Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 10:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe
-
Size
488KB
-
MD5
4f19fb27aca9d3cbe545affacc862d57
-
SHA1
5fa13dc41ad9463f9674ed0d384cc7e91c38f60e
-
SHA256
720c4896650115cfdb4b397f9fee18711eb07364f4dd1455fdead60a723d5795
-
SHA512
fa0f7ed616126bd2bfe69f75fd361dd102ca35fe0040ba62d19b1cb44a4d2ec012d35ec0d489642e7d5611feec3104f092b8c2ff3d3d578d631e57eb6d911e8f
-
SSDEEP
12288:/U5rCOTeiDvX3RQixm3xg2QLd396r6KNZ:/UQOJDPRrAg2yLkN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2876 EE77.tmp 4480 EF61.tmp 4092 F01D.tmp 2720 F136.tmp 1968 F1F1.tmp 4888 F28E.tmp 3652 F397.tmp 4368 F433.tmp 4428 F4EF.tmp 4308 F5BA.tmp 3836 F685.tmp 4340 F750.tmp 2604 F84A.tmp 1488 F944.tmp 4980 F9F0.tmp 5084 FACB.tmp 3500 FD0D.tmp 4292 FE07.tmp 4088 FEE2.tmp 1212 FFCC.tmp 4780 59.tmp 3084 26C.tmp 1436 356.tmp 468 450.tmp 3780 4FC.tmp 1364 5A8.tmp 4816 6C1.tmp 2804 7BB.tmp 3560 887.tmp 5088 9AF.tmp 604 AB9.tmp 4752 C01.tmp 2800 CBD.tmp 3468 D59.tmp 5092 E05.tmp 1204 EE0.tmp 1004 F7C.tmp 4756 1037.tmp 916 1102.tmp 1512 11ED.tmp 1752 1279.tmp 1216 1325.tmp 4732 1410.tmp 728 14AC.tmp 4104 1558.tmp 1928 1613.tmp 4252 16DE.tmp 3040 178A.tmp 2552 1846.tmp 4916 18D2.tmp 3944 195F.tmp 4168 1A1B.tmp 968 1AB7.tmp 2332 1CAB.tmp 3100 1D47.tmp 4092 1DD4.tmp 2708 1E70.tmp 4272 1F0C.tmp 2780 1FB8.tmp 1080 20E1.tmp 392 22C5.tmp 4428 2381.tmp 2260 242D.tmp 4160 24B9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 2876 4748 4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe 81 PID 4748 wrote to memory of 2876 4748 4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe 81 PID 4748 wrote to memory of 2876 4748 4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe 81 PID 2876 wrote to memory of 4480 2876 EE77.tmp 82 PID 2876 wrote to memory of 4480 2876 EE77.tmp 82 PID 2876 wrote to memory of 4480 2876 EE77.tmp 82 PID 4480 wrote to memory of 4092 4480 EF61.tmp 83 PID 4480 wrote to memory of 4092 4480 EF61.tmp 83 PID 4480 wrote to memory of 4092 4480 EF61.tmp 83 PID 4092 wrote to memory of 2720 4092 F01D.tmp 84 PID 4092 wrote to memory of 2720 4092 F01D.tmp 84 PID 4092 wrote to memory of 2720 4092 F01D.tmp 84 PID 2720 wrote to memory of 1968 2720 F136.tmp 85 PID 2720 wrote to memory of 1968 2720 F136.tmp 85 PID 2720 wrote to memory of 1968 2720 F136.tmp 85 PID 1968 wrote to memory of 4888 1968 F1F1.tmp 86 PID 1968 wrote to memory of 4888 1968 F1F1.tmp 86 PID 1968 wrote to memory of 4888 1968 F1F1.tmp 86 PID 4888 wrote to memory of 3652 4888 F28E.tmp 87 PID 4888 wrote to memory of 3652 4888 F28E.tmp 87 PID 4888 wrote to memory of 3652 4888 F28E.tmp 87 PID 3652 wrote to memory of 4368 3652 F397.tmp 88 PID 3652 wrote to memory of 4368 3652 F397.tmp 88 PID 3652 wrote to memory of 4368 3652 F397.tmp 88 PID 4368 wrote to memory of 4428 4368 F433.tmp 89 PID 4368 wrote to memory of 4428 4368 F433.tmp 89 PID 4368 wrote to memory of 4428 4368 F433.tmp 89 PID 4428 wrote to memory of 4308 4428 F4EF.tmp 90 PID 4428 wrote to memory of 4308 4428 F4EF.tmp 90 PID 4428 wrote to memory of 4308 4428 F4EF.tmp 90 PID 4308 wrote to memory of 3836 4308 F5BA.tmp 92 PID 4308 wrote to memory of 3836 4308 F5BA.tmp 92 PID 4308 wrote to memory of 3836 4308 F5BA.tmp 92 PID 3836 wrote to memory of 4340 3836 F685.tmp 93 PID 3836 wrote to memory of 4340 3836 F685.tmp 93 PID 3836 wrote to memory of 4340 3836 F685.tmp 93 PID 4340 wrote to memory of 2604 4340 F750.tmp 94 PID 4340 wrote to memory of 2604 4340 F750.tmp 94 PID 4340 wrote to memory of 2604 4340 F750.tmp 94 PID 2604 wrote to memory of 1488 2604 F84A.tmp 95 PID 2604 wrote to memory of 1488 2604 F84A.tmp 95 PID 2604 wrote to memory of 1488 2604 F84A.tmp 95 PID 1488 wrote to memory of 4980 1488 F944.tmp 96 PID 1488 wrote to memory of 4980 1488 F944.tmp 96 PID 1488 wrote to memory of 4980 1488 F944.tmp 96 PID 4980 wrote to memory of 5084 4980 F9F0.tmp 97 PID 4980 wrote to memory of 5084 4980 F9F0.tmp 97 PID 4980 wrote to memory of 5084 4980 F9F0.tmp 97 PID 5084 wrote to memory of 3500 5084 FACB.tmp 98 PID 5084 wrote to memory of 3500 5084 FACB.tmp 98 PID 5084 wrote to memory of 3500 5084 FACB.tmp 98 PID 3500 wrote to memory of 4292 3500 FD0D.tmp 99 PID 3500 wrote to memory of 4292 3500 FD0D.tmp 99 PID 3500 wrote to memory of 4292 3500 FD0D.tmp 99 PID 4292 wrote to memory of 4088 4292 FE07.tmp 100 PID 4292 wrote to memory of 4088 4292 FE07.tmp 100 PID 4292 wrote to memory of 4088 4292 FE07.tmp 100 PID 4088 wrote to memory of 1212 4088 FEE2.tmp 103 PID 4088 wrote to memory of 1212 4088 FEE2.tmp 103 PID 4088 wrote to memory of 1212 4088 FEE2.tmp 103 PID 1212 wrote to memory of 4780 1212 FFCC.tmp 104 PID 1212 wrote to memory of 4780 1212 FFCC.tmp 104 PID 1212 wrote to memory of 4780 1212 FFCC.tmp 104 PID 4780 wrote to memory of 3084 4780 59.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\4f19fb27aca9d3cbe545affacc862d57_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\EE77.tmp"C:\Users\Admin\AppData\Local\Temp\EE77.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\EF61.tmp"C:\Users\Admin\AppData\Local\Temp\EF61.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\F685.tmp"C:\Users\Admin\AppData\Local\Temp\F685.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\F84A.tmp"C:\Users\Admin\AppData\Local\Temp\F84A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\F944.tmp"C:\Users\Admin\AppData\Local\Temp\F944.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\FACB.tmp"C:\Users\Admin\AppData\Local\Temp\FACB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"23⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"24⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"25⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"26⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"27⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\6C1.tmp"C:\Users\Admin\AppData\Local\Temp\6C1.tmp"28⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"29⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\887.tmp"C:\Users\Admin\AppData\Local\Temp\887.tmp"30⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"31⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\AB9.tmp"C:\Users\Admin\AppData\Local\Temp\AB9.tmp"32⤵
- Executes dropped EXE
PID:604 -
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"33⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"34⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"35⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"36⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"37⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"38⤵
- Executes dropped EXE
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"39⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"40⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"41⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\1279.tmp"C:\Users\Admin\AppData\Local\Temp\1279.tmp"42⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\1325.tmp"C:\Users\Admin\AppData\Local\Temp\1325.tmp"43⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"44⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\14AC.tmp"C:\Users\Admin\AppData\Local\Temp\14AC.tmp"45⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\1558.tmp"C:\Users\Admin\AppData\Local\Temp\1558.tmp"46⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\1613.tmp"C:\Users\Admin\AppData\Local\Temp\1613.tmp"47⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"48⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\178A.tmp"C:\Users\Admin\AppData\Local\Temp\178A.tmp"49⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\1846.tmp"C:\Users\Admin\AppData\Local\Temp\1846.tmp"50⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"51⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"52⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"53⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"54⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"55⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"56⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"57⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"58⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"59⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"60⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"61⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"62⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"63⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"64⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"65⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\24B9.tmp"C:\Users\Admin\AppData\Local\Temp\24B9.tmp"66⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"67⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"68⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"69⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"70⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2805.tmp"C:\Users\Admin\AppData\Local\Temp\2805.tmp"71⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"72⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\290F.tmp"C:\Users\Admin\AppData\Local\Temp\290F.tmp"73⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"74⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2A47.tmp"C:\Users\Admin\AppData\Local\Temp\2A47.tmp"75⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"76⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\2B60.tmp"C:\Users\Admin\AppData\Local\Temp\2B60.tmp"77⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"78⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"79⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"80⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\2D83.tmp"C:\Users\Admin\AppData\Local\Temp\2D83.tmp"81⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"82⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"83⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"84⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"85⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\30CF.tmp"C:\Users\Admin\AppData\Local\Temp\30CF.tmp"86⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\318B.tmp"C:\Users\Admin\AppData\Local\Temp\318B.tmp"87⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"88⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"89⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"90⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"91⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"92⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"93⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"94⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"95⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"96⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"97⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\38CE.tmp"C:\Users\Admin\AppData\Local\Temp\38CE.tmp"98⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\396A.tmp"C:\Users\Admin\AppData\Local\Temp\396A.tmp"99⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"100⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"101⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"102⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"103⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"104⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\3D62.tmp"C:\Users\Admin\AppData\Local\Temp\3D62.tmp"105⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"106⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"107⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"108⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"109⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"110⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"111⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"112⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\4273.tmp"C:\Users\Admin\AppData\Local\Temp\4273.tmp"113⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\430F.tmp"C:\Users\Admin\AppData\Local\Temp\430F.tmp"114⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"115⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\4467.tmp"C:\Users\Admin\AppData\Local\Temp\4467.tmp"116⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\4522.tmp"C:\Users\Admin\AppData\Local\Temp\4522.tmp"117⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"118⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"119⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\4726.tmp"C:\Users\Admin\AppData\Local\Temp\4726.tmp"120⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\47E1.tmp"C:\Users\Admin\AppData\Local\Temp\47E1.tmp"121⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"122⤵PID:3052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-