Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 05:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe
Resource
win10v2004-20240221-en
2 signatures
150 seconds
General
-
Target
2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe
-
Size
530KB
-
MD5
a70b502e19f772f5b5fb0707c38abe95
-
SHA1
99ae0001778970e8beda30fb9929e26a1e5fa4de
-
SHA256
1c8761b55f8a09217f8b9cbfee3740c8298f1a981930bb403bf1fca5578637d6
-
SHA512
266d26fa10c98cab228fc3696cc6ed2c25f12e7b9f053dccb39ec8a5f1c9c61db1aee09baa10b0d4a253ff8ef324e788b51486fbe6a52c678446a84cea9c45fc
-
SSDEEP
12288:AU5rCOTeiokbueBmYNOk56Wu8WFEijNZulFVg0M1:AUQOJoAuevNOk5MEwNclFV/M1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1984 13BF.tmp 2096 141D.tmp 2560 147A.tmp 2636 14D8.tmp 2544 1555.tmp 2576 15D2.tmp 2716 164E.tmp 2464 169C.tmp 2412 16EA.tmp 2536 1767.tmp 2844 17B5.tmp 1244 1803.tmp 808 1842.tmp 1600 18CE.tmp 1580 191C.tmp 2316 196A.tmp 2320 19C8.tmp 1628 1A25.tmp 352 1A73.tmp 1884 1AB2.tmp 2660 1B0F.tmp 1452 1B8C.tmp 1692 1BDA.tmp 2852 1C18.tmp 2712 1C66.tmp 2264 1CA5.tmp 1852 1CE3.tmp 1744 1D31.tmp 2028 1D7F.tmp 604 1DBE.tmp 880 1DFC.tmp 1416 1E3A.tmp 2728 1E79.tmp 2648 1EB7.tmp 2088 1EF6.tmp 656 1F44.tmp 2932 1F82.tmp 2888 1FC0.tmp 1128 1FFF.tmp 2896 204D.tmp 1712 208B.tmp 2184 20CA.tmp 1544 2118.tmp 2960 2156.tmp 1760 21B4.tmp 936 2221.tmp 3064 227E.tmp 2272 22DC.tmp 2876 233A.tmp 576 2388.tmp 2396 23E5.tmp 628 2433.tmp 2760 2481.tmp 1428 24DF.tmp 2808 253C.tmp 1908 257B.tmp 1508 25B9.tmp 2084 25F8.tmp 1984 2636.tmp 2508 26A3.tmp 3016 26F1.tmp 2560 273F.tmp 2568 278D.tmp 2684 27CC.tmp -
Loads dropped DLL 64 IoCs
pid Process 2084 2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe 1984 13BF.tmp 2096 141D.tmp 2560 147A.tmp 2636 14D8.tmp 2544 1555.tmp 2576 15D2.tmp 2716 164E.tmp 2464 169C.tmp 2412 16EA.tmp 2536 1767.tmp 2844 17B5.tmp 1244 1803.tmp 808 1842.tmp 1600 18CE.tmp 1580 191C.tmp 2316 196A.tmp 2320 19C8.tmp 1628 1A25.tmp 352 1A73.tmp 1884 1AB2.tmp 2660 1B0F.tmp 1452 1B8C.tmp 1692 1BDA.tmp 2852 1C18.tmp 2712 1C66.tmp 2264 1CA5.tmp 1852 1CE3.tmp 1744 1D31.tmp 2028 1D7F.tmp 604 1DBE.tmp 880 1DFC.tmp 1416 1E3A.tmp 2728 1E79.tmp 2648 1EB7.tmp 2088 1EF6.tmp 656 1F44.tmp 2932 1F82.tmp 2888 1FC0.tmp 1128 1FFF.tmp 2896 204D.tmp 1712 208B.tmp 2184 20CA.tmp 1544 2118.tmp 2960 2156.tmp 1760 21B4.tmp 936 2221.tmp 3064 227E.tmp 2272 22DC.tmp 2876 233A.tmp 576 2388.tmp 2396 23E5.tmp 628 2433.tmp 2760 2481.tmp 1428 24DF.tmp 2808 253C.tmp 1908 257B.tmp 1508 25B9.tmp 2084 25F8.tmp 1984 2636.tmp 2508 26A3.tmp 3016 26F1.tmp 2560 273F.tmp 2568 278D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1984 2084 2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe 28 PID 2084 wrote to memory of 1984 2084 2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe 28 PID 2084 wrote to memory of 1984 2084 2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe 28 PID 2084 wrote to memory of 1984 2084 2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe 28 PID 1984 wrote to memory of 2096 1984 13BF.tmp 65 PID 1984 wrote to memory of 2096 1984 13BF.tmp 65 PID 1984 wrote to memory of 2096 1984 13BF.tmp 65 PID 1984 wrote to memory of 2096 1984 13BF.tmp 65 PID 2096 wrote to memory of 2560 2096 141D.tmp 29 PID 2096 wrote to memory of 2560 2096 141D.tmp 29 PID 2096 wrote to memory of 2560 2096 141D.tmp 29 PID 2096 wrote to memory of 2560 2096 141D.tmp 29 PID 2560 wrote to memory of 2636 2560 147A.tmp 32 PID 2560 wrote to memory of 2636 2560 147A.tmp 32 PID 2560 wrote to memory of 2636 2560 147A.tmp 32 PID 2560 wrote to memory of 2636 2560 147A.tmp 32 PID 2636 wrote to memory of 2544 2636 14D8.tmp 30 PID 2636 wrote to memory of 2544 2636 14D8.tmp 30 PID 2636 wrote to memory of 2544 2636 14D8.tmp 30 PID 2636 wrote to memory of 2544 2636 14D8.tmp 30 PID 2544 wrote to memory of 2576 2544 1555.tmp 31 PID 2544 wrote to memory of 2576 2544 1555.tmp 31 PID 2544 wrote to memory of 2576 2544 1555.tmp 31 PID 2544 wrote to memory of 2576 2544 1555.tmp 31 PID 2576 wrote to memory of 2716 2576 15D2.tmp 64 PID 2576 wrote to memory of 2716 2576 15D2.tmp 64 PID 2576 wrote to memory of 2716 2576 15D2.tmp 64 PID 2576 wrote to memory of 2716 2576 15D2.tmp 64 PID 2716 wrote to memory of 2464 2716 164E.tmp 63 PID 2716 wrote to memory of 2464 2716 164E.tmp 63 PID 2716 wrote to memory of 2464 2716 164E.tmp 63 PID 2716 wrote to memory of 2464 2716 164E.tmp 63 PID 2464 wrote to memory of 2412 2464 169C.tmp 62 PID 2464 wrote to memory of 2412 2464 169C.tmp 62 PID 2464 wrote to memory of 2412 2464 169C.tmp 62 PID 2464 wrote to memory of 2412 2464 169C.tmp 62 PID 2412 wrote to memory of 2536 2412 16EA.tmp 33 PID 2412 wrote to memory of 2536 2412 16EA.tmp 33 PID 2412 wrote to memory of 2536 2412 16EA.tmp 33 PID 2412 wrote to memory of 2536 2412 16EA.tmp 33 PID 2536 wrote to memory of 2844 2536 1767.tmp 61 PID 2536 wrote to memory of 2844 2536 1767.tmp 61 PID 2536 wrote to memory of 2844 2536 1767.tmp 61 PID 2536 wrote to memory of 2844 2536 1767.tmp 61 PID 2844 wrote to memory of 1244 2844 17B5.tmp 60 PID 2844 wrote to memory of 1244 2844 17B5.tmp 60 PID 2844 wrote to memory of 1244 2844 17B5.tmp 60 PID 2844 wrote to memory of 1244 2844 17B5.tmp 60 PID 1244 wrote to memory of 808 1244 1803.tmp 34 PID 1244 wrote to memory of 808 1244 1803.tmp 34 PID 1244 wrote to memory of 808 1244 1803.tmp 34 PID 1244 wrote to memory of 808 1244 1803.tmp 34 PID 808 wrote to memory of 1600 808 1842.tmp 59 PID 808 wrote to memory of 1600 808 1842.tmp 59 PID 808 wrote to memory of 1600 808 1842.tmp 59 PID 808 wrote to memory of 1600 808 1842.tmp 59 PID 1600 wrote to memory of 1580 1600 18CE.tmp 58 PID 1600 wrote to memory of 1580 1600 18CE.tmp 58 PID 1600 wrote to memory of 1580 1600 18CE.tmp 58 PID 1600 wrote to memory of 1580 1600 18CE.tmp 58 PID 1580 wrote to memory of 2316 1580 191C.tmp 57 PID 1580 wrote to memory of 2316 1580 191C.tmp 57 PID 1580 wrote to memory of 2316 1580 191C.tmp 57 PID 1580 wrote to memory of 2316 1580 191C.tmp 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_a70b502e19f772f5b5fb0707c38abe95_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\13BF.tmp"C:\Users\Admin\AppData\Local\Temp\13BF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\147A.tmp"C:\Users\Admin\AppData\Local\Temp\147A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\15D2.tmp"C:\Users\Admin\AppData\Local\Temp\15D2.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\164E.tmp"C:\Users\Admin\AppData\Local\Temp\164E.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1767.tmp"C:\Users\Admin\AppData\Local\Temp\1767.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\17B5.tmp"C:\Users\Admin\AppData\Local\Temp\17B5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\1842.tmp"C:\Users\Admin\AppData\Local\Temp\1842.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\18CE.tmp"C:\Users\Admin\AppData\Local\Temp\18CE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\1C18.tmp"C:\Users\Admin\AppData\Local\Temp\1C18.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\1DBE.tmp"C:\Users\Admin\AppData\Local\Temp\1DBE.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:604 -
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1416
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1E79.tmp"C:\Users\Admin\AppData\Local\Temp\1E79.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\1F44.tmp"C:\Users\Admin\AppData\Local\Temp\1F44.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Users\Admin\AppData\Local\Temp\1F82.tmp"C:\Users\Admin\AppData\Local\Temp\1F82.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\204D.tmp"C:\Users\Admin\AppData\Local\Temp\204D.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\208B.tmp"C:\Users\Admin\AppData\Local\Temp\208B.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\20CA.tmp"C:\Users\Admin\AppData\Local\Temp\20CA.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\2118.tmp"C:\Users\Admin\AppData\Local\Temp\2118.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\21B4.tmp"C:\Users\Admin\AppData\Local\Temp\21B4.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\2221.tmp"C:\Users\Admin\AppData\Local\Temp\2221.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\22DC.tmp"C:\Users\Admin\AppData\Local\Temp\22DC.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\233A.tmp"C:\Users\Admin\AppData\Local\Temp\233A.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576 -
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\2433.tmp"C:\Users\Admin\AppData\Local\Temp\2433.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628 -
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\253C.tmp"C:\Users\Admin\AppData\Local\Temp\253C.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\257B.tmp"C:\Users\Admin\AppData\Local\Temp\257B.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\25B9.tmp"C:\Users\Admin\AppData\Local\Temp\25B9.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\25F8.tmp"C:\Users\Admin\AppData\Local\Temp\25F8.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\2636.tmp"C:\Users\Admin\AppData\Local\Temp\2636.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\26F1.tmp"C:\Users\Admin\AppData\Local\Temp\26F1.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\273F.tmp"C:\Users\Admin\AppData\Local\Temp\273F.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"32⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"33⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2858.tmp"C:\Users\Admin\AppData\Local\Temp\2858.tmp"34⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\28A6.tmp"C:\Users\Admin\AppData\Local\Temp\28A6.tmp"35⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\28E4.tmp"C:\Users\Admin\AppData\Local\Temp\28E4.tmp"36⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"37⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"38⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"39⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"40⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"41⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2A99.tmp"C:\Users\Admin\AppData\Local\Temp\2A99.tmp"42⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"43⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2B35.tmp"C:\Users\Admin\AppData\Local\Temp\2B35.tmp"44⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2B74.tmp"C:\Users\Admin\AppData\Local\Temp\2B74.tmp"45⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"46⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2C10.tmp"C:\Users\Admin\AppData\Local\Temp\2C10.tmp"47⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"48⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"49⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"50⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"51⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2DA5.tmp"C:\Users\Admin\AppData\Local\Temp\2DA5.tmp"52⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"53⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\2E41.tmp"C:\Users\Admin\AppData\Local\Temp\2E41.tmp"54⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"55⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"56⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2F1C.tmp"C:\Users\Admin\AppData\Local\Temp\2F1C.tmp"57⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"58⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"59⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\3006.tmp"C:\Users\Admin\AppData\Local\Temp\3006.tmp"60⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"61⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"62⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"63⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"64⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"65⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"66⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\3237.tmp"C:\Users\Admin\AppData\Local\Temp\3237.tmp"67⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"68⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"69⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"70⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3360.tmp"C:\Users\Admin\AppData\Local\Temp\3360.tmp"71⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"72⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"73⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"74⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"75⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"76⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3514.tmp"C:\Users\Admin\AppData\Local\Temp\3514.tmp"77⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"78⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"79⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\35DF.tmp"C:\Users\Admin\AppData\Local\Temp\35DF.tmp"80⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\362D.tmp"C:\Users\Admin\AppData\Local\Temp\362D.tmp"81⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\367B.tmp"C:\Users\Admin\AppData\Local\Temp\367B.tmp"82⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\36BA.tmp"C:\Users\Admin\AppData\Local\Temp\36BA.tmp"83⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\36F8.tmp"C:\Users\Admin\AppData\Local\Temp\36F8.tmp"84⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\3736.tmp"C:\Users\Admin\AppData\Local\Temp\3736.tmp"85⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3775.tmp"C:\Users\Admin\AppData\Local\Temp\3775.tmp"86⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\37B3.tmp"C:\Users\Admin\AppData\Local\Temp\37B3.tmp"87⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\37F2.tmp"C:\Users\Admin\AppData\Local\Temp\37F2.tmp"88⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"89⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"90⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"91⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\390A.tmp"C:\Users\Admin\AppData\Local\Temp\390A.tmp"92⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3949.tmp"C:\Users\Admin\AppData\Local\Temp\3949.tmp"93⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3987.tmp"C:\Users\Admin\AppData\Local\Temp\3987.tmp"94⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"95⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\3A14.tmp"C:\Users\Admin\AppData\Local\Temp\3A14.tmp"96⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\3A81.tmp"C:\Users\Admin\AppData\Local\Temp\3A81.tmp"97⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"98⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"99⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"100⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"101⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"102⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"103⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"104⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\3CB2.tmp"C:\Users\Admin\AppData\Local\Temp\3CB2.tmp"105⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"106⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"107⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\3D8D.tmp"C:\Users\Admin\AppData\Local\Temp\3D8D.tmp"108⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\3DCB.tmp"C:\Users\Admin\AppData\Local\Temp\3DCB.tmp"109⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\3E0A.tmp"C:\Users\Admin\AppData\Local\Temp\3E0A.tmp"110⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3E48.tmp"C:\Users\Admin\AppData\Local\Temp\3E48.tmp"111⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3E86.tmp"C:\Users\Admin\AppData\Local\Temp\3E86.tmp"112⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"113⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp"114⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"115⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\3F80.tmp"C:\Users\Admin\AppData\Local\Temp\3F80.tmp"116⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"117⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3FFD.tmp"C:\Users\Admin\AppData\Local\Temp\3FFD.tmp"118⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\404B.tmp"C:\Users\Admin\AppData\Local\Temp\404B.tmp"119⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\4089.tmp"C:\Users\Admin\AppData\Local\Temp\4089.tmp"120⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\40C8.tmp"C:\Users\Admin\AppData\Local\Temp\40C8.tmp"121⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\4106.tmp"C:\Users\Admin\AppData\Local\Temp\4106.tmp"122⤵PID:1884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-