Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2023 17:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6223f3f1f318889286f50d313cb9faec_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6223f3f1f318889286f50d313cb9faec_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
6223f3f1f318889286f50d313cb9faec_mafia_JC.exe
-
Size
486KB
-
MD5
6223f3f1f318889286f50d313cb9faec
-
SHA1
b7447261d836a42005f68c09a7705d2d620afcf2
-
SHA256
db6f9047c364625effa0287f7c5a4e70d5137b13dae0f9b387f662acd48aebf3
-
SHA512
318b8b92297b0d728e73fade1cd3d16c63b5e06206a26aa89eb989ea590dda81a1c3cde52e412301606abf48e9c1edb63ff24ebca70584cea8dc4c3ac384440f
-
SSDEEP
12288:/U5rCOTeiD3eVWSt7Djk9+2nwxEvsM/DhKfIgqVNZ:/UQOJD3tfv/dPgeN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 868 B9EA.tmp 4116 BA95.tmp 2328 BB8F.tmp 4912 BC99.tmp 1128 BD35.tmp 2200 BE20.tmp 4776 BECC.tmp 2136 BF58.tmp 660 C014.tmp 3648 C0FE.tmp 4952 C1BA.tmp 2604 C294.tmp 2028 C4C7.tmp 408 C573.tmp 2068 C61F.tmp 4080 C747.tmp 4792 C851.tmp 4936 C92C.tmp 2844 CA35.tmp 2208 CB10.tmp 4488 CBAC.tmp 4920 CC97.tmp 4884 CD33.tmp 5024 CDC0.tmp 2172 CE8B.tmp 4516 CF94.tmp 4680 D07F.tmp 5096 D169.tmp 952 D234.tmp 4396 D2FF.tmp 1304 D38C.tmp 1372 D496.tmp 4124 D580.tmp 2668 D60D.tmp 1028 D6C8.tmp 440 D793.tmp 4204 D83F.tmp 3360 D968.tmp 1192 DA14.tmp 1620 DAA1.tmp 324 DB2D.tmp 4472 DBC9.tmp 3148 DC66.tmp 2972 DD12.tmp 2212 DD9E.tmp 2396 DE0C.tmp 2712 DEB7.tmp 1508 DF34.tmp 2996 DFC1.tmp 3036 E03E.tmp 232 E0BB.tmp 2184 E128.tmp 2160 E1B5.tmp 3868 E242.tmp 4320 E2BF.tmp 376 E38A.tmp 4208 E465.tmp 2940 E4F1.tmp 2088 E56E.tmp 4244 E5EB.tmp 3768 E6A7.tmp 4688 E733.tmp 2512 E7B0.tmp 4112 E83D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 868 4688 6223f3f1f318889286f50d313cb9faec_mafia_JC.exe 81 PID 4688 wrote to memory of 868 4688 6223f3f1f318889286f50d313cb9faec_mafia_JC.exe 81 PID 4688 wrote to memory of 868 4688 6223f3f1f318889286f50d313cb9faec_mafia_JC.exe 81 PID 868 wrote to memory of 4116 868 B9EA.tmp 82 PID 868 wrote to memory of 4116 868 B9EA.tmp 82 PID 868 wrote to memory of 4116 868 B9EA.tmp 82 PID 4116 wrote to memory of 2328 4116 BA95.tmp 83 PID 4116 wrote to memory of 2328 4116 BA95.tmp 83 PID 4116 wrote to memory of 2328 4116 BA95.tmp 83 PID 2328 wrote to memory of 4912 2328 BB8F.tmp 84 PID 2328 wrote to memory of 4912 2328 BB8F.tmp 84 PID 2328 wrote to memory of 4912 2328 BB8F.tmp 84 PID 4912 wrote to memory of 1128 4912 BC99.tmp 85 PID 4912 wrote to memory of 1128 4912 BC99.tmp 85 PID 4912 wrote to memory of 1128 4912 BC99.tmp 85 PID 1128 wrote to memory of 2200 1128 BD35.tmp 86 PID 1128 wrote to memory of 2200 1128 BD35.tmp 86 PID 1128 wrote to memory of 2200 1128 BD35.tmp 86 PID 2200 wrote to memory of 4776 2200 BE20.tmp 87 PID 2200 wrote to memory of 4776 2200 BE20.tmp 87 PID 2200 wrote to memory of 4776 2200 BE20.tmp 87 PID 4776 wrote to memory of 2136 4776 BECC.tmp 88 PID 4776 wrote to memory of 2136 4776 BECC.tmp 88 PID 4776 wrote to memory of 2136 4776 BECC.tmp 88 PID 2136 wrote to memory of 660 2136 BF58.tmp 89 PID 2136 wrote to memory of 660 2136 BF58.tmp 89 PID 2136 wrote to memory of 660 2136 BF58.tmp 89 PID 660 wrote to memory of 3648 660 C014.tmp 91 PID 660 wrote to memory of 3648 660 C014.tmp 91 PID 660 wrote to memory of 3648 660 C014.tmp 91 PID 3648 wrote to memory of 4952 3648 C0FE.tmp 92 PID 3648 wrote to memory of 4952 3648 C0FE.tmp 92 PID 3648 wrote to memory of 4952 3648 C0FE.tmp 92 PID 4952 wrote to memory of 2604 4952 C1BA.tmp 93 PID 4952 wrote to memory of 2604 4952 C1BA.tmp 93 PID 4952 wrote to memory of 2604 4952 C1BA.tmp 93 PID 2604 wrote to memory of 2028 2604 C294.tmp 94 PID 2604 wrote to memory of 2028 2604 C294.tmp 94 PID 2604 wrote to memory of 2028 2604 C294.tmp 94 PID 2028 wrote to memory of 408 2028 C4C7.tmp 95 PID 2028 wrote to memory of 408 2028 C4C7.tmp 95 PID 2028 wrote to memory of 408 2028 C4C7.tmp 95 PID 408 wrote to memory of 2068 408 C573.tmp 96 PID 408 wrote to memory of 2068 408 C573.tmp 96 PID 408 wrote to memory of 2068 408 C573.tmp 96 PID 2068 wrote to memory of 4080 2068 C61F.tmp 97 PID 2068 wrote to memory of 4080 2068 C61F.tmp 97 PID 2068 wrote to memory of 4080 2068 C61F.tmp 97 PID 4080 wrote to memory of 4792 4080 C747.tmp 98 PID 4080 wrote to memory of 4792 4080 C747.tmp 98 PID 4080 wrote to memory of 4792 4080 C747.tmp 98 PID 4792 wrote to memory of 4936 4792 C851.tmp 99 PID 4792 wrote to memory of 4936 4792 C851.tmp 99 PID 4792 wrote to memory of 4936 4792 C851.tmp 99 PID 4936 wrote to memory of 2844 4936 C92C.tmp 100 PID 4936 wrote to memory of 2844 4936 C92C.tmp 100 PID 4936 wrote to memory of 2844 4936 C92C.tmp 100 PID 2844 wrote to memory of 2208 2844 CA35.tmp 101 PID 2844 wrote to memory of 2208 2844 CA35.tmp 101 PID 2844 wrote to memory of 2208 2844 CA35.tmp 101 PID 2208 wrote to memory of 4488 2208 CB10.tmp 102 PID 2208 wrote to memory of 4488 2208 CB10.tmp 102 PID 2208 wrote to memory of 4488 2208 CB10.tmp 102 PID 4488 wrote to memory of 4920 4488 CBAC.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6223f3f1f318889286f50d313cb9faec_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\6223f3f1f318889286f50d313cb9faec_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\BA95.tmp"C:\Users\Admin\AppData\Local\Temp\BA95.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\BC99.tmp"C:\Users\Admin\AppData\Local\Temp\BC99.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\BE20.tmp"C:\Users\Admin\AppData\Local\Temp\BE20.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\BF58.tmp"C:\Users\Admin\AppData\Local\Temp\BF58.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\C1BA.tmp"C:\Users\Admin\AppData\Local\Temp\C1BA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\C294.tmp"C:\Users\Admin\AppData\Local\Temp\C294.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\C4C7.tmp"C:\Users\Admin\AppData\Local\Temp\C4C7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\C573.tmp"C:\Users\Admin\AppData\Local\Temp\C573.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\C61F.tmp"C:\Users\Admin\AppData\Local\Temp\C61F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\C747.tmp"C:\Users\Admin\AppData\Local\Temp\C747.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\C851.tmp"C:\Users\Admin\AppData\Local\Temp\C851.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\C92C.tmp"C:\Users\Admin\AppData\Local\Temp\C92C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"23⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\CD33.tmp"C:\Users\Admin\AppData\Local\Temp\CD33.tmp"24⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"25⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"26⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\CF94.tmp"C:\Users\Admin\AppData\Local\Temp\CF94.tmp"27⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\D07F.tmp"C:\Users\Admin\AppData\Local\Temp\D07F.tmp"28⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\D169.tmp"C:\Users\Admin\AppData\Local\Temp\D169.tmp"29⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"30⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"31⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\D38C.tmp"C:\Users\Admin\AppData\Local\Temp\D38C.tmp"32⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"33⤵
- Executes dropped EXE
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"34⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\D60D.tmp"C:\Users\Admin\AppData\Local\Temp\D60D.tmp"35⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"36⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\D793.tmp"C:\Users\Admin\AppData\Local\Temp\D793.tmp"37⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\D83F.tmp"C:\Users\Admin\AppData\Local\Temp\D83F.tmp"38⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\D968.tmp"C:\Users\Admin\AppData\Local\Temp\D968.tmp"39⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\DA14.tmp"C:\Users\Admin\AppData\Local\Temp\DA14.tmp"40⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"41⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"42⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"43⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"44⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"45⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"46⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"47⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"48⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"49⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"50⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"51⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"52⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\E128.tmp"C:\Users\Admin\AppData\Local\Temp\E128.tmp"53⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"54⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"55⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"56⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\E38A.tmp"C:\Users\Admin\AppData\Local\Temp\E38A.tmp"57⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"58⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"59⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"60⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"61⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"62⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\E733.tmp"C:\Users\Admin\AppData\Local\Temp\E733.tmp"63⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"64⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"65⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"66⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\E918.tmp"C:\Users\Admin\AppData\Local\Temp\E918.tmp"67⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"68⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\EA12.tmp"C:\Users\Admin\AppData\Local\Temp\EA12.tmp"69⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"70⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"71⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"72⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"73⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"74⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"75⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"76⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"77⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"78⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"79⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\F155.tmp"C:\Users\Admin\AppData\Local\Temp\F155.tmp"80⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\F201.tmp"C:\Users\Admin\AppData\Local\Temp\F201.tmp"81⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"82⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\F359.tmp"C:\Users\Admin\AppData\Local\Temp\F359.tmp"83⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"84⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"85⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"86⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"87⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"88⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\F770.tmp"C:\Users\Admin\AppData\Local\Temp\F770.tmp"89⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"90⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"91⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"92⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\F9E1.tmp"C:\Users\Admin\AppData\Local\Temp\F9E1.tmp"93⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"94⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\FB19.tmp"C:\Users\Admin\AppData\Local\Temp\FB19.tmp"95⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"96⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"97⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"98⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"99⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"100⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"101⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"102⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\B.tmp"C:\Users\Admin\AppData\Local\Temp\B.tmp"103⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"104⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"105⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\1A1.tmp"C:\Users\Admin\AppData\Local\Temp\1A1.tmp"106⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"107⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"108⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\318.tmp"C:\Users\Admin\AppData\Local\Temp\318.tmp"109⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"110⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\48F.tmp"C:\Users\Admin\AppData\Local\Temp\48F.tmp"111⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"112⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"113⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"114⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"115⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\79C.tmp"C:\Users\Admin\AppData\Local\Temp\79C.tmp"116⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"117⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\904.tmp"C:\Users\Admin\AppData\Local\Temp\904.tmp"118⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"119⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"120⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\AD8.tmp"C:\Users\Admin\AppData\Local\Temp\AD8.tmp"121⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\B65.tmp"C:\Users\Admin\AppData\Local\Temp\B65.tmp"122⤵PID:2476
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-