Analysis
-
max time kernel
156s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2023 17:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe
-
Size
486KB
-
MD5
19a89ee3b80a48363e8b0c78cc6265f6
-
SHA1
9f2366a4d962f2229c92529377cc14709e3c49d9
-
SHA256
332f235b47f6334aa33ac5f7dfd8aa0644e3cb77fe39a2ab0bc727a30123f513
-
SHA512
b00cb2b0eadcbef7b0c10ad024cf071843c032efe128a7a297344ea71aeffa4cfb2d533f2239418ddc55b1eb0d796dfaca5f2e203f0bb1f7d4cef054e60ae466
-
SSDEEP
12288:/U5rCOTeiDCjMUPc+mJ4Z/3rejOXSp8pXMWWxNZ:/UQOJDcMULmmZKSXSyp6xN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 464 EC25.tmp 3684 EF51.tmp 2784 F02C.tmp 3836 F174.tmp 3952 F339.tmp 4756 F433.tmp 4352 F4FF.tmp 2796 F666.tmp 2244 F721.tmp 1508 F80C.tmp 2664 F935.tmp 4916 FA3E.tmp 2020 FB38.tmp 3904 FC13.tmp 384 FCEE.tmp 4488 FD9A.tmp 2196 FE46.tmp 3672 FF01.tmp 3224 FFCC.tmp 4172 78.tmp 4724 1B1.tmp 488 29B.tmp 4440 376.tmp 3228 431.tmp 2984 606.tmp 5084 6B2.tmp 2268 74E.tmp 376 829.tmp 4412 952.tmp 3908 A3C.tmp 3872 B46.tmp 228 C7E.tmp 1880 D2A.tmp 4796 DE6.tmp 4476 E72.tmp 2256 F2E.tmp 1792 FDA.tmp 4360 1066.tmp 4840 1112.tmp 4960 119F.tmp 3788 125A.tmp 3084 1325.tmp 4456 13B2.tmp 224 142F.tmp 1396 14FA.tmp 456 15A6.tmp 3876 1661.tmp 4416 16EE.tmp 1204 17D8.tmp 2216 1865.tmp 5004 18F2.tmp 4292 199E.tmp 416 1B63.tmp 2264 1C0F.tmp 4556 1C9B.tmp 464 1D37.tmp 4000 1DE3.tmp 2804 1E60.tmp 3540 1F1C.tmp 4904 1FB8.tmp 4340 2074.tmp 3952 213F.tmp 3692 21EB.tmp 2036 22B6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 464 4556 19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe 82 PID 4556 wrote to memory of 464 4556 19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe 82 PID 4556 wrote to memory of 464 4556 19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe 82 PID 464 wrote to memory of 3684 464 EC25.tmp 83 PID 464 wrote to memory of 3684 464 EC25.tmp 83 PID 464 wrote to memory of 3684 464 EC25.tmp 83 PID 3684 wrote to memory of 2784 3684 EF51.tmp 84 PID 3684 wrote to memory of 2784 3684 EF51.tmp 84 PID 3684 wrote to memory of 2784 3684 EF51.tmp 84 PID 2784 wrote to memory of 3836 2784 F02C.tmp 85 PID 2784 wrote to memory of 3836 2784 F02C.tmp 85 PID 2784 wrote to memory of 3836 2784 F02C.tmp 85 PID 3836 wrote to memory of 3952 3836 F174.tmp 86 PID 3836 wrote to memory of 3952 3836 F174.tmp 86 PID 3836 wrote to memory of 3952 3836 F174.tmp 86 PID 3952 wrote to memory of 4756 3952 F339.tmp 87 PID 3952 wrote to memory of 4756 3952 F339.tmp 87 PID 3952 wrote to memory of 4756 3952 F339.tmp 87 PID 4756 wrote to memory of 4352 4756 F433.tmp 88 PID 4756 wrote to memory of 4352 4756 F433.tmp 88 PID 4756 wrote to memory of 4352 4756 F433.tmp 88 PID 4352 wrote to memory of 2796 4352 F4FF.tmp 89 PID 4352 wrote to memory of 2796 4352 F4FF.tmp 89 PID 4352 wrote to memory of 2796 4352 F4FF.tmp 89 PID 2796 wrote to memory of 2244 2796 F666.tmp 90 PID 2796 wrote to memory of 2244 2796 F666.tmp 90 PID 2796 wrote to memory of 2244 2796 F666.tmp 90 PID 2244 wrote to memory of 1508 2244 F721.tmp 91 PID 2244 wrote to memory of 1508 2244 F721.tmp 91 PID 2244 wrote to memory of 1508 2244 F721.tmp 91 PID 1508 wrote to memory of 2664 1508 F80C.tmp 92 PID 1508 wrote to memory of 2664 1508 F80C.tmp 92 PID 1508 wrote to memory of 2664 1508 F80C.tmp 92 PID 2664 wrote to memory of 4916 2664 F935.tmp 93 PID 2664 wrote to memory of 4916 2664 F935.tmp 93 PID 2664 wrote to memory of 4916 2664 F935.tmp 93 PID 4916 wrote to memory of 2020 4916 FA3E.tmp 94 PID 4916 wrote to memory of 2020 4916 FA3E.tmp 94 PID 4916 wrote to memory of 2020 4916 FA3E.tmp 94 PID 2020 wrote to memory of 3904 2020 FB38.tmp 95 PID 2020 wrote to memory of 3904 2020 FB38.tmp 95 PID 2020 wrote to memory of 3904 2020 FB38.tmp 95 PID 3904 wrote to memory of 384 3904 FC13.tmp 96 PID 3904 wrote to memory of 384 3904 FC13.tmp 96 PID 3904 wrote to memory of 384 3904 FC13.tmp 96 PID 384 wrote to memory of 4488 384 FCEE.tmp 97 PID 384 wrote to memory of 4488 384 FCEE.tmp 97 PID 384 wrote to memory of 4488 384 FCEE.tmp 97 PID 4488 wrote to memory of 2196 4488 FD9A.tmp 98 PID 4488 wrote to memory of 2196 4488 FD9A.tmp 98 PID 4488 wrote to memory of 2196 4488 FD9A.tmp 98 PID 2196 wrote to memory of 3672 2196 FE46.tmp 100 PID 2196 wrote to memory of 3672 2196 FE46.tmp 100 PID 2196 wrote to memory of 3672 2196 FE46.tmp 100 PID 3672 wrote to memory of 3224 3672 FF01.tmp 101 PID 3672 wrote to memory of 3224 3672 FF01.tmp 101 PID 3672 wrote to memory of 3224 3672 FF01.tmp 101 PID 3224 wrote to memory of 4172 3224 FFCC.tmp 102 PID 3224 wrote to memory of 4172 3224 FFCC.tmp 102 PID 3224 wrote to memory of 4172 3224 FFCC.tmp 102 PID 4172 wrote to memory of 4724 4172 78.tmp 103 PID 4172 wrote to memory of 4724 4172 78.tmp 103 PID 4172 wrote to memory of 4724 4172 78.tmp 103 PID 4724 wrote to memory of 488 4724 1B1.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\19a89ee3b80a48363e8b0c78cc6265f6_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\EC25.tmp"C:\Users\Admin\AppData\Local\Temp\EC25.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\EF51.tmp"C:\Users\Admin\AppData\Local\Temp\EF51.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\F02C.tmp"C:\Users\Admin\AppData\Local\Temp\F02C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\F721.tmp"C:\Users\Admin\AppData\Local\Temp\F721.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\FE46.tmp"C:\Users\Admin\AppData\Local\Temp\FE46.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\29B.tmp"C:\Users\Admin\AppData\Local\Temp\29B.tmp"23⤵
- Executes dropped EXE
PID:488 -
C:\Users\Admin\AppData\Local\Temp\376.tmp"C:\Users\Admin\AppData\Local\Temp\376.tmp"24⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\431.tmp"C:\Users\Admin\AppData\Local\Temp\431.tmp"25⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"26⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"27⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"28⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"29⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"30⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\A3C.tmp"C:\Users\Admin\AppData\Local\Temp\A3C.tmp"31⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\B46.tmp"C:\Users\Admin\AppData\Local\Temp\B46.tmp"32⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"33⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"34⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"35⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"36⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\F2E.tmp"C:\Users\Admin\AppData\Local\Temp\F2E.tmp"37⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\FDA.tmp"C:\Users\Admin\AppData\Local\Temp\FDA.tmp"38⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\1066.tmp"C:\Users\Admin\AppData\Local\Temp\1066.tmp"39⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\1112.tmp"C:\Users\Admin\AppData\Local\Temp\1112.tmp"40⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"41⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\125A.tmp"C:\Users\Admin\AppData\Local\Temp\125A.tmp"42⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\1325.tmp"C:\Users\Admin\AppData\Local\Temp\1325.tmp"43⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\13B2.tmp"C:\Users\Admin\AppData\Local\Temp\13B2.tmp"44⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\142F.tmp"C:\Users\Admin\AppData\Local\Temp\142F.tmp"45⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"46⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"47⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\1661.tmp"C:\Users\Admin\AppData\Local\Temp\1661.tmp"48⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\16EE.tmp"C:\Users\Admin\AppData\Local\Temp\16EE.tmp"49⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"50⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1865.tmp"C:\Users\Admin\AppData\Local\Temp\1865.tmp"51⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"52⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"53⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"54⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\1B63.tmp"C:\Users\Admin\AppData\Local\Temp\1B63.tmp"55⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"56⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\1C9B.tmp"C:\Users\Admin\AppData\Local\Temp\1C9B.tmp"57⤵
- Executes dropped EXE
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"58⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\1DE3.tmp"C:\Users\Admin\AppData\Local\Temp\1DE3.tmp"59⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\1E60.tmp"C:\Users\Admin\AppData\Local\Temp\1E60.tmp"60⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"61⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"62⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\2074.tmp"C:\Users\Admin\AppData\Local\Temp\2074.tmp"63⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"64⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\21EB.tmp"C:\Users\Admin\AppData\Local\Temp\21EB.tmp"65⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\22B6.tmp"C:\Users\Admin\AppData\Local\Temp\22B6.tmp"66⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\2371.tmp"C:\Users\Admin\AppData\Local\Temp\2371.tmp"67⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\23EE.tmp"C:\Users\Admin\AppData\Local\Temp\23EE.tmp"68⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\247B.tmp"C:\Users\Admin\AppData\Local\Temp\247B.tmp"69⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"70⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\25A4.tmp"C:\Users\Admin\AppData\Local\Temp\25A4.tmp"71⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"72⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"73⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"74⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"75⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\2872.tmp"C:\Users\Admin\AppData\Local\Temp\2872.tmp"76⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"77⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"78⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"79⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"80⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"81⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"82⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2C1C.tmp"C:\Users\Admin\AppData\Local\Temp\2C1C.tmp"83⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"84⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2D45.tmp"C:\Users\Admin\AppData\Local\Temp\2D45.tmp"85⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"86⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"87⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\2F58.tmp"C:\Users\Admin\AppData\Local\Temp\2F58.tmp"88⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"89⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"90⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\30EE.tmp"C:\Users\Admin\AppData\Local\Temp\30EE.tmp"91⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\318B.tmp"C:\Users\Admin\AppData\Local\Temp\318B.tmp"92⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"93⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"94⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"95⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"96⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"97⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"98⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"99⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"100⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"101⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\3757.tmp"C:\Users\Admin\AppData\Local\Temp\3757.tmp"102⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\37E4.tmp"C:\Users\Admin\AppData\Local\Temp\37E4.tmp"103⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\3861.tmp"C:\Users\Admin\AppData\Local\Temp\3861.tmp"104⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"105⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"106⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\3A35.tmp"C:\Users\Admin\AppData\Local\Temp\3A35.tmp"107⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"108⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"109⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"110⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"111⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"112⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"113⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"114⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"115⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"116⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"117⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"118⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\41E6.tmp"C:\Users\Admin\AppData\Local\Temp\41E6.tmp"119⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\4282.tmp"C:\Users\Admin\AppData\Local\Temp\4282.tmp"120⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"121⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"122⤵PID:1440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-