Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 16:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe
-
Size
488KB
-
MD5
057f1dc7b6649298ade5e304f0e65f93
-
SHA1
2bd86038cfdb2c71319c2c7184a5355556adb7e9
-
SHA256
4b156ad1f0e40f5b5185c9c0956e33acfac509b5c32764cbff17c05f959101a8
-
SHA512
1d309e7fcafde6cf1858dcc8976693cf126155a2ac0536fcc8ff71c3cfd2d6fdc4515ff75c223560f11efec1c50f47c46727c8f50f6233eaa48ae861e8a553d7
-
SSDEEP
12288:/U5rCOTeiDoxSwDYYR5ypimuersXBoPMZDCSMNZ:/UQOJDsS2YYWruerInCSMN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 332 AA9.tmp 1944 C20.tmp 4916 D0B.tmp 844 DF5.tmp 4480 EC0.tmp 3764 F7C.tmp 2012 1028.tmp 1920 10F3.tmp 4996 11BE.tmp 4344 125A.tmp 4696 12F6.tmp 3968 13B2.tmp 2024 1548.tmp 2296 1690.tmp 4420 177B.tmp 1744 1846.tmp 3908 1901.tmp 3208 199E.tmp 2040 1A59.tmp 3492 1AF5.tmp 3728 1BE0.tmp 2376 1CCA.tmp 3016 1D95.tmp 3868 1E51.tmp 3932 1F0C.tmp 2508 1FA8.tmp 812 2093.tmp 4924 213F.tmp 1060 2248.tmp 2188 2323.tmp 4612 240D.tmp 5064 24D9.tmp 936 2594.tmp 1568 2640.tmp 3928 26BD.tmp 1084 272A.tmp 2980 2798.tmp 2468 2815.tmp 3956 2882.tmp 1372 28EF.tmp 916 295D.tmp 2500 29DA.tmp 2560 2A47.tmp 4444 2AC4.tmp 1580 2B70.tmp 2996 2C1C.tmp 3060 2C89.tmp 1520 2D35.tmp 1608 2DB2.tmp 264 2E4E.tmp 4988 2EFA.tmp 1764 2F87.tmp 4832 2FF4.tmp 3108 3081.tmp 4220 30EE.tmp 2860 316B.tmp 1948 3217.tmp 3724 32C3.tmp 3480 3350.tmp 3244 33DC.tmp 1020 344A.tmp 232 34E6.tmp 2800 35A1.tmp 2008 361E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 332 1264 057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe 81 PID 1264 wrote to memory of 332 1264 057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe 81 PID 1264 wrote to memory of 332 1264 057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe 81 PID 332 wrote to memory of 1944 332 AA9.tmp 82 PID 332 wrote to memory of 1944 332 AA9.tmp 82 PID 332 wrote to memory of 1944 332 AA9.tmp 82 PID 1944 wrote to memory of 4916 1944 C20.tmp 83 PID 1944 wrote to memory of 4916 1944 C20.tmp 83 PID 1944 wrote to memory of 4916 1944 C20.tmp 83 PID 4916 wrote to memory of 844 4916 D0B.tmp 84 PID 4916 wrote to memory of 844 4916 D0B.tmp 84 PID 4916 wrote to memory of 844 4916 D0B.tmp 84 PID 844 wrote to memory of 4480 844 DF5.tmp 85 PID 844 wrote to memory of 4480 844 DF5.tmp 85 PID 844 wrote to memory of 4480 844 DF5.tmp 85 PID 4480 wrote to memory of 3764 4480 EC0.tmp 86 PID 4480 wrote to memory of 3764 4480 EC0.tmp 86 PID 4480 wrote to memory of 3764 4480 EC0.tmp 86 PID 3764 wrote to memory of 2012 3764 F7C.tmp 87 PID 3764 wrote to memory of 2012 3764 F7C.tmp 87 PID 3764 wrote to memory of 2012 3764 F7C.tmp 87 PID 2012 wrote to memory of 1920 2012 1028.tmp 88 PID 2012 wrote to memory of 1920 2012 1028.tmp 88 PID 2012 wrote to memory of 1920 2012 1028.tmp 88 PID 1920 wrote to memory of 4996 1920 10F3.tmp 89 PID 1920 wrote to memory of 4996 1920 10F3.tmp 89 PID 1920 wrote to memory of 4996 1920 10F3.tmp 89 PID 4996 wrote to memory of 4344 4996 11BE.tmp 90 PID 4996 wrote to memory of 4344 4996 11BE.tmp 90 PID 4996 wrote to memory of 4344 4996 11BE.tmp 90 PID 4344 wrote to memory of 4696 4344 125A.tmp 91 PID 4344 wrote to memory of 4696 4344 125A.tmp 91 PID 4344 wrote to memory of 4696 4344 125A.tmp 91 PID 4696 wrote to memory of 3968 4696 12F6.tmp 92 PID 4696 wrote to memory of 3968 4696 12F6.tmp 92 PID 4696 wrote to memory of 3968 4696 12F6.tmp 92 PID 3968 wrote to memory of 2024 3968 13B2.tmp 93 PID 3968 wrote to memory of 2024 3968 13B2.tmp 93 PID 3968 wrote to memory of 2024 3968 13B2.tmp 93 PID 2024 wrote to memory of 2296 2024 1548.tmp 94 PID 2024 wrote to memory of 2296 2024 1548.tmp 94 PID 2024 wrote to memory of 2296 2024 1548.tmp 94 PID 2296 wrote to memory of 4420 2296 1690.tmp 95 PID 2296 wrote to memory of 4420 2296 1690.tmp 95 PID 2296 wrote to memory of 4420 2296 1690.tmp 95 PID 4420 wrote to memory of 1744 4420 177B.tmp 96 PID 4420 wrote to memory of 1744 4420 177B.tmp 96 PID 4420 wrote to memory of 1744 4420 177B.tmp 96 PID 1744 wrote to memory of 3908 1744 1846.tmp 97 PID 1744 wrote to memory of 3908 1744 1846.tmp 97 PID 1744 wrote to memory of 3908 1744 1846.tmp 97 PID 3908 wrote to memory of 3208 3908 1901.tmp 99 PID 3908 wrote to memory of 3208 3908 1901.tmp 99 PID 3908 wrote to memory of 3208 3908 1901.tmp 99 PID 3208 wrote to memory of 2040 3208 199E.tmp 100 PID 3208 wrote to memory of 2040 3208 199E.tmp 100 PID 3208 wrote to memory of 2040 3208 199E.tmp 100 PID 2040 wrote to memory of 3492 2040 1A59.tmp 101 PID 2040 wrote to memory of 3492 2040 1A59.tmp 101 PID 2040 wrote to memory of 3492 2040 1A59.tmp 101 PID 3492 wrote to memory of 3728 3492 1AF5.tmp 102 PID 3492 wrote to memory of 3728 3492 1AF5.tmp 102 PID 3492 wrote to memory of 3728 3492 1AF5.tmp 102 PID 3728 wrote to memory of 2376 3728 1BE0.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\057f1dc7b6649298ade5e304f0e65f93_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\C20.tmp"C:\Users\Admin\AppData\Local\Temp\C20.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\125A.tmp"C:\Users\Admin\AppData\Local\Temp\125A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\12F6.tmp"C:\Users\Admin\AppData\Local\Temp\12F6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\13B2.tmp"C:\Users\Admin\AppData\Local\Temp\13B2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1690.tmp"C:\Users\Admin\AppData\Local\Temp\1690.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\1846.tmp"C:\Users\Admin\AppData\Local\Temp\1846.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1901.tmp"C:\Users\Admin\AppData\Local\Temp\1901.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\1A59.tmp"C:\Users\Admin\AppData\Local\Temp\1A59.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"23⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\1D95.tmp"C:\Users\Admin\AppData\Local\Temp\1D95.tmp"24⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\1E51.tmp"C:\Users\Admin\AppData\Local\Temp\1E51.tmp"25⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"26⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"27⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"28⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"29⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"30⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\2323.tmp"C:\Users\Admin\AppData\Local\Temp\2323.tmp"31⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"32⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"33⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"34⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"35⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"36⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\272A.tmp"C:\Users\Admin\AppData\Local\Temp\272A.tmp"37⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\2798.tmp"C:\Users\Admin\AppData\Local\Temp\2798.tmp"38⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\2815.tmp"C:\Users\Admin\AppData\Local\Temp\2815.tmp"39⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\2882.tmp"C:\Users\Admin\AppData\Local\Temp\2882.tmp"40⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"41⤵
- Executes dropped EXE
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"42⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"43⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\2A47.tmp"C:\Users\Admin\AppData\Local\Temp\2A47.tmp"44⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"45⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\2B70.tmp"C:\Users\Admin\AppData\Local\Temp\2B70.tmp"46⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\2C1C.tmp"C:\Users\Admin\AppData\Local\Temp\2C1C.tmp"47⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"48⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"49⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"50⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"51⤵
- Executes dropped EXE
PID:264 -
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"52⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"53⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"54⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"55⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\30EE.tmp"C:\Users\Admin\AppData\Local\Temp\30EE.tmp"56⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\316B.tmp"C:\Users\Admin\AppData\Local\Temp\316B.tmp"57⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"58⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"59⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"60⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"61⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"62⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"63⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"64⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"65⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"66⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\3738.tmp"C:\Users\Admin\AppData\Local\Temp\3738.tmp"67⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\37A5.tmp"C:\Users\Admin\AppData\Local\Temp\37A5.tmp"68⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"69⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"70⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"71⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"72⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"73⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"74⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"75⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"76⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3C39.tmp"C:\Users\Admin\AppData\Local\Temp\3C39.tmp"77⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"78⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"79⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"80⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"81⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"82⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\3F94.tmp"C:\Users\Admin\AppData\Local\Temp\3F94.tmp"83⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"84⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"85⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"86⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"87⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"88⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\42D0.tmp"C:\Users\Admin\AppData\Local\Temp\42D0.tmp"89⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"90⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"91⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"92⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"93⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"94⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\465B.tmp"C:\Users\Admin\AppData\Local\Temp\465B.tmp"95⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\46E7.tmp"C:\Users\Admin\AppData\Local\Temp\46E7.tmp"96⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\4764.tmp"C:\Users\Admin\AppData\Local\Temp\4764.tmp"97⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\47E1.tmp"C:\Users\Admin\AppData\Local\Temp\47E1.tmp"98⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"99⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\48CC.tmp"C:\Users\Admin\AppData\Local\Temp\48CC.tmp"100⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"101⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"102⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\4A52.tmp"C:\Users\Admin\AppData\Local\Temp\4A52.tmp"103⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"104⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"105⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\4C17.tmp"C:\Users\Admin\AppData\Local\Temp\4C17.tmp"106⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"107⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\4D50.tmp"C:\Users\Admin\AppData\Local\Temp\4D50.tmp"108⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"109⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\4E79.tmp"C:\Users\Admin\AppData\Local\Temp\4E79.tmp"110⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"111⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"112⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"113⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\506D.tmp"C:\Users\Admin\AppData\Local\Temp\506D.tmp"114⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\5119.tmp"C:\Users\Admin\AppData\Local\Temp\5119.tmp"115⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\51A5.tmp"C:\Users\Admin\AppData\Local\Temp\51A5.tmp"116⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\5232.tmp"C:\Users\Admin\AppData\Local\Temp\5232.tmp"117⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"118⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"119⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"120⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\5436.tmp"C:\Users\Admin\AppData\Local\Temp\5436.tmp"121⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\54A3.tmp"C:\Users\Admin\AppData\Local\Temp\54A3.tmp"122⤵PID:4560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-