Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2023 15:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe
-
Size
488KB
-
MD5
2f54e8dfe723017e8d04d830cf2797b3
-
SHA1
e0c5720588f84c87cb73be6d726c53de5be93b7d
-
SHA256
a67e2f54ef4efd9b33aeb031633476bbe69e217727216fd7b5d0030a17a262e2
-
SHA512
f1d97b53861d8380e8b6f3d741f17079ba3428d9c8ba886e0fabc8032c59f8954230ed8dc528a211186b5952e3bbe3ab07c3fcc15e9f81f91a5ab2423b3e7aee
-
SSDEEP
12288:/U5rCOTeiDdT2tP5nbPuboNJr2/cj8NZ:/UQOJDdT215nkoNo/LN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4684 C488.tmp 2748 C573.tmp 4976 C62E.tmp 4672 C757.tmp 4496 D503.tmp 876 D59F.tmp 3892 D63C.tmp 4308 D6D8.tmp 3608 D764.tmp 4236 D85E.tmp 3644 D91A.tmp 4536 D9E5.tmp 2304 DAB0.tmp 1256 DCE3.tmp 3768 DDAE.tmp 2484 DE69.tmp 4576 DF63.tmp 4372 E687.tmp 1376 E724.tmp 1912 EA7F.tmp 4708 EAFC.tmp 1984 EB79.tmp 4492 EBE6.tmp 4432 EC73.tmp 1672 EDCB.tmp 2760 EE86.tmp 1624 EF51.tmp 5072 F01D.tmp 1952 F0A9.tmp 3332 F155.tmp 1652 F1F1.tmp 3308 FB48.tmp 568 FD2C.tmp 4028 FDA9.tmp 2088 FE46.tmp 4768 FEF1.tmp 396 FF9D.tmp 968 2A.tmp 2808 A7.tmp 1908 C01.tmp 4280 1141.tmp 3656 11AE.tmp 1308 15F4.tmp 3796 1671.tmp 4992 16DE.tmp 4348 1C0F.tmp 4960 2296.tmp 4472 291E.tmp 3800 29F9.tmp 3764 2C2C.tmp 2108 2DB2.tmp 3940 34C7.tmp 2680 36AB.tmp 4496 395B.tmp 876 3AF1.tmp 3440 3CD5.tmp 1228 3ED9.tmp 3068 42FF.tmp 3572 45FD.tmp 4180 47F1.tmp 1556 489D.tmp 5000 4DDD.tmp 4948 4EB7.tmp 4152 50F9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4684 2156 2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe 82 PID 2156 wrote to memory of 4684 2156 2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe 82 PID 2156 wrote to memory of 4684 2156 2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe 82 PID 4684 wrote to memory of 2748 4684 C488.tmp 83 PID 4684 wrote to memory of 2748 4684 C488.tmp 83 PID 4684 wrote to memory of 2748 4684 C488.tmp 83 PID 2748 wrote to memory of 4976 2748 C573.tmp 84 PID 2748 wrote to memory of 4976 2748 C573.tmp 84 PID 2748 wrote to memory of 4976 2748 C573.tmp 84 PID 4976 wrote to memory of 4672 4976 C62E.tmp 85 PID 4976 wrote to memory of 4672 4976 C62E.tmp 85 PID 4976 wrote to memory of 4672 4976 C62E.tmp 85 PID 4672 wrote to memory of 4496 4672 C757.tmp 86 PID 4672 wrote to memory of 4496 4672 C757.tmp 86 PID 4672 wrote to memory of 4496 4672 C757.tmp 86 PID 4496 wrote to memory of 876 4496 D503.tmp 87 PID 4496 wrote to memory of 876 4496 D503.tmp 87 PID 4496 wrote to memory of 876 4496 D503.tmp 87 PID 876 wrote to memory of 3892 876 D59F.tmp 88 PID 876 wrote to memory of 3892 876 D59F.tmp 88 PID 876 wrote to memory of 3892 876 D59F.tmp 88 PID 3892 wrote to memory of 4308 3892 D63C.tmp 89 PID 3892 wrote to memory of 4308 3892 D63C.tmp 89 PID 3892 wrote to memory of 4308 3892 D63C.tmp 89 PID 4308 wrote to memory of 3608 4308 D6D8.tmp 90 PID 4308 wrote to memory of 3608 4308 D6D8.tmp 90 PID 4308 wrote to memory of 3608 4308 D6D8.tmp 90 PID 3608 wrote to memory of 4236 3608 D764.tmp 91 PID 3608 wrote to memory of 4236 3608 D764.tmp 91 PID 3608 wrote to memory of 4236 3608 D764.tmp 91 PID 4236 wrote to memory of 3644 4236 D85E.tmp 92 PID 4236 wrote to memory of 3644 4236 D85E.tmp 92 PID 4236 wrote to memory of 3644 4236 D85E.tmp 92 PID 3644 wrote to memory of 4536 3644 D91A.tmp 93 PID 3644 wrote to memory of 4536 3644 D91A.tmp 93 PID 3644 wrote to memory of 4536 3644 D91A.tmp 93 PID 4536 wrote to memory of 2304 4536 D9E5.tmp 94 PID 4536 wrote to memory of 2304 4536 D9E5.tmp 94 PID 4536 wrote to memory of 2304 4536 D9E5.tmp 94 PID 2304 wrote to memory of 1256 2304 DAB0.tmp 95 PID 2304 wrote to memory of 1256 2304 DAB0.tmp 95 PID 2304 wrote to memory of 1256 2304 DAB0.tmp 95 PID 1256 wrote to memory of 3768 1256 DCE3.tmp 98 PID 1256 wrote to memory of 3768 1256 DCE3.tmp 98 PID 1256 wrote to memory of 3768 1256 DCE3.tmp 98 PID 3768 wrote to memory of 2484 3768 DDAE.tmp 99 PID 3768 wrote to memory of 2484 3768 DDAE.tmp 99 PID 3768 wrote to memory of 2484 3768 DDAE.tmp 99 PID 2484 wrote to memory of 4576 2484 DE69.tmp 100 PID 2484 wrote to memory of 4576 2484 DE69.tmp 100 PID 2484 wrote to memory of 4576 2484 DE69.tmp 100 PID 4576 wrote to memory of 4372 4576 DF63.tmp 101 PID 4576 wrote to memory of 4372 4576 DF63.tmp 101 PID 4576 wrote to memory of 4372 4576 DF63.tmp 101 PID 4372 wrote to memory of 1376 4372 E687.tmp 103 PID 4372 wrote to memory of 1376 4372 E687.tmp 103 PID 4372 wrote to memory of 1376 4372 E687.tmp 103 PID 1376 wrote to memory of 1912 1376 E724.tmp 104 PID 1376 wrote to memory of 1912 1376 E724.tmp 104 PID 1376 wrote to memory of 1912 1376 E724.tmp 104 PID 1912 wrote to memory of 4708 1912 EA7F.tmp 105 PID 1912 wrote to memory of 4708 1912 EA7F.tmp 105 PID 1912 wrote to memory of 4708 1912 EA7F.tmp 105 PID 4708 wrote to memory of 1984 4708 EAFC.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2f54e8dfe723017e8d04d830cf2797b3_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\C488.tmp"C:\Users\Admin\AppData\Local\Temp\C488.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\C573.tmp"C:\Users\Admin\AppData\Local\Temp\C573.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\C62E.tmp"C:\Users\Admin\AppData\Local\Temp\C62E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\D59F.tmp"C:\Users\Admin\AppData\Local\Temp\D59F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\EB79.tmp"C:\Users\Admin\AppData\Local\Temp\EB79.tmp"23⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"24⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"25⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"26⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"27⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\EF51.tmp"C:\Users\Admin\AppData\Local\Temp\EF51.tmp"28⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"29⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"30⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\F155.tmp"C:\Users\Admin\AppData\Local\Temp\F155.tmp"31⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"32⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"33⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"34⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"35⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\FE46.tmp"C:\Users\Admin\AppData\Local\Temp\FE46.tmp"36⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"37⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"38⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\2A.tmp"C:\Users\Admin\AppData\Local\Temp\2A.tmp"39⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\A7.tmp"C:\Users\Admin\AppData\Local\Temp\A7.tmp"40⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"41⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"42⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"43⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"44⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"45⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"46⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"47⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"48⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\291E.tmp"C:\Users\Admin\AppData\Local\Temp\291E.tmp"49⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"50⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"51⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"52⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"53⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"54⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\395B.tmp"C:\Users\Admin\AppData\Local\Temp\395B.tmp"55⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"56⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"57⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"58⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\42FF.tmp"C:\Users\Admin\AppData\Local\Temp\42FF.tmp"59⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\45FD.tmp"C:\Users\Admin\AppData\Local\Temp\45FD.tmp"60⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"61⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\489D.tmp"C:\Users\Admin\AppData\Local\Temp\489D.tmp"62⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\4DDD.tmp"C:\Users\Admin\AppData\Local\Temp\4DDD.tmp"63⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\4EB7.tmp"C:\Users\Admin\AppData\Local\Temp\4EB7.tmp"64⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"65⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\51B5.tmp"C:\Users\Admin\AppData\Local\Temp\51B5.tmp"66⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"67⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\5714.tmp"C:\Users\Admin\AppData\Local\Temp\5714.tmp"68⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\59A4.tmp"C:\Users\Admin\AppData\Local\Temp\59A4.tmp"69⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"70⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"71⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"72⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\5C73.tmp"C:\Users\Admin\AppData\Local\Temp\5C73.tmp"73⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"74⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"75⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"76⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\5FFD.tmp"C:\Users\Admin\AppData\Local\Temp\5FFD.tmp"77⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\606B.tmp"C:\Users\Admin\AppData\Local\Temp\606B.tmp"78⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\60F7.tmp"C:\Users\Admin\AppData\Local\Temp\60F7.tmp"79⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\6193.tmp"C:\Users\Admin\AppData\Local\Temp\6193.tmp"80⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"81⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\629D.tmp"C:\Users\Admin\AppData\Local\Temp\629D.tmp"82⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\6339.tmp"C:\Users\Admin\AppData\Local\Temp\6339.tmp"83⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\63B6.tmp"C:\Users\Admin\AppData\Local\Temp\63B6.tmp"84⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"85⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\64B0.tmp"C:\Users\Admin\AppData\Local\Temp\64B0.tmp"86⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\653D.tmp"C:\Users\Admin\AppData\Local\Temp\653D.tmp"87⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\65AA.tmp"C:\Users\Admin\AppData\Local\Temp\65AA.tmp"88⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\6637.tmp"C:\Users\Admin\AppData\Local\Temp\6637.tmp"89⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\66C4.tmp"C:\Users\Admin\AppData\Local\Temp\66C4.tmp"90⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\685A.tmp"C:\Users\Admin\AppData\Local\Temp\685A.tmp"91⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\68D7.tmp"C:\Users\Admin\AppData\Local\Temp\68D7.tmp"92⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\6954.tmp"C:\Users\Admin\AppData\Local\Temp\6954.tmp"93⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\6B67.tmp"C:\Users\Admin\AppData\Local\Temp\6B67.tmp"94⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"95⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\6C90.tmp"C:\Users\Admin\AppData\Local\Temp\6C90.tmp"96⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"97⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"98⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\6E36.tmp"C:\Users\Admin\AppData\Local\Temp\6E36.tmp"99⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"100⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"101⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\6FDC.tmp"C:\Users\Admin\AppData\Local\Temp\6FDC.tmp"102⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\7059.tmp"C:\Users\Admin\AppData\Local\Temp\7059.tmp"103⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\70E5.tmp"C:\Users\Admin\AppData\Local\Temp\70E5.tmp"104⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\7191.tmp"C:\Users\Admin\AppData\Local\Temp\7191.tmp"105⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\723D.tmp"C:\Users\Admin\AppData\Local\Temp\723D.tmp"106⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\72BA.tmp"C:\Users\Admin\AppData\Local\Temp\72BA.tmp"107⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"108⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"109⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7460.tmp"C:\Users\Admin\AppData\Local\Temp\7460.tmp"110⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\74DD.tmp"C:\Users\Admin\AppData\Local\Temp\74DD.tmp"111⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\7589.tmp"C:\Users\Admin\AppData\Local\Temp\7589.tmp"112⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\7625.tmp"C:\Users\Admin\AppData\Local\Temp\7625.tmp"113⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\7692.tmp"C:\Users\Admin\AppData\Local\Temp\7692.tmp"114⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\76F0.tmp"C:\Users\Admin\AppData\Local\Temp\76F0.tmp"115⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\776D.tmp"C:\Users\Admin\AppData\Local\Temp\776D.tmp"116⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\7809.tmp"C:\Users\Admin\AppData\Local\Temp\7809.tmp"117⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\7896.tmp"C:\Users\Admin\AppData\Local\Temp\7896.tmp"118⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\7952.tmp"C:\Users\Admin\AppData\Local\Temp\7952.tmp"119⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"120⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"121⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\7B36.tmp"C:\Users\Admin\AppData\Local\Temp\7B36.tmp"122⤵PID:4100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-