Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 17:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe
-
Size
541KB
-
MD5
a5e1073de0e20916c1dab299a12eb39c
-
SHA1
6b1f6e829363e959a65162c287c43c10b82d32f5
-
SHA256
60fea1c4d920ef96485c72ddeefe008dafa52db63fe65aaa720f1bd9224a004e
-
SHA512
b3ef2ee4cf24f5a65fc115fceb8d5ff9378b38a7c5cfc0ab9a9a67a8ce106c5e0c80f49c954f999a7b6c0c0165c36847bcfc623173430c2273ef568bbbbd77c9
-
SSDEEP
12288:UU5rCOTeifvA2y9XXmGMEtAZu8uArZa73ctO:UUQOJf29nmGntF8uArU73ctO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2280 889.tmp 1708 8C7.tmp 1068 915.tmp 2416 954.tmp 2608 992.tmp 2716 A0F.tmp 2592 A4D.tmp 2576 A8C.tmp 2792 ADA.tmp 2504 B37.tmp 2480 B95.tmp 2512 BD3.tmp 2144 C12.tmp 2020 C7F.tmp 1704 CDC.tmp 1536 D1B.tmp 320 D69.tmp 800 DA7.tmp 1300 E24.tmp 2784 E72.tmp 1212 F0E.tmp 1684 F5C.tmp 1780 F9A.tmp 2296 FD9.tmp 2180 1017.tmp 2068 1056.tmp 2260 10A4.tmp 2240 10F2.tmp 1200 1130.tmp 484 116E.tmp 888 11BC.tmp 2444 11FB.tmp 1028 1239.tmp 1568 1278.tmp 656 12B6.tmp 1128 12F4.tmp 448 1333.tmp 2432 1371.tmp 2644 13B0.tmp 2424 13FE.tmp 1544 143C.tmp 980 147A.tmp 1924 14B9.tmp 1640 14F7.tmp 1860 1536.tmp 1652 1574.tmp 2908 15B2.tmp 936 15F1.tmp 1336 162F.tmp 2052 165E.tmp 1636 169C.tmp 3056 16DB.tmp 2388 1729.tmp 1724 1777.tmp 2108 17D4.tmp 1604 1822.tmp 1220 1861.tmp 1224 18BE.tmp 1708 192C.tmp 852 197A.tmp 2588 19C8.tmp 2416 1A25.tmp 2564 1A73.tmp 2668 1AB2.tmp -
Loads dropped DLL 64 IoCs
pid Process 2112 2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe 2280 889.tmp 1708 8C7.tmp 1068 915.tmp 2416 954.tmp 2608 992.tmp 2716 A0F.tmp 2592 A4D.tmp 2576 A8C.tmp 2792 ADA.tmp 2504 B37.tmp 2480 B95.tmp 2512 BD3.tmp 2144 C12.tmp 2020 C7F.tmp 1704 CDC.tmp 1536 D1B.tmp 320 D69.tmp 800 DA7.tmp 1300 E24.tmp 2784 E72.tmp 1212 F0E.tmp 1684 F5C.tmp 1780 F9A.tmp 2296 FD9.tmp 2180 1017.tmp 2068 1056.tmp 2260 10A4.tmp 2240 10F2.tmp 1200 1130.tmp 484 116E.tmp 888 11BC.tmp 2444 11FB.tmp 1028 1239.tmp 1568 1278.tmp 656 12B6.tmp 1128 12F4.tmp 448 1333.tmp 2432 1371.tmp 2644 13B0.tmp 2424 13FE.tmp 1544 143C.tmp 980 147A.tmp 1924 14B9.tmp 1640 14F7.tmp 1860 1536.tmp 1652 1574.tmp 2908 15B2.tmp 936 15F1.tmp 1336 162F.tmp 2052 165E.tmp 1636 169C.tmp 3056 16DB.tmp 2388 1729.tmp 1724 1777.tmp 2108 17D4.tmp 1604 1822.tmp 1220 1861.tmp 1224 18BE.tmp 1708 192C.tmp 852 197A.tmp 2588 19C8.tmp 2416 1A25.tmp 2564 1A73.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2280 2112 2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe 28 PID 2112 wrote to memory of 2280 2112 2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe 28 PID 2112 wrote to memory of 2280 2112 2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe 28 PID 2112 wrote to memory of 2280 2112 2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe 28 PID 2280 wrote to memory of 1708 2280 889.tmp 29 PID 2280 wrote to memory of 1708 2280 889.tmp 29 PID 2280 wrote to memory of 1708 2280 889.tmp 29 PID 2280 wrote to memory of 1708 2280 889.tmp 29 PID 1708 wrote to memory of 1068 1708 8C7.tmp 30 PID 1708 wrote to memory of 1068 1708 8C7.tmp 30 PID 1708 wrote to memory of 1068 1708 8C7.tmp 30 PID 1708 wrote to memory of 1068 1708 8C7.tmp 30 PID 1068 wrote to memory of 2416 1068 915.tmp 31 PID 1068 wrote to memory of 2416 1068 915.tmp 31 PID 1068 wrote to memory of 2416 1068 915.tmp 31 PID 1068 wrote to memory of 2416 1068 915.tmp 31 PID 2416 wrote to memory of 2608 2416 954.tmp 32 PID 2416 wrote to memory of 2608 2416 954.tmp 32 PID 2416 wrote to memory of 2608 2416 954.tmp 32 PID 2416 wrote to memory of 2608 2416 954.tmp 32 PID 2608 wrote to memory of 2716 2608 992.tmp 72 PID 2608 wrote to memory of 2716 2608 992.tmp 72 PID 2608 wrote to memory of 2716 2608 992.tmp 72 PID 2608 wrote to memory of 2716 2608 992.tmp 72 PID 2716 wrote to memory of 2592 2716 A0F.tmp 71 PID 2716 wrote to memory of 2592 2716 A0F.tmp 71 PID 2716 wrote to memory of 2592 2716 A0F.tmp 71 PID 2716 wrote to memory of 2592 2716 A0F.tmp 71 PID 2592 wrote to memory of 2576 2592 A4D.tmp 70 PID 2592 wrote to memory of 2576 2592 A4D.tmp 70 PID 2592 wrote to memory of 2576 2592 A4D.tmp 70 PID 2592 wrote to memory of 2576 2592 A4D.tmp 70 PID 2576 wrote to memory of 2792 2576 A8C.tmp 69 PID 2576 wrote to memory of 2792 2576 A8C.tmp 69 PID 2576 wrote to memory of 2792 2576 A8C.tmp 69 PID 2576 wrote to memory of 2792 2576 A8C.tmp 69 PID 2792 wrote to memory of 2504 2792 ADA.tmp 68 PID 2792 wrote to memory of 2504 2792 ADA.tmp 68 PID 2792 wrote to memory of 2504 2792 ADA.tmp 68 PID 2792 wrote to memory of 2504 2792 ADA.tmp 68 PID 2504 wrote to memory of 2480 2504 B37.tmp 66 PID 2504 wrote to memory of 2480 2504 B37.tmp 66 PID 2504 wrote to memory of 2480 2504 B37.tmp 66 PID 2504 wrote to memory of 2480 2504 B37.tmp 66 PID 2480 wrote to memory of 2512 2480 B95.tmp 65 PID 2480 wrote to memory of 2512 2480 B95.tmp 65 PID 2480 wrote to memory of 2512 2480 B95.tmp 65 PID 2480 wrote to memory of 2512 2480 B95.tmp 65 PID 2512 wrote to memory of 2144 2512 BD3.tmp 33 PID 2512 wrote to memory of 2144 2512 BD3.tmp 33 PID 2512 wrote to memory of 2144 2512 BD3.tmp 33 PID 2512 wrote to memory of 2144 2512 BD3.tmp 33 PID 2144 wrote to memory of 2020 2144 C12.tmp 34 PID 2144 wrote to memory of 2020 2144 C12.tmp 34 PID 2144 wrote to memory of 2020 2144 C12.tmp 34 PID 2144 wrote to memory of 2020 2144 C12.tmp 34 PID 2020 wrote to memory of 1704 2020 C7F.tmp 64 PID 2020 wrote to memory of 1704 2020 C7F.tmp 64 PID 2020 wrote to memory of 1704 2020 C7F.tmp 64 PID 2020 wrote to memory of 1704 2020 C7F.tmp 64 PID 1704 wrote to memory of 1536 1704 CDC.tmp 62 PID 1704 wrote to memory of 1536 1704 CDC.tmp 62 PID 1704 wrote to memory of 1536 1704 CDC.tmp 62 PID 1704 wrote to memory of 1536 1704 CDC.tmp 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_a5e1073de0e20916c1dab299a12eb39c_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\889.tmp"C:\Users\Admin\AppData\Local\Temp\889.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\8C7.tmp"C:\Users\Admin\AppData\Local\Temp\8C7.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\915.tmp"C:\Users\Admin\AppData\Local\Temp\915.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\954.tmp"C:\Users\Admin\AppData\Local\Temp\954.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\992.tmp"C:\Users\Admin\AppData\Local\Temp\992.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\A0F.tmp"C:\Users\Admin\AppData\Local\Temp\A0F.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C12.tmp"C:\Users\Admin\AppData\Local\Temp\C12.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\C7F.tmp"C:\Users\Admin\AppData\Local\Temp\C7F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\CDC.tmp"C:\Users\Admin\AppData\Local\Temp\CDC.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\F9A.tmp"C:\Users\Admin\AppData\Local\Temp\F9A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\FD9.tmp"C:\Users\Admin\AppData\Local\Temp\FD9.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\1017.tmp"C:\Users\Admin\AppData\Local\Temp\1017.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\1056.tmp"C:\Users\Admin\AppData\Local\Temp\1056.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\10A4.tmp"C:\Users\Admin\AppData\Local\Temp\10A4.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\10F2.tmp"C:\Users\Admin\AppData\Local\Temp\10F2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\1130.tmp"C:\Users\Admin\AppData\Local\Temp\1130.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\116E.tmp"C:\Users\Admin\AppData\Local\Temp\116E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Users\Admin\AppData\Local\Temp\11BC.tmp"C:\Users\Admin\AppData\Local\Temp\11BC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Users\Admin\AppData\Local\Temp\11FB.tmp"C:\Users\Admin\AppData\Local\Temp\11FB.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F5C.tmp"C:\Users\Admin\AppData\Local\Temp\F5C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684
-
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212
-
C:\Users\Admin\AppData\Local\Temp\1278.tmp"C:\Users\Admin\AppData\Local\Temp\1278.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\12B6.tmp"C:\Users\Admin\AppData\Local\Temp\12B6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Users\Admin\AppData\Local\Temp\12F4.tmp"C:\Users\Admin\AppData\Local\Temp\12F4.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\1333.tmp"C:\Users\Admin\AppData\Local\Temp\1333.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448 -
C:\Users\Admin\AppData\Local\Temp\1371.tmp"C:\Users\Admin\AppData\Local\Temp\1371.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\13B0.tmp"C:\Users\Admin\AppData\Local\Temp\13B0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\13FE.tmp"C:\Users\Admin\AppData\Local\Temp\13FE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\143C.tmp"C:\Users\Admin\AppData\Local\Temp\143C.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\147A.tmp"C:\Users\Admin\AppData\Local\Temp\147A.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980 -
C:\Users\Admin\AppData\Local\Temp\14B9.tmp"C:\Users\Admin\AppData\Local\Temp\14B9.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\14F7.tmp"C:\Users\Admin\AppData\Local\Temp\14F7.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\1536.tmp"C:\Users\Admin\AppData\Local\Temp\1536.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\1574.tmp"C:\Users\Admin\AppData\Local\Temp\1574.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\15B2.tmp"C:\Users\Admin\AppData\Local\Temp\15B2.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\15F1.tmp"C:\Users\Admin\AppData\Local\Temp\15F1.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Users\Admin\AppData\Local\Temp\162F.tmp"C:\Users\Admin\AppData\Local\Temp\162F.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\169C.tmp"C:\Users\Admin\AppData\Local\Temp\169C.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\16DB.tmp"C:\Users\Admin\AppData\Local\Temp\16DB.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\1729.tmp"C:\Users\Admin\AppData\Local\Temp\1729.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\1777.tmp"C:\Users\Admin\AppData\Local\Temp\1777.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\17D4.tmp"C:\Users\Admin\AppData\Local\Temp\17D4.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\1822.tmp"C:\Users\Admin\AppData\Local\Temp\1822.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\1861.tmp"C:\Users\Admin\AppData\Local\Temp\1861.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\18BE.tmp"C:\Users\Admin\AppData\Local\Temp\18BE.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\192C.tmp"C:\Users\Admin\AppData\Local\Temp\192C.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:852 -
C:\Users\Admin\AppData\Local\Temp\19C8.tmp"C:\Users\Admin\AppData\Local\Temp\19C8.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\1A25.tmp"C:\Users\Admin\AppData\Local\Temp\1A25.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\1A73.tmp"C:\Users\Admin\AppData\Local\Temp\1A73.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"26⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"27⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\1B7C.tmp"C:\Users\Admin\AppData\Local\Temp\1B7C.tmp"28⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"29⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\1C28.tmp"C:\Users\Admin\AppData\Local\Temp\1C28.tmp"30⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"31⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"32⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"33⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\1D22.tmp"C:\Users\Admin\AppData\Local\Temp\1D22.tmp"34⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\1D60.tmp"C:\Users\Admin\AppData\Local\Temp\1D60.tmp"35⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"36⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"37⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"38⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\1E69.tmp"C:\Users\Admin\AppData\Local\Temp\1E69.tmp"39⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"40⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\1F05.tmp"C:\Users\Admin\AppData\Local\Temp\1F05.tmp"41⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\1F44.tmp"C:\Users\Admin\AppData\Local\Temp\1F44.tmp"42⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\1F82.tmp"C:\Users\Admin\AppData\Local\Temp\1F82.tmp"43⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\1FD0.tmp"C:\Users\Admin\AppData\Local\Temp\1FD0.tmp"44⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\200E.tmp"C:\Users\Admin\AppData\Local\Temp\200E.tmp"45⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\204D.tmp"C:\Users\Admin\AppData\Local\Temp\204D.tmp"46⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\208B.tmp"C:\Users\Admin\AppData\Local\Temp\208B.tmp"47⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp"C:\Users\Admin\AppData\Local\Temp\20D9.tmp"48⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2118.tmp"C:\Users\Admin\AppData\Local\Temp\2118.tmp"49⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"50⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2194.tmp"C:\Users\Admin\AppData\Local\Temp\2194.tmp"51⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"52⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2211.tmp"C:\Users\Admin\AppData\Local\Temp\2211.tmp"53⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"54⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\229E.tmp"C:\Users\Admin\AppData\Local\Temp\229E.tmp"55⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\22EC.tmp"C:\Users\Admin\AppData\Local\Temp\22EC.tmp"56⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\232A.tmp"C:\Users\Admin\AppData\Local\Temp\232A.tmp"57⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2368.tmp"C:\Users\Admin\AppData\Local\Temp\2368.tmp"58⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\23B6.tmp"C:\Users\Admin\AppData\Local\Temp\23B6.tmp"59⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\2404.tmp"C:\Users\Admin\AppData\Local\Temp\2404.tmp"60⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2443.tmp"C:\Users\Admin\AppData\Local\Temp\2443.tmp"61⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"62⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\24C0.tmp"C:\Users\Admin\AppData\Local\Temp\24C0.tmp"63⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\24FE.tmp"C:\Users\Admin\AppData\Local\Temp\24FE.tmp"64⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\253C.tmp"C:\Users\Admin\AppData\Local\Temp\253C.tmp"65⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"66⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"67⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2626.tmp"C:\Users\Admin\AppData\Local\Temp\2626.tmp"68⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"69⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\26B3.tmp"C:\Users\Admin\AppData\Local\Temp\26B3.tmp"70⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2701.tmp"C:\Users\Admin\AppData\Local\Temp\2701.tmp"71⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"72⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\279D.tmp"C:\Users\Admin\AppData\Local\Temp\279D.tmp"73⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"74⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp"75⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2877.tmp"C:\Users\Admin\AppData\Local\Temp\2877.tmp"76⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"77⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"78⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2942.tmp"C:\Users\Admin\AppData\Local\Temp\2942.tmp"79⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2990.tmp"C:\Users\Admin\AppData\Local\Temp\2990.tmp"80⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\29CE.tmp"C:\Users\Admin\AppData\Local\Temp\29CE.tmp"81⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"82⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"83⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"84⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\2AD8.tmp"C:\Users\Admin\AppData\Local\Temp\2AD8.tmp"85⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\2B26.tmp"C:\Users\Admin\AppData\Local\Temp\2B26.tmp"86⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\2B64.tmp"C:\Users\Admin\AppData\Local\Temp\2B64.tmp"87⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"C:\Users\Admin\AppData\Local\Temp\2BA2.tmp"88⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"89⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"90⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"91⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"92⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2CEA.tmp"C:\Users\Admin\AppData\Local\Temp\2CEA.tmp"93⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2D38.tmp"C:\Users\Admin\AppData\Local\Temp\2D38.tmp"94⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"95⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"96⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2E12.tmp"C:\Users\Admin\AppData\Local\Temp\2E12.tmp"97⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2E60.tmp"C:\Users\Admin\AppData\Local\Temp\2E60.tmp"98⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"99⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"100⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"101⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2F89.tmp"C:\Users\Admin\AppData\Local\Temp\2F89.tmp"102⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2FD7.tmp"C:\Users\Admin\AppData\Local\Temp\2FD7.tmp"103⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3025.tmp"C:\Users\Admin\AppData\Local\Temp\3025.tmp"104⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"105⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"106⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"107⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"108⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\318C.tmp"C:\Users\Admin\AppData\Local\Temp\318C.tmp"109⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\31DA.tmp"C:\Users\Admin\AppData\Local\Temp\31DA.tmp"110⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3218.tmp"C:\Users\Admin\AppData\Local\Temp\3218.tmp"111⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3256.tmp"C:\Users\Admin\AppData\Local\Temp\3256.tmp"112⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\3295.tmp"C:\Users\Admin\AppData\Local\Temp\3295.tmp"113⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"114⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3312.tmp"C:\Users\Admin\AppData\Local\Temp\3312.tmp"115⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3360.tmp"C:\Users\Admin\AppData\Local\Temp\3360.tmp"116⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"117⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"118⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"119⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"120⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"121⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\34F5.tmp"C:\Users\Admin\AppData\Local\Temp\34F5.tmp"122⤵PID:1968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-