Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 00:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe
Resource
win10v2004-20240221-en
2 signatures
150 seconds
General
-
Target
2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe
-
Size
487KB
-
MD5
bae3ec49214a05e9c3c47f850b665b9b
-
SHA1
b5e4b36c5742f280dad53eacd99e125c23a46e87
-
SHA256
49060cc7b37437900b049f1cff153b549d6958b9b02b38473f1090d09a06cca9
-
SHA512
5c09fa7bfe3c4442488e05d1b030d98dbb96623a6ab0c0a0e95e875e1270afd0904a0ad03f1831ff37f9bfbb7d16bedc16f7179cd79e97c6fa56c1eaa68b590c
-
SSDEEP
12288:HU5rCOTeiJbrBfiKZHkesbRqlcOBQCVuLNZ:HUQOJJbhiKFstqlfEN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2468 1F05.tmp 2652 1F53.tmp 2948 2F98.tmp 2596 1FEF.tmp 2768 202E.tmp 2500 206C.tmp 2736 30E0.tmp 2548 2108.tmp 2384 2146.tmp 2456 2185.tmp 2844 21F2.tmp 1248 2240.tmp 1376 227E.tmp 2560 22CC.tmp 2712 230B.tmp 2732 2359.tmp 1568 23B6.tmp 1508 2404.tmp 1032 2452.tmp 1252 24A0.tmp 2312 24EE.tmp 2044 254C.tmp 2008 258A.tmp 2880 25D8.tmp 2824 2617.tmp 2884 2665.tmp 2236 26A3.tmp 1936 26F1.tmp 2120 2730.tmp 596 276E.tmp 720 27AC.tmp 380 27EB.tmp 576 2839.tmp 2368 2877.tmp 1476 28B6.tmp 2340 28F4.tmp 2112 2932.tmp 2980 2971.tmp 448 29AF.tmp 1228 29EE.tmp 1684 2A3C.tmp 1300 2A7A.tmp 1692 2AB8.tmp 1804 2AF7.tmp 344 2B45.tmp 1620 2B83.tmp 1064 2BC2.tmp 2956 2C00.tmp 1740 2C4E.tmp 1664 2C8C.tmp 2332 2CCB.tmp 1864 2D09.tmp 2064 2D48.tmp 904 2D86.tmp 1756 2DC4.tmp 2240 2E12.tmp 2672 2E51.tmp 1884 2E8F.tmp 2752 2ECE.tmp 2488 2F1C.tmp 2476 2F5A.tmp 2948 2F98.tmp 2612 2FD7.tmp 2508 3025.tmp -
Loads dropped DLL 64 IoCs
pid Process 2184 2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe 2468 1F05.tmp 2652 1F53.tmp 2948 2F98.tmp 2596 1FEF.tmp 2768 202E.tmp 2500 206C.tmp 2736 30E0.tmp 2548 2108.tmp 2384 2146.tmp 2456 2185.tmp 2844 21F2.tmp 1248 2240.tmp 1376 227E.tmp 2560 22CC.tmp 2712 230B.tmp 2732 2359.tmp 1568 23B6.tmp 1508 2404.tmp 1032 2452.tmp 1252 24A0.tmp 2312 24EE.tmp 2044 254C.tmp 2008 258A.tmp 2880 25D8.tmp 2824 2617.tmp 2884 2665.tmp 2236 26A3.tmp 1936 26F1.tmp 2120 2730.tmp 596 276E.tmp 720 27AC.tmp 380 27EB.tmp 576 2839.tmp 2368 2877.tmp 1476 28B6.tmp 2340 28F4.tmp 2112 2932.tmp 2980 2971.tmp 448 29AF.tmp 1228 29EE.tmp 1684 2A3C.tmp 1300 2A7A.tmp 1692 2AB8.tmp 1804 2AF7.tmp 344 2B45.tmp 1620 2B83.tmp 1064 2BC2.tmp 2956 2C00.tmp 1740 2C4E.tmp 1664 2C8C.tmp 2332 2CCB.tmp 1864 2D09.tmp 2064 2D48.tmp 904 2D86.tmp 1756 2DC4.tmp 2240 2E12.tmp 2672 2E51.tmp 1884 2E8F.tmp 2752 2ECE.tmp 2488 2F1C.tmp 2476 2F5A.tmp 2948 2F98.tmp 2612 2FD7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2468 2184 2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe 28 PID 2184 wrote to memory of 2468 2184 2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe 28 PID 2184 wrote to memory of 2468 2184 2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe 28 PID 2184 wrote to memory of 2468 2184 2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe 28 PID 2468 wrote to memory of 2652 2468 1F05.tmp 29 PID 2468 wrote to memory of 2652 2468 1F05.tmp 29 PID 2468 wrote to memory of 2652 2468 1F05.tmp 29 PID 2468 wrote to memory of 2652 2468 1F05.tmp 29 PID 2652 wrote to memory of 2948 2652 1F53.tmp 64 PID 2652 wrote to memory of 2948 2652 1F53.tmp 64 PID 2652 wrote to memory of 2948 2652 1F53.tmp 64 PID 2652 wrote to memory of 2948 2652 1F53.tmp 64 PID 2948 wrote to memory of 2596 2948 2F98.tmp 31 PID 2948 wrote to memory of 2596 2948 2F98.tmp 31 PID 2948 wrote to memory of 2596 2948 2F98.tmp 31 PID 2948 wrote to memory of 2596 2948 2F98.tmp 31 PID 2596 wrote to memory of 2768 2596 1FEF.tmp 108 PID 2596 wrote to memory of 2768 2596 1FEF.tmp 108 PID 2596 wrote to memory of 2768 2596 1FEF.tmp 108 PID 2596 wrote to memory of 2768 2596 1FEF.tmp 108 PID 2768 wrote to memory of 2500 2768 202E.tmp 107 PID 2768 wrote to memory of 2500 2768 202E.tmp 107 PID 2768 wrote to memory of 2500 2768 202E.tmp 107 PID 2768 wrote to memory of 2500 2768 202E.tmp 107 PID 2500 wrote to memory of 2736 2500 206C.tmp 67 PID 2500 wrote to memory of 2736 2500 206C.tmp 67 PID 2500 wrote to memory of 2736 2500 206C.tmp 67 PID 2500 wrote to memory of 2736 2500 206C.tmp 67 PID 2736 wrote to memory of 2548 2736 30E0.tmp 106 PID 2736 wrote to memory of 2548 2736 30E0.tmp 106 PID 2736 wrote to memory of 2548 2736 30E0.tmp 106 PID 2736 wrote to memory of 2548 2736 30E0.tmp 106 PID 2548 wrote to memory of 2384 2548 2108.tmp 105 PID 2548 wrote to memory of 2384 2548 2108.tmp 105 PID 2548 wrote to memory of 2384 2548 2108.tmp 105 PID 2548 wrote to memory of 2384 2548 2108.tmp 105 PID 2384 wrote to memory of 2456 2384 2146.tmp 33 PID 2384 wrote to memory of 2456 2384 2146.tmp 33 PID 2384 wrote to memory of 2456 2384 2146.tmp 33 PID 2384 wrote to memory of 2456 2384 2146.tmp 33 PID 2456 wrote to memory of 2844 2456 2185.tmp 104 PID 2456 wrote to memory of 2844 2456 2185.tmp 104 PID 2456 wrote to memory of 2844 2456 2185.tmp 104 PID 2456 wrote to memory of 2844 2456 2185.tmp 104 PID 2844 wrote to memory of 1248 2844 21F2.tmp 103 PID 2844 wrote to memory of 1248 2844 21F2.tmp 103 PID 2844 wrote to memory of 1248 2844 21F2.tmp 103 PID 2844 wrote to memory of 1248 2844 21F2.tmp 103 PID 1248 wrote to memory of 1376 1248 2240.tmp 102 PID 1248 wrote to memory of 1376 1248 2240.tmp 102 PID 1248 wrote to memory of 1376 1248 2240.tmp 102 PID 1248 wrote to memory of 1376 1248 2240.tmp 102 PID 1376 wrote to memory of 2560 1376 227E.tmp 101 PID 1376 wrote to memory of 2560 1376 227E.tmp 101 PID 1376 wrote to memory of 2560 1376 227E.tmp 101 PID 1376 wrote to memory of 2560 1376 227E.tmp 101 PID 2560 wrote to memory of 2712 2560 22CC.tmp 100 PID 2560 wrote to memory of 2712 2560 22CC.tmp 100 PID 2560 wrote to memory of 2712 2560 22CC.tmp 100 PID 2560 wrote to memory of 2712 2560 22CC.tmp 100 PID 2712 wrote to memory of 2732 2712 230B.tmp 99 PID 2712 wrote to memory of 2732 2712 230B.tmp 99 PID 2712 wrote to memory of 2732 2712 230B.tmp 99 PID 2712 wrote to memory of 2732 2712 230B.tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_bae3ec49214a05e9c3c47f850b665b9b_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\1F05.tmp"C:\Users\Admin\AppData\Local\Temp\1F05.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\1F53.tmp"C:\Users\Admin\AppData\Local\Temp\1F53.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"C:\Users\Admin\AppData\Local\Temp\1FA1.tmp"4⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"1⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\21F2.tmp"C:\Users\Admin\AppData\Local\Temp\21F2.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\26F1.tmp"C:\Users\Admin\AppData\Local\Temp\26F1.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\2730.tmp"C:\Users\Admin\AppData\Local\Temp\2730.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\276E.tmp"C:\Users\Admin\AppData\Local\Temp\276E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:380 -
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576 -
C:\Users\Admin\AppData\Local\Temp\2877.tmp"C:\Users\Admin\AppData\Local\Temp\2877.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\27AC.tmp"C:\Users\Admin\AppData\Local\Temp\27AC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:720
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"C:\Users\Admin\AppData\Local\Temp\2A3C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:344 -
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620
-
-
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\2E12.tmp"C:\Users\Admin\AppData\Local\Temp\2E12.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\2E51.tmp"C:\Users\Admin\AppData\Local\Temp\2E51.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"C:\Users\Admin\AppData\Local\Temp\2E8F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"C:\Users\Admin\AppData\Local\Temp\2ECE.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\2F1C.tmp"C:\Users\Admin\AppData\Local\Temp\2F1C.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\2F5A.tmp"C:\Users\Admin\AppData\Local\Temp\2F5A.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F98.tmp"C:\Users\Admin\AppData\Local\Temp\2F98.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\2FD7.tmp"C:\Users\Admin\AppData\Local\Temp\2FD7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3025.tmp"C:\Users\Admin\AppData\Local\Temp\3025.tmp"3⤵
- Executes dropped EXE
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\3063.tmp"C:\Users\Admin\AppData\Local\Temp\3063.tmp"1⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\30A2.tmp"C:\Users\Admin\AppData\Local\Temp\30A2.tmp"2⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\30E0.tmp"C:\Users\Admin\AppData\Local\Temp\30E0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\312E.tmp"C:\Users\Admin\AppData\Local\Temp\312E.tmp"2⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\316C.tmp"C:\Users\Admin\AppData\Local\Temp\316C.tmp"3⤵PID:1056
-
-
-
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\31BA.tmp"C:\Users\Admin\AppData\Local\Temp\31BA.tmp"1⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\31F9.tmp"C:\Users\Admin\AppData\Local\Temp\31F9.tmp"2⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3266.tmp"C:\Users\Admin\AppData\Local\Temp\3266.tmp"3⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"4⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3312.tmp"C:\Users\Admin\AppData\Local\Temp\3312.tmp"5⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"6⤵PID:1132
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"2⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"3⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"4⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"5⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"6⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3514.tmp"C:\Users\Admin\AppData\Local\Temp\3514.tmp"7⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"8⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"9⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\35EF.tmp"C:\Users\Admin\AppData\Local\Temp\35EF.tmp"10⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\362D.tmp"C:\Users\Admin\AppData\Local\Temp\362D.tmp"11⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\367B.tmp"C:\Users\Admin\AppData\Local\Temp\367B.tmp"12⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\36BA.tmp"C:\Users\Admin\AppData\Local\Temp\36BA.tmp"13⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3717.tmp"C:\Users\Admin\AppData\Local\Temp\3717.tmp"14⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\3756.tmp"C:\Users\Admin\AppData\Local\Temp\3756.tmp"15⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\37A4.tmp"C:\Users\Admin\AppData\Local\Temp\37A4.tmp"16⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\37F2.tmp"C:\Users\Admin\AppData\Local\Temp\37F2.tmp"17⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\3830.tmp"C:\Users\Admin\AppData\Local\Temp\3830.tmp"18⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\388E.tmp"C:\Users\Admin\AppData\Local\Temp\388E.tmp"19⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\38DC.tmp"C:\Users\Admin\AppData\Local\Temp\38DC.tmp"20⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"21⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\3997.tmp"C:\Users\Admin\AppData\Local\Temp\3997.tmp"22⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\39E5.tmp"C:\Users\Admin\AppData\Local\Temp\39E5.tmp"23⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\3A42.tmp"C:\Users\Admin\AppData\Local\Temp\3A42.tmp"24⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\3A81.tmp"C:\Users\Admin\AppData\Local\Temp\3A81.tmp"25⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"26⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"27⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"C:\Users\Admin\AppData\Local\Temp\3B7A.tmp"28⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"C:\Users\Admin\AppData\Local\Temp\3BB9.tmp"29⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"30⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\3C36.tmp"C:\Users\Admin\AppData\Local\Temp\3C36.tmp"31⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\3C74.tmp"C:\Users\Admin\AppData\Local\Temp\3C74.tmp"32⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"C:\Users\Admin\AppData\Local\Temp\3CC2.tmp"33⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\3D10.tmp"C:\Users\Admin\AppData\Local\Temp\3D10.tmp"34⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3D4E.tmp"C:\Users\Admin\AppData\Local\Temp\3D4E.tmp"35⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\3D8D.tmp"C:\Users\Admin\AppData\Local\Temp\3D8D.tmp"36⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\3DCB.tmp"C:\Users\Admin\AppData\Local\Temp\3DCB.tmp"37⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\3E19.tmp"C:\Users\Admin\AppData\Local\Temp\3E19.tmp"38⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\3E67.tmp"C:\Users\Admin\AppData\Local\Temp\3E67.tmp"39⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"40⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"41⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"42⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3F80.tmp"C:\Users\Admin\AppData\Local\Temp\3F80.tmp"43⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"44⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\3FFD.tmp"C:\Users\Admin\AppData\Local\Temp\3FFD.tmp"45⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\403B.tmp"C:\Users\Admin\AppData\Local\Temp\403B.tmp"46⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\4089.tmp"C:\Users\Admin\AppData\Local\Temp\4089.tmp"47⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\40C8.tmp"C:\Users\Admin\AppData\Local\Temp\40C8.tmp"48⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\4106.tmp"C:\Users\Admin\AppData\Local\Temp\4106.tmp"49⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\4154.tmp"C:\Users\Admin\AppData\Local\Temp\4154.tmp"50⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\4192.tmp"C:\Users\Admin\AppData\Local\Temp\4192.tmp"51⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\41D1.tmp"C:\Users\Admin\AppData\Local\Temp\41D1.tmp"52⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\420F.tmp"C:\Users\Admin\AppData\Local\Temp\420F.tmp"53⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\424E.tmp"C:\Users\Admin\AppData\Local\Temp\424E.tmp"54⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\428C.tmp"C:\Users\Admin\AppData\Local\Temp\428C.tmp"55⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\42CA.tmp"C:\Users\Admin\AppData\Local\Temp\42CA.tmp"56⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\4309.tmp"C:\Users\Admin\AppData\Local\Temp\4309.tmp"57⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\4357.tmp"C:\Users\Admin\AppData\Local\Temp\4357.tmp"58⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\4395.tmp"C:\Users\Admin\AppData\Local\Temp\4395.tmp"59⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\43D4.tmp"C:\Users\Admin\AppData\Local\Temp\43D4.tmp"60⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\4412.tmp"C:\Users\Admin\AppData\Local\Temp\4412.tmp"61⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\4460.tmp"C:\Users\Admin\AppData\Local\Temp\4460.tmp"62⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\44AE.tmp"C:\Users\Admin\AppData\Local\Temp\44AE.tmp"63⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\44EC.tmp"C:\Users\Admin\AppData\Local\Temp\44EC.tmp"64⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\453A.tmp"C:\Users\Admin\AppData\Local\Temp\453A.tmp"65⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\4598.tmp"C:\Users\Admin\AppData\Local\Temp\4598.tmp"66⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\45E6.tmp"C:\Users\Admin\AppData\Local\Temp\45E6.tmp"67⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\4624.tmp"C:\Users\Admin\AppData\Local\Temp\4624.tmp"68⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\4663.tmp"C:\Users\Admin\AppData\Local\Temp\4663.tmp"69⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\46A1.tmp"C:\Users\Admin\AppData\Local\Temp\46A1.tmp"70⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\46EF.tmp"C:\Users\Admin\AppData\Local\Temp\46EF.tmp"71⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\472E.tmp"C:\Users\Admin\AppData\Local\Temp\472E.tmp"72⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\476C.tmp"C:\Users\Admin\AppData\Local\Temp\476C.tmp"73⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\47BA.tmp"C:\Users\Admin\AppData\Local\Temp\47BA.tmp"74⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\47F8.tmp"C:\Users\Admin\AppData\Local\Temp\47F8.tmp"75⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\4846.tmp"C:\Users\Admin\AppData\Local\Temp\4846.tmp"76⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\4894.tmp"C:\Users\Admin\AppData\Local\Temp\4894.tmp"77⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"78⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\4921.tmp"C:\Users\Admin\AppData\Local\Temp\4921.tmp"79⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"80⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\49AD.tmp"C:\Users\Admin\AppData\Local\Temp\49AD.tmp"81⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\49FB.tmp"C:\Users\Admin\AppData\Local\Temp\49FB.tmp"82⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\4A49.tmp"C:\Users\Admin\AppData\Local\Temp\4A49.tmp"83⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\4A97.tmp"C:\Users\Admin\AppData\Local\Temp\4A97.tmp"84⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\4AD6.tmp"C:\Users\Admin\AppData\Local\Temp\4AD6.tmp"85⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"86⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\4B72.tmp"C:\Users\Admin\AppData\Local\Temp\4B72.tmp"87⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\4BB0.tmp"C:\Users\Admin\AppData\Local\Temp\4BB0.tmp"88⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"89⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"90⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"C:\Users\Admin\AppData\Local\Temp\4C8A.tmp"91⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"92⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\4D26.tmp"C:\Users\Admin\AppData\Local\Temp\4D26.tmp"93⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\4D65.tmp"C:\Users\Admin\AppData\Local\Temp\4D65.tmp"94⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"95⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"96⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"97⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"98⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"99⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"C:\Users\Admin\AppData\Local\Temp\4F1A.tmp"100⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"101⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"102⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"103⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\5042.tmp"C:\Users\Admin\AppData\Local\Temp\5042.tmp"104⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\5080.tmp"C:\Users\Admin\AppData\Local\Temp\5080.tmp"105⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\50CE.tmp"C:\Users\Admin\AppData\Local\Temp\50CE.tmp"106⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\510D.tmp"C:\Users\Admin\AppData\Local\Temp\510D.tmp"107⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\514B.tmp"C:\Users\Admin\AppData\Local\Temp\514B.tmp"108⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\518A.tmp"C:\Users\Admin\AppData\Local\Temp\518A.tmp"109⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\51C8.tmp"C:\Users\Admin\AppData\Local\Temp\51C8.tmp"110⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\5206.tmp"C:\Users\Admin\AppData\Local\Temp\5206.tmp"111⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\5245.tmp"C:\Users\Admin\AppData\Local\Temp\5245.tmp"112⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\5283.tmp"C:\Users\Admin\AppData\Local\Temp\5283.tmp"113⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\52D1.tmp"C:\Users\Admin\AppData\Local\Temp\52D1.tmp"114⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp"115⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\535E.tmp"C:\Users\Admin\AppData\Local\Temp\535E.tmp"116⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\539C.tmp"C:\Users\Admin\AppData\Local\Temp\539C.tmp"117⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\53DA.tmp"C:\Users\Admin\AppData\Local\Temp\53DA.tmp"118⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\5419.tmp"C:\Users\Admin\AppData\Local\Temp\5419.tmp"119⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\5457.tmp"C:\Users\Admin\AppData\Local\Temp\5457.tmp"120⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\5496.tmp"C:\Users\Admin\AppData\Local\Temp\5496.tmp"121⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\54E4.tmp"C:\Users\Admin\AppData\Local\Temp\54E4.tmp"122⤵PID:2524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-