Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 14:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe
-
Size
486KB
-
MD5
963b36f3516a70ce9bbb0edea0d1788a
-
SHA1
df671de8a6fba5c95a9a2922452af52cd2cf58d2
-
SHA256
a559ae3860e6848671bccbdadde51e4a8d159b3927a3cbbda399cdf0b8780444
-
SHA512
714f33b3d63c23cd724b149ee43474c6250ab2a742199862af61bdbe3b29e08d5e0c1785f7bedbd99e89fa530a0a339898d921648b7755f664417c9e489042e4
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7VBtEMadLdYz2u+Fv1DnUJ8Q9CVmRJiI+nN98:/U5rCOTeiDVnadqz2nj7Q9kmb2uNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4524 26DC.tmp 4068 27B7.tmp 5064 28A1.tmp 4468 298C.tmp 1312 2A95.tmp 1840 2B51.tmp 4004 2C0C.tmp 4020 2CC8.tmp 4620 2D64.tmp 4792 2E3F.tmp 2696 2F0A.tmp 4820 2F87.tmp 2356 3062.tmp 3932 312D.tmp 2152 32D3.tmp 892 339E.tmp 2008 342A.tmp 3384 34C7.tmp 4952 3573.tmp 1764 361E.tmp 4656 36DA.tmp 3808 3776.tmp 2848 3841.tmp 4384 38DE.tmp 2172 39B8.tmp 2268 3A64.tmp 3632 3AF1.tmp 4008 3B7D.tmp 1116 3C29.tmp 4292 3CE5.tmp 1932 3DA0.tmp 2592 3EAA.tmp 1036 3FB4.tmp 2712 407F.tmp 3188 4169.tmp 808 4234.tmp 4688 431F.tmp 2316 4409.tmp 5096 4532.tmp 4976 4716.tmp 536 482F.tmp 2596 4949.tmp 3904 49D5.tmp 960 4A62.tmp 3324 4ADF.tmp 908 4B7B.tmp 3460 4C27.tmp 1064 4CA4.tmp 464 4D6F.tmp 2164 4DFC.tmp 2272 4E98.tmp 4176 4F34.tmp 1264 4FFF.tmp 3724 50CB.tmp 3832 5186.tmp 3824 5222.tmp 3992 52CE.tmp 1596 534B.tmp 4020 53C8.tmp 1196 5436.tmp 2336 54D2.tmp 456 555E.tmp 4932 560A.tmp 1884 5697.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 4524 1264 963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe 82 PID 1264 wrote to memory of 4524 1264 963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe 82 PID 1264 wrote to memory of 4524 1264 963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe 82 PID 4524 wrote to memory of 4068 4524 26DC.tmp 83 PID 4524 wrote to memory of 4068 4524 26DC.tmp 83 PID 4524 wrote to memory of 4068 4524 26DC.tmp 83 PID 4068 wrote to memory of 5064 4068 27B7.tmp 84 PID 4068 wrote to memory of 5064 4068 27B7.tmp 84 PID 4068 wrote to memory of 5064 4068 27B7.tmp 84 PID 5064 wrote to memory of 4468 5064 28A1.tmp 85 PID 5064 wrote to memory of 4468 5064 28A1.tmp 85 PID 5064 wrote to memory of 4468 5064 28A1.tmp 85 PID 4468 wrote to memory of 1312 4468 298C.tmp 86 PID 4468 wrote to memory of 1312 4468 298C.tmp 86 PID 4468 wrote to memory of 1312 4468 298C.tmp 86 PID 1312 wrote to memory of 1840 1312 2A95.tmp 87 PID 1312 wrote to memory of 1840 1312 2A95.tmp 87 PID 1312 wrote to memory of 1840 1312 2A95.tmp 87 PID 1840 wrote to memory of 4004 1840 2B51.tmp 88 PID 1840 wrote to memory of 4004 1840 2B51.tmp 88 PID 1840 wrote to memory of 4004 1840 2B51.tmp 88 PID 4004 wrote to memory of 4020 4004 2C0C.tmp 89 PID 4004 wrote to memory of 4020 4004 2C0C.tmp 89 PID 4004 wrote to memory of 4020 4004 2C0C.tmp 89 PID 4020 wrote to memory of 4620 4020 2CC8.tmp 90 PID 4020 wrote to memory of 4620 4020 2CC8.tmp 90 PID 4020 wrote to memory of 4620 4020 2CC8.tmp 90 PID 4620 wrote to memory of 4792 4620 2D64.tmp 91 PID 4620 wrote to memory of 4792 4620 2D64.tmp 91 PID 4620 wrote to memory of 4792 4620 2D64.tmp 91 PID 4792 wrote to memory of 2696 4792 2E3F.tmp 93 PID 4792 wrote to memory of 2696 4792 2E3F.tmp 93 PID 4792 wrote to memory of 2696 4792 2E3F.tmp 93 PID 2696 wrote to memory of 4820 2696 2F0A.tmp 94 PID 2696 wrote to memory of 4820 2696 2F0A.tmp 94 PID 2696 wrote to memory of 4820 2696 2F0A.tmp 94 PID 4820 wrote to memory of 2356 4820 2F87.tmp 95 PID 4820 wrote to memory of 2356 4820 2F87.tmp 95 PID 4820 wrote to memory of 2356 4820 2F87.tmp 95 PID 2356 wrote to memory of 3932 2356 3062.tmp 96 PID 2356 wrote to memory of 3932 2356 3062.tmp 96 PID 2356 wrote to memory of 3932 2356 3062.tmp 96 PID 3932 wrote to memory of 2152 3932 312D.tmp 97 PID 3932 wrote to memory of 2152 3932 312D.tmp 97 PID 3932 wrote to memory of 2152 3932 312D.tmp 97 PID 2152 wrote to memory of 892 2152 32D3.tmp 98 PID 2152 wrote to memory of 892 2152 32D3.tmp 98 PID 2152 wrote to memory of 892 2152 32D3.tmp 98 PID 892 wrote to memory of 2008 892 339E.tmp 99 PID 892 wrote to memory of 2008 892 339E.tmp 99 PID 892 wrote to memory of 2008 892 339E.tmp 99 PID 2008 wrote to memory of 3384 2008 342A.tmp 100 PID 2008 wrote to memory of 3384 2008 342A.tmp 100 PID 2008 wrote to memory of 3384 2008 342A.tmp 100 PID 3384 wrote to memory of 4952 3384 34C7.tmp 103 PID 3384 wrote to memory of 4952 3384 34C7.tmp 103 PID 3384 wrote to memory of 4952 3384 34C7.tmp 103 PID 4952 wrote to memory of 1764 4952 3573.tmp 104 PID 4952 wrote to memory of 1764 4952 3573.tmp 104 PID 4952 wrote to memory of 1764 4952 3573.tmp 104 PID 1764 wrote to memory of 4656 1764 361E.tmp 105 PID 1764 wrote to memory of 4656 1764 361E.tmp 105 PID 1764 wrote to memory of 4656 1764 361E.tmp 105 PID 4656 wrote to memory of 3808 4656 36DA.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\963b36f3516a70ce9bbb0edea0d1788a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\26DC.tmp"C:\Users\Admin\AppData\Local\Temp\26DC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\28A1.tmp"C:\Users\Admin\AppData\Local\Temp\28A1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\2CC8.tmp"C:\Users\Admin\AppData\Local\Temp\2CC8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3573.tmp"C:\Users\Admin\AppData\Local\Temp\3573.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3776.tmp"C:\Users\Admin\AppData\Local\Temp\3776.tmp"23⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\3841.tmp"C:\Users\Admin\AppData\Local\Temp\3841.tmp"24⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"25⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"26⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"27⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"28⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"29⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"30⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"31⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"32⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"33⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"C:\Users\Admin\AppData\Local\Temp\3FB4.tmp"34⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"35⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"36⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\4234.tmp"C:\Users\Admin\AppData\Local\Temp\4234.tmp"37⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"38⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\4409.tmp"C:\Users\Admin\AppData\Local\Temp\4409.tmp"39⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"40⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"41⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\482F.tmp"C:\Users\Admin\AppData\Local\Temp\482F.tmp"42⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"43⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\49D5.tmp"C:\Users\Admin\AppData\Local\Temp\49D5.tmp"44⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\4A62.tmp"C:\Users\Admin\AppData\Local\Temp\4A62.tmp"45⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\4ADF.tmp"C:\Users\Admin\AppData\Local\Temp\4ADF.tmp"46⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\4B7B.tmp"C:\Users\Admin\AppData\Local\Temp\4B7B.tmp"47⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\4C27.tmp"C:\Users\Admin\AppData\Local\Temp\4C27.tmp"48⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"49⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"50⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"51⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\4E98.tmp"C:\Users\Admin\AppData\Local\Temp\4E98.tmp"52⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"53⤵
- Executes dropped EXE
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"54⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\50CB.tmp"C:\Users\Admin\AppData\Local\Temp\50CB.tmp"55⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\5186.tmp"C:\Users\Admin\AppData\Local\Temp\5186.tmp"56⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"57⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"58⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"59⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"60⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\5436.tmp"C:\Users\Admin\AppData\Local\Temp\5436.tmp"61⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\54D2.tmp"C:\Users\Admin\AppData\Local\Temp\54D2.tmp"62⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\555E.tmp"C:\Users\Admin\AppData\Local\Temp\555E.tmp"63⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\560A.tmp"C:\Users\Admin\AppData\Local\Temp\560A.tmp"64⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\5697.tmp"C:\Users\Admin\AppData\Local\Temp\5697.tmp"65⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"66⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\57B0.tmp"C:\Users\Admin\AppData\Local\Temp\57B0.tmp"67⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\584C.tmp"C:\Users\Admin\AppData\Local\Temp\584C.tmp"68⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"69⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"70⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\59F2.tmp"C:\Users\Admin\AppData\Local\Temp\59F2.tmp"71⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"72⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"73⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"74⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"75⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"76⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"77⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"78⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\5ED4.tmp"C:\Users\Admin\AppData\Local\Temp\5ED4.tmp"79⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\5F61.tmp"C:\Users\Admin\AppData\Local\Temp\5F61.tmp"80⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"81⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\604B.tmp"C:\Users\Admin\AppData\Local\Temp\604B.tmp"82⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\60C8.tmp"C:\Users\Admin\AppData\Local\Temp\60C8.tmp"83⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"84⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\61C2.tmp"C:\Users\Admin\AppData\Local\Temp\61C2.tmp"85⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\626E.tmp"C:\Users\Admin\AppData\Local\Temp\626E.tmp"86⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"87⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\63A7.tmp"C:\Users\Admin\AppData\Local\Temp\63A7.tmp"88⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\6443.tmp"C:\Users\Admin\AppData\Local\Temp\6443.tmp"89⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"90⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\659B.tmp"C:\Users\Admin\AppData\Local\Temp\659B.tmp"91⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\6656.tmp"C:\Users\Admin\AppData\Local\Temp\6656.tmp"92⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\6702.tmp"C:\Users\Admin\AppData\Local\Temp\6702.tmp"93⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\67BE.tmp"C:\Users\Admin\AppData\Local\Temp\67BE.tmp"94⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\6869.tmp"C:\Users\Admin\AppData\Local\Temp\6869.tmp"95⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\68F6.tmp"C:\Users\Admin\AppData\Local\Temp\68F6.tmp"96⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"97⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\6A4E.tmp"C:\Users\Admin\AppData\Local\Temp\6A4E.tmp"98⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"99⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\6B86.tmp"C:\Users\Admin\AppData\Local\Temp\6B86.tmp"100⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\6C23.tmp"C:\Users\Admin\AppData\Local\Temp\6C23.tmp"101⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp"C:\Users\Admin\AppData\Local\Temp\6CBF.tmp"102⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\6D4B.tmp"C:\Users\Admin\AppData\Local\Temp\6D4B.tmp"103⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\6E17.tmp"C:\Users\Admin\AppData\Local\Temp\6E17.tmp"104⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\6E94.tmp"C:\Users\Admin\AppData\Local\Temp\6E94.tmp"105⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6F3F.tmp"C:\Users\Admin\AppData\Local\Temp\6F3F.tmp"106⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"107⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\7059.tmp"C:\Users\Admin\AppData\Local\Temp\7059.tmp"108⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\70D6.tmp"C:\Users\Admin\AppData\Local\Temp\70D6.tmp"109⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\7191.tmp"C:\Users\Admin\AppData\Local\Temp\7191.tmp"110⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\724D.tmp"C:\Users\Admin\AppData\Local\Temp\724D.tmp"111⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\72D9.tmp"C:\Users\Admin\AppData\Local\Temp\72D9.tmp"112⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"113⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\7441.tmp"C:\Users\Admin\AppData\Local\Temp\7441.tmp"114⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\74CD.tmp"C:\Users\Admin\AppData\Local\Temp\74CD.tmp"115⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\755A.tmp"C:\Users\Admin\AppData\Local\Temp\755A.tmp"116⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\75D7.tmp"C:\Users\Admin\AppData\Local\Temp\75D7.tmp"117⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\7683.tmp"C:\Users\Admin\AppData\Local\Temp\7683.tmp"118⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\772F.tmp"C:\Users\Admin\AppData\Local\Temp\772F.tmp"119⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\77EA.tmp"C:\Users\Admin\AppData\Local\Temp\77EA.tmp"120⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\7886.tmp"C:\Users\Admin\AppData\Local\Temp\7886.tmp"121⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\7913.tmp"C:\Users\Admin\AppData\Local\Temp\7913.tmp"122⤵PID:3336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-