp\2E51.tmp"17⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"18⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"19⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"20⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"C:\Users\Admin\AppData\Local\Temp\2F4A.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"22⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"23⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"24⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"25⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\30F0.tmp"C:\Users\Admin\AppData\Local\Temp\30F0.tmp"26⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\313E.tmp"C:\Users\Admin\AppData\Local\Temp\313E.tmp"27⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\318C.tmp"C:\Users\Admin\AppData\Local\Temp\318C.tmp"28⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\31CA.tmp"C:\Users\Admin\AppData\Local\Temp\31CA.tmp"29⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"30⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"31⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"32⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"33⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"34⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"35⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"36⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"37⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"38⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3478.tmp"C:\Users\Admin\AppData\Local\Temp\3478.tmp"39⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"40⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"41⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"42⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\35EF.tmp"C:\Users\Admin\AppData\Local\Temp\35EF.tmp"43⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\363D.tmp"C:\Users\Admin\AppData\Local\Temp\363D.tmp"44⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\367B.tmp"C:\Users\Admin\AppData\Local\Temp\367B.tmp"45⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\36E8.tmp"C:\Users\Admin\AppData\Local\Temp\36E8.tmp"46⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3727.tmp"C:\Users\Admin\AppData\Local\Temp\3727.tmp"47⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"48⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\37E2.tmp"C:\Users\Admin\AppData\Local\Temp\37E2.tmp"49⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\384F.tmp"C:\Users\Admin\AppData\Local\Temp\384F.tmp"50⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"51⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3958.tmp"C:\Users\Admin\AppData\Local\Temp\3958.tmp"52⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\39A6.tmp"C:\Users\Admin\AppData\Local\Temp\39A6.tmp"53⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\39E5.tmp"C:\Users\Admin\AppData\Local\Temp\39E5.tmp"54⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3A33.tmp"C:\Users\Admin\AppData\Local\Temp\3A33.tmp"55⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\3A81.tmp"C:\Users\Admin\AppData\Local\Temp\3A81.tmp"56⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"57⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"58⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"59⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"60⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"61⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"62⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"63⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"64⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"65⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"66⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"67⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\3DAC.tmp"C:\Users\Admin\AppData\Local\Temp\3DAC.tmp"68⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\3DEA.tmp"C:\Users\Admin\AppData\Local\Temp\3DEA.tmp"69⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\3E29.tmp"C:\Users\Admin\AppData\Local\Temp\3E29.tmp"70⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\3E77.tmp"C:\Users\Admin\AppData\Local\Temp\3E77.tmp"71⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"72⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3F13.tmp"C:\Users\Admin\AppData\Local\Temp\3F13.tmp"73⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3F61.tmp"C:\Users\Admin\AppData\Local\Temp\3F61.tmp"74⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"75⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"76⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\402C.tmp"C:\Users\Admin\AppData\Local\Temp\402C.tmp"77⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\406A.tmp"C:\Users\Admin\AppData\Local\Temp\406A.tmp"78⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\40A8.tmp"C:\Users\Admin\AppData\Local\Temp\40A8.tmp"79⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\40E7.tmp"C:\Users\Admin\AppData\Local\Temp\40E7.tmp"80⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\4125.tmp"C:\Users\Admin\AppData\Local\Temp\4125.tmp"81⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\4164.tmp"C:\Users\Admin\AppData\Local\Temp\4164.tmp"82⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\41B2.tmp"C:\Users\Admin\AppData\Local\Temp\41B2.tmp"83⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\41F0.tmp"C:\Users\Admin\AppData\Local\Temp\41F0.tmp"84⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\423E.tmp"C:\Users\Admin\AppData\Local\Temp\423E.tmp"85⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\427C.tmp"C:\Users\Admin\AppData\Local\Temp\427C.tmp"86⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\42CA.tmp"C:\Users\Admin\AppData\Local\Temp\42CA.tmp"87⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\4309.tmp"C:\Users\Admin\AppData\Local\Temp\4309.tmp"88⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\4347.tmp"C:\Users\Admin\AppData\Local\Temp\4347.tmp"89⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\4386.tmp"C:\Users\Admin\AppData\Local\Temp\4386.tmp"90⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\43C4.tmp"C:\Users\Admin\AppData\Local\Temp\43C4.tmp"91⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\4402.tmp"C:\Users\Admin\AppData\Local\Temp\4402.tmp"92⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\4441.tmp"C:\Users\Admin\AppData\Local\Temp\4441.tmp"93⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\447F.tmp"C:\Users\Admin\AppData\Local\Temp\447F.tmp"94⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\44CD.tmp"C:\Users\Admin\AppData\Local\Temp\44CD.tmp"95⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\450C.tmp"C:\Users\Admin\AppData\Local\Temp\450C.tmp"96⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\455A.tmp"C:\Users\Admin\AppData\Local\Temp\455A.tmp"97⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\4598.tmp"C:\Users\Admin\AppData\Local\Temp\4598.tmp"98⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\45D6.tmp"C:\Users\Admin\AppData\Local\Temp\45D6.tmp"99⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\4615.tmp"C:\Users\Admin\AppData\Local\Temp\4615.tmp"100⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\4663.tmp"C:\Users\Admin\AppData\Local\Temp\4663.tmp"101⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\46A1.tmp"C:\Users\Admin\AppData\Local\Temp\46A1.tmp"102⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\46EF.tmp"C:\Users\Admin\AppData\Local\Temp\46EF.tmp"103⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\472E.tmp"C:\Users\Admin\AppData\Local\Temp\472E.tmp"104⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\476C.tmp"C:\Users\Admin\AppData\Local\Temp\476C.tmp"105⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\47BA.tmp"C:\Users\Admin\AppData\Local\Temp\47BA.tmp"106⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\4808.tmp"C:\Users\Admin\AppData\Local\Temp\4808.tmp"107⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\4846.tmp"C:\Users\Admin\AppData\Local\Temp\4846.tmp"108⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\4894.tmp"C:\Users\Admin\AppData\Local\Temp\4894.tmp"109⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"110⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\4911.tmp"C:\Users\Admin\AppData\Local\Temp\4911.tmp"111⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\495F.tmp"C:\Users\Admin\AppData\Local\Temp\495F.tmp"112⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\49AD.tmp"C:\Users\Admin\AppData\Local\Temp\49AD.tmp"113⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\49EC.tmp"C:\Users\Admin\AppData\Local\Temp\49EC.tmp"114⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\4A3A.tmp"C:\Users\Admin\AppData\Local\Temp\4A3A.tmp"115⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\4A78.tmp"C:\Users\Admin\AppData\Local\Temp\4A78.tmp"116⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"117⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\4B04.tmp"C:\Users\Admin\AppData\Local\Temp\4B04.tmp"118⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\4B52.tmp"C:\Users\Admin\AppData\Local\Temp\4B52.tmp"119⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\4B91.tmp"C:\Users\Admin\AppData\Local\Temp\4B91.tmp"120⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"121⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"122⤵PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-