Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 19:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1023b2995fd68c76721042b7be836996_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1023b2995fd68c76721042b7be836996_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1023b2995fd68c76721042b7be836996_mafia_JC.exe
-
Size
486KB
-
MD5
1023b2995fd68c76721042b7be836996
-
SHA1
bdca9a6b959d19bec5910159ad93e0c3b5d28a05
-
SHA256
fdd938a53923160988b4966cc2686a406b33ed52ca22f388b93cffb7531feb3c
-
SHA512
70df5dae67dbda9234e478c510fbbf7493784a24cbe62685e2c8f2bb7fc4df70ad36f953e8a38d8f366ceba589b0aa7dbd0e1b95dd908d547372f7d248814134
-
SSDEEP
12288:/U5rCOTeiDdanw1dhC3kqOT7fYNWQub/IKHvsNZ:/UQOJDddC3pOTDYNYNvsN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3812 69A7.tmp 3184 6A81.tmp 952 6B6C.tmp 1312 6C18.tmp 4104 6CC4.tmp 2036 6D7F.tmp 3564 6DFC.tmp 4616 6E89.tmp 1652 6FA2.tmp 1832 702F.tmp 4628 70AC.tmp 4552 7129.tmp 2020 7203.tmp 1700 72CE.tmp 3712 7407.tmp 1696 7494.tmp 3360 755F.tmp 5004 75EB.tmp 3308 7697.tmp 1324 7733.tmp 3052 77C0.tmp 4232 78F9.tmp 3172 79C4.tmp 4660 7A60.tmp 3352 7B3B.tmp 3940 7BE7.tmp 3912 7C73.tmp 4028 7CF0.tmp 3616 7DAC.tmp 5040 7E48.tmp 4824 7F13.tmp 4780 800D.tmp 844 80B9.tmp 4172 8136.tmp 2604 81D2.tmp 3832 825F.tmp 2836 82EB.tmp 4728 8378.tmp 3824 8405.tmp 4140 84B1.tmp 2576 855C.tmp 2884 85F9.tmp 3328 8676.tmp 4196 8722.tmp 1812 87AE.tmp 4148 882B.tmp 3388 88D7.tmp 3916 8954.tmp 3588 89F0.tmp 1132 8A7D.tmp 1044 8B19.tmp 1040 8BA6.tmp 4736 8C42.tmp 2112 8CEE.tmp 872 8D7B.tmp 4516 8E17.tmp 952 8EA3.tmp 3760 8F40.tmp 2360 8FCC.tmp 1420 9078.tmp 1616 9105.tmp 4544 9191.tmp 2676 921E.tmp 3324 92BA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3812 2700 1023b2995fd68c76721042b7be836996_mafia_JC.exe 82 PID 2700 wrote to memory of 3812 2700 1023b2995fd68c76721042b7be836996_mafia_JC.exe 82 PID 2700 wrote to memory of 3812 2700 1023b2995fd68c76721042b7be836996_mafia_JC.exe 82 PID 3812 wrote to memory of 3184 3812 69A7.tmp 83 PID 3812 wrote to memory of 3184 3812 69A7.tmp 83 PID 3812 wrote to memory of 3184 3812 69A7.tmp 83 PID 3184 wrote to memory of 952 3184 6A81.tmp 84 PID 3184 wrote to memory of 952 3184 6A81.tmp 84 PID 3184 wrote to memory of 952 3184 6A81.tmp 84 PID 952 wrote to memory of 1312 952 6B6C.tmp 85 PID 952 wrote to memory of 1312 952 6B6C.tmp 85 PID 952 wrote to memory of 1312 952 6B6C.tmp 85 PID 1312 wrote to memory of 4104 1312 6C18.tmp 86 PID 1312 wrote to memory of 4104 1312 6C18.tmp 86 PID 1312 wrote to memory of 4104 1312 6C18.tmp 86 PID 4104 wrote to memory of 2036 4104 6CC4.tmp 87 PID 4104 wrote to memory of 2036 4104 6CC4.tmp 87 PID 4104 wrote to memory of 2036 4104 6CC4.tmp 87 PID 2036 wrote to memory of 3564 2036 6D7F.tmp 88 PID 2036 wrote to memory of 3564 2036 6D7F.tmp 88 PID 2036 wrote to memory of 3564 2036 6D7F.tmp 88 PID 3564 wrote to memory of 4616 3564 6DFC.tmp 89 PID 3564 wrote to memory of 4616 3564 6DFC.tmp 89 PID 3564 wrote to memory of 4616 3564 6DFC.tmp 89 PID 4616 wrote to memory of 1652 4616 6E89.tmp 90 PID 4616 wrote to memory of 1652 4616 6E89.tmp 90 PID 4616 wrote to memory of 1652 4616 6E89.tmp 90 PID 1652 wrote to memory of 1832 1652 6FA2.tmp 92 PID 1652 wrote to memory of 1832 1652 6FA2.tmp 92 PID 1652 wrote to memory of 1832 1652 6FA2.tmp 92 PID 1832 wrote to memory of 4628 1832 702F.tmp 93 PID 1832 wrote to memory of 4628 1832 702F.tmp 93 PID 1832 wrote to memory of 4628 1832 702F.tmp 93 PID 4628 wrote to memory of 4552 4628 70AC.tmp 94 PID 4628 wrote to memory of 4552 4628 70AC.tmp 94 PID 4628 wrote to memory of 4552 4628 70AC.tmp 94 PID 4552 wrote to memory of 2020 4552 7129.tmp 95 PID 4552 wrote to memory of 2020 4552 7129.tmp 95 PID 4552 wrote to memory of 2020 4552 7129.tmp 95 PID 2020 wrote to memory of 1700 2020 7203.tmp 96 PID 2020 wrote to memory of 1700 2020 7203.tmp 96 PID 2020 wrote to memory of 1700 2020 7203.tmp 96 PID 1700 wrote to memory of 3712 1700 72CE.tmp 97 PID 1700 wrote to memory of 3712 1700 72CE.tmp 97 PID 1700 wrote to memory of 3712 1700 72CE.tmp 97 PID 3712 wrote to memory of 1696 3712 7407.tmp 98 PID 3712 wrote to memory of 1696 3712 7407.tmp 98 PID 3712 wrote to memory of 1696 3712 7407.tmp 98 PID 1696 wrote to memory of 3360 1696 7494.tmp 99 PID 1696 wrote to memory of 3360 1696 7494.tmp 99 PID 1696 wrote to memory of 3360 1696 7494.tmp 99 PID 3360 wrote to memory of 5004 3360 755F.tmp 100 PID 3360 wrote to memory of 5004 3360 755F.tmp 100 PID 3360 wrote to memory of 5004 3360 755F.tmp 100 PID 5004 wrote to memory of 3308 5004 75EB.tmp 101 PID 5004 wrote to memory of 3308 5004 75EB.tmp 101 PID 5004 wrote to memory of 3308 5004 75EB.tmp 101 PID 3308 wrote to memory of 1324 3308 7697.tmp 102 PID 3308 wrote to memory of 1324 3308 7697.tmp 102 PID 3308 wrote to memory of 1324 3308 7697.tmp 102 PID 1324 wrote to memory of 3052 1324 7733.tmp 105 PID 1324 wrote to memory of 3052 1324 7733.tmp 105 PID 1324 wrote to memory of 3052 1324 7733.tmp 105 PID 3052 wrote to memory of 4232 3052 77C0.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1023b2995fd68c76721042b7be836996_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\1023b2995fd68c76721042b7be836996_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\69A7.tmp"C:\Users\Admin\AppData\Local\Temp\69A7.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\6A81.tmp"C:\Users\Admin\AppData\Local\Temp\6A81.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"C:\Users\Admin\AppData\Local\Temp\6B6C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\6C18.tmp"C:\Users\Admin\AppData\Local\Temp\6C18.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\6DFC.tmp"C:\Users\Admin\AppData\Local\Temp\6DFC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\6E89.tmp"C:\Users\Admin\AppData\Local\Temp\6E89.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\6FA2.tmp"C:\Users\Admin\AppData\Local\Temp\6FA2.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\702F.tmp"C:\Users\Admin\AppData\Local\Temp\702F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\7203.tmp"C:\Users\Admin\AppData\Local\Temp\7203.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\72CE.tmp"C:\Users\Admin\AppData\Local\Temp\72CE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\7407.tmp"C:\Users\Admin\AppData\Local\Temp\7407.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\755F.tmp"C:\Users\Admin\AppData\Local\Temp\755F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\7697.tmp"C:\Users\Admin\AppData\Local\Temp\7697.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\7733.tmp"C:\Users\Admin\AppData\Local\Temp\7733.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\78F9.tmp"C:\Users\Admin\AppData\Local\Temp\78F9.tmp"23⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\79C4.tmp"C:\Users\Admin\AppData\Local\Temp\79C4.tmp"24⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\7A60.tmp"C:\Users\Admin\AppData\Local\Temp\7A60.tmp"25⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"26⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"27⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"28⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"29⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"C:\Users\Admin\AppData\Local\Temp\7DAC.tmp"30⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"31⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\7F13.tmp"C:\Users\Admin\AppData\Local\Temp\7F13.tmp"32⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\800D.tmp"C:\Users\Admin\AppData\Local\Temp\800D.tmp"33⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"34⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\8136.tmp"C:\Users\Admin\AppData\Local\Temp\8136.tmp"35⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\81D2.tmp"C:\Users\Admin\AppData\Local\Temp\81D2.tmp"36⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\825F.tmp"C:\Users\Admin\AppData\Local\Temp\825F.tmp"37⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\82EB.tmp"C:\Users\Admin\AppData\Local\Temp\82EB.tmp"38⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\8378.tmp"C:\Users\Admin\AppData\Local\Temp\8378.tmp"39⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"40⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\84B1.tmp"C:\Users\Admin\AppData\Local\Temp\84B1.tmp"41⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\855C.tmp"C:\Users\Admin\AppData\Local\Temp\855C.tmp"42⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\85F9.tmp"C:\Users\Admin\AppData\Local\Temp\85F9.tmp"43⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\8676.tmp"C:\Users\Admin\AppData\Local\Temp\8676.tmp"44⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\8722.tmp"C:\Users\Admin\AppData\Local\Temp\8722.tmp"45⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\87AE.tmp"C:\Users\Admin\AppData\Local\Temp\87AE.tmp"46⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"47⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\88D7.tmp"C:\Users\Admin\AppData\Local\Temp\88D7.tmp"48⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"49⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"50⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\8A7D.tmp"C:\Users\Admin\AppData\Local\Temp\8A7D.tmp"51⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\8B19.tmp"C:\Users\Admin\AppData\Local\Temp\8B19.tmp"52⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\8BA6.tmp"C:\Users\Admin\AppData\Local\Temp\8BA6.tmp"53⤵
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\8C42.tmp"C:\Users\Admin\AppData\Local\Temp\8C42.tmp"54⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\8CEE.tmp"C:\Users\Admin\AppData\Local\Temp\8CEE.tmp"55⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\8D7B.tmp"C:\Users\Admin\AppData\Local\Temp\8D7B.tmp"56⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\8E17.tmp"C:\Users\Admin\AppData\Local\Temp\8E17.tmp"57⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"58⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\8F40.tmp"C:\Users\Admin\AppData\Local\Temp\8F40.tmp"59⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"C:\Users\Admin\AppData\Local\Temp\8FCC.tmp"60⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"61⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\9105.tmp"C:\Users\Admin\AppData\Local\Temp\9105.tmp"62⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\9191.tmp"C:\Users\Admin\AppData\Local\Temp\9191.tmp"63⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\921E.tmp"C:\Users\Admin\AppData\Local\Temp\921E.tmp"64⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"65⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\9347.tmp"C:\Users\Admin\AppData\Local\Temp\9347.tmp"66⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\9402.tmp"C:\Users\Admin\AppData\Local\Temp\9402.tmp"67⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\947F.tmp"C:\Users\Admin\AppData\Local\Temp\947F.tmp"68⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\94FC.tmp"C:\Users\Admin\AppData\Local\Temp\94FC.tmp"69⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\9579.tmp"C:\Users\Admin\AppData\Local\Temp\9579.tmp"70⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\95F6.tmp"C:\Users\Admin\AppData\Local\Temp\95F6.tmp"71⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\9654.tmp"C:\Users\Admin\AppData\Local\Temp\9654.tmp"72⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\96D1.tmp"C:\Users\Admin\AppData\Local\Temp\96D1.tmp"73⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\975E.tmp"C:\Users\Admin\AppData\Local\Temp\975E.tmp"74⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"75⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"76⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\9913.tmp"C:\Users\Admin\AppData\Local\Temp\9913.tmp"77⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\9990.tmp"C:\Users\Admin\AppData\Local\Temp\9990.tmp"78⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\9A0D.tmp"C:\Users\Admin\AppData\Local\Temp\9A0D.tmp"79⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"80⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\9AE8.tmp"C:\Users\Admin\AppData\Local\Temp\9AE8.tmp"81⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\9B46.tmp"C:\Users\Admin\AppData\Local\Temp\9B46.tmp"82⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"83⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"84⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"85⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\9D78.tmp"C:\Users\Admin\AppData\Local\Temp\9D78.tmp"86⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"87⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\9E53.tmp"C:\Users\Admin\AppData\Local\Temp\9E53.tmp"88⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\9ED0.tmp"C:\Users\Admin\AppData\Local\Temp\9ED0.tmp"89⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"90⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"C:\Users\Admin\AppData\Local\Temp\9FF9.tmp"91⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\A076.tmp"C:\Users\Admin\AppData\Local\Temp\A076.tmp"92⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"93⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\A151.tmp"C:\Users\Admin\AppData\Local\Temp\A151.tmp"94⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"95⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"96⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"97⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\A325.tmp"C:\Users\Admin\AppData\Local\Temp\A325.tmp"98⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"99⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"100⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"101⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\A568.tmp"C:\Users\Admin\AppData\Local\Temp\A568.tmp"102⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"103⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"104⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"105⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\A73C.tmp"C:\Users\Admin\AppData\Local\Temp\A73C.tmp"106⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"107⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"108⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"109⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"110⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"111⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\AA88.tmp"C:\Users\Admin\AppData\Local\Temp\AA88.tmp"112⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"113⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"114⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\AC1E.tmp"C:\Users\Admin\AppData\Local\Temp\AC1E.tmp"115⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"116⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\AD47.tmp"C:\Users\Admin\AppData\Local\Temp\AD47.tmp"117⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"118⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"119⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"120⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"121⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"122⤵PID:3240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-