Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 17:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe
-
Size
486KB
-
MD5
e50044b09f3ebe498174adae46e6ce9c
-
SHA1
f29be5b5e60556a3d08b03ee7f69ac0820af872d
-
SHA256
4d7ae8bdf1a45cd5ef766270ec1cb6ca2063525510bf049d2b23b641cd9fae93
-
SHA512
20b82c0d006f150d5a7874416cc3aea5b320c6c8859bd58c8e19feb708c06212fdbd4aa4c83c5c3fb8cc9d69773040c6986457b7b1c28ec1f06fcd0e503af643
-
SSDEEP
12288:/U5rCOTeiDogAZXRL3z6pkbQzVMcoANZ:/UQOJDoZ/326coAN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4440 C63E.tmp 2288 C6CA.tmp 3824 C7D4.tmp 4556 C89F.tmp 1876 C95B.tmp 4912 CA16.tmp 648 CAA3.tmp 1652 CB2F.tmp 1968 CBBC.tmp 1368 CC78.tmp 2492 CCF5.tmp 1740 CD72.tmp 2752 CE1D.tmp 4684 CED9.tmp 4800 CF66.tmp 1424 CFD3.tmp 3836 D050.tmp 2432 D1E6.tmp 4648 D273.tmp 1176 D32E.tmp 1052 D3BB.tmp 484 D476.tmp 1864 D4F3.tmp 4432 D570.tmp 476 D5FD.tmp 3448 D699.tmp 4236 D774.tmp 1160 D84F.tmp 2888 D8FB.tmp 692 D978.tmp 4480 DA14.tmp 4272 DAA1.tmp 3560 DBAA.tmp 1856 DC18.tmp 456 DC85.tmp 4156 DCF2.tmp 5080 DE69.tmp 5032 DEE6.tmp 556 DF92.tmp 2444 E00F.tmp 936 E0AB.tmp 2292 E148.tmp 3804 E203.tmp 3852 E280.tmp 812 E31C.tmp 1844 E465.tmp 5028 E510.tmp 4508 E5BC.tmp 384 E639.tmp 2332 E714.tmp 1036 E7B0.tmp 4852 E88B.tmp 1740 E947.tmp 4204 E9F2.tmp 2908 EA9E.tmp 1400 EB4A.tmp 4804 EBE6.tmp 3788 ECA2.tmp 956 ED3E.tmp 3764 EDAC.tmp 3528 EE38.tmp 1608 EED4.tmp 1864 EF51.tmp 1408 EFCE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 4440 1836 2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe 32 PID 1836 wrote to memory of 4440 1836 2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe 32 PID 1836 wrote to memory of 4440 1836 2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe 32 PID 4440 wrote to memory of 2288 4440 C63E.tmp 35 PID 4440 wrote to memory of 2288 4440 C63E.tmp 35 PID 4440 wrote to memory of 2288 4440 C63E.tmp 35 PID 2288 wrote to memory of 3824 2288 C6CA.tmp 39 PID 2288 wrote to memory of 3824 2288 C6CA.tmp 39 PID 2288 wrote to memory of 3824 2288 C6CA.tmp 39 PID 3824 wrote to memory of 4556 3824 C7D4.tmp 41 PID 3824 wrote to memory of 4556 3824 C7D4.tmp 41 PID 3824 wrote to memory of 4556 3824 C7D4.tmp 41 PID 4556 wrote to memory of 1876 4556 C89F.tmp 47 PID 4556 wrote to memory of 1876 4556 C89F.tmp 47 PID 4556 wrote to memory of 1876 4556 C89F.tmp 47 PID 1876 wrote to memory of 4912 1876 C95B.tmp 50 PID 1876 wrote to memory of 4912 1876 C95B.tmp 50 PID 1876 wrote to memory of 4912 1876 C95B.tmp 50 PID 4912 wrote to memory of 648 4912 CA16.tmp 52 PID 4912 wrote to memory of 648 4912 CA16.tmp 52 PID 4912 wrote to memory of 648 4912 CA16.tmp 52 PID 648 wrote to memory of 1652 648 CAA3.tmp 54 PID 648 wrote to memory of 1652 648 CAA3.tmp 54 PID 648 wrote to memory of 1652 648 CAA3.tmp 54 PID 1652 wrote to memory of 1968 1652 CB2F.tmp 53 PID 1652 wrote to memory of 1968 1652 CB2F.tmp 53 PID 1652 wrote to memory of 1968 1652 CB2F.tmp 53 PID 1968 wrote to memory of 1368 1968 CBBC.tmp 60 PID 1968 wrote to memory of 1368 1968 CBBC.tmp 60 PID 1968 wrote to memory of 1368 1968 CBBC.tmp 60 PID 1368 wrote to memory of 2492 1368 CC78.tmp 59 PID 1368 wrote to memory of 2492 1368 CC78.tmp 59 PID 1368 wrote to memory of 2492 1368 CC78.tmp 59 PID 2492 wrote to memory of 1740 2492 CCF5.tmp 61 PID 2492 wrote to memory of 1740 2492 CCF5.tmp 61 PID 2492 wrote to memory of 1740 2492 CCF5.tmp 61 PID 1740 wrote to memory of 2752 1740 CD72.tmp 64 PID 1740 wrote to memory of 2752 1740 CD72.tmp 64 PID 1740 wrote to memory of 2752 1740 CD72.tmp 64 PID 2752 wrote to memory of 4684 2752 CE1D.tmp 70 PID 2752 wrote to memory of 4684 2752 CE1D.tmp 70 PID 2752 wrote to memory of 4684 2752 CE1D.tmp 70 PID 4684 wrote to memory of 4800 4684 CED9.tmp 69 PID 4684 wrote to memory of 4800 4684 CED9.tmp 69 PID 4684 wrote to memory of 4800 4684 CED9.tmp 69 PID 4800 wrote to memory of 1424 4800 CF66.tmp 68 PID 4800 wrote to memory of 1424 4800 CF66.tmp 68 PID 4800 wrote to memory of 1424 4800 CF66.tmp 68 PID 1424 wrote to memory of 3836 1424 CFD3.tmp 67 PID 1424 wrote to memory of 3836 1424 CFD3.tmp 67 PID 1424 wrote to memory of 3836 1424 CFD3.tmp 67 PID 3836 wrote to memory of 2432 3836 D050.tmp 76 PID 3836 wrote to memory of 2432 3836 D050.tmp 76 PID 3836 wrote to memory of 2432 3836 D050.tmp 76 PID 2432 wrote to memory of 4648 2432 D1E6.tmp 78 PID 2432 wrote to memory of 4648 2432 D1E6.tmp 78 PID 2432 wrote to memory of 4648 2432 D1E6.tmp 78 PID 4648 wrote to memory of 1176 4648 D273.tmp 87 PID 4648 wrote to memory of 1176 4648 D273.tmp 87 PID 4648 wrote to memory of 1176 4648 D273.tmp 87 PID 1176 wrote to memory of 1052 1176 D32E.tmp 82 PID 1176 wrote to memory of 1052 1176 D32E.tmp 82 PID 1176 wrote to memory of 1052 1176 D32E.tmp 82 PID 1052 wrote to memory of 484 1052 D3BB.tmp 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_e50044b09f3ebe498174adae46e6ce9c_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\C63E.tmp"C:\Users\Admin\AppData\Local\Temp\C63E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\C89F.tmp"C:\Users\Admin\AppData\Local\Temp\C89F.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\CA16.tmp"C:\Users\Admin\AppData\Local\Temp\CA16.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\CD72.tmp"C:\Users\Admin\AppData\Local\Temp\CD72.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\CED9.tmp"C:\Users\Admin\AppData\Local\Temp\CED9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D050.tmp"C:\Users\Admin\AppData\Local\Temp\D050.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424
-
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800
-
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"2⤵
- Executes dropped EXE
PID:484 -
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"3⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\D570.tmp"C:\Users\Admin\AppData\Local\Temp\D570.tmp"4⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"5⤵
- Executes dropped EXE
PID:476 -
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"6⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"7⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\D84F.tmp"C:\Users\Admin\AppData\Local\Temp\D84F.tmp"8⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"9⤵
- Executes dropped EXE
PID:2888
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"1⤵
- Executes dropped EXE
PID:692 -
C:\Users\Admin\AppData\Local\Temp\DA14.tmp"C:\Users\Admin\AppData\Local\Temp\DA14.tmp"2⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"3⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"4⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"5⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"6⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"7⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"8⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"9⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"10⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"11⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"12⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"13⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"14⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"15⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"16⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"17⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"18⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"19⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\E639.tmp"C:\Users\Admin\AppData\Local\Temp\E639.tmp"20⤵
- Executes dropped EXE
PID:384 -
C:\Users\Admin\AppData\Local\Temp\E714.tmp"C:\Users\Admin\AppData\Local\Temp\E714.tmp"21⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"22⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\E88B.tmp"C:\Users\Admin\AppData\Local\Temp\E88B.tmp"23⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"24⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"25⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"26⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"27⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"28⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"29⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"30⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"31⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"32⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\EED4.tmp"C:\Users\Admin\AppData\Local\Temp\EED4.tmp"33⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\EF51.tmp"C:\Users\Admin\AppData\Local\Temp\EF51.tmp"34⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"35⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\F08A.tmp"C:\Users\Admin\AppData\Local\Temp\F08A.tmp"36⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\F107.tmp"C:\Users\Admin\AppData\Local\Temp\F107.tmp"37⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"38⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\F24F.tmp"C:\Users\Admin\AppData\Local\Temp\F24F.tmp"39⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"40⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"41⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\F414.tmp"C:\Users\Admin\AppData\Local\Temp\F414.tmp"42⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"43⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"44⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"45⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"46⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"47⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"48⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"49⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"50⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"51⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"52⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"53⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"54⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"55⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"56⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"57⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"58⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\FE17.tmp"C:\Users\Admin\AppData\Local\Temp\FE17.tmp"59⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"60⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"61⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"62⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\97.tmp"C:\Users\Admin\AppData\Local\Temp\97.tmp"63⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"64⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"65⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"66⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"67⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"68⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"69⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"70⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"71⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\644.tmp"C:\Users\Admin\AppData\Local\Temp\644.tmp"72⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"73⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"74⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\80A.tmp"C:\Users\Admin\AppData\Local\Temp\80A.tmp"75⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\8C5.tmp"C:\Users\Admin\AppData\Local\Temp\8C5.tmp"76⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"77⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"78⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\B17.tmp"C:\Users\Admin\AppData\Local\Temp\B17.tmp"79⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"80⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\C5F.tmp"C:\Users\Admin\AppData\Local\Temp\C5F.tmp"81⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\CEC.tmp"C:\Users\Admin\AppData\Local\Temp\CEC.tmp"82⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"83⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\E63.tmp"C:\Users\Admin\AppData\Local\Temp\E63.tmp"84⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"85⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"86⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"87⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\10E3.tmp"C:\Users\Admin\AppData\Local\Temp\10E3.tmp"88⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"89⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"90⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\12C8.tmp"C:\Users\Admin\AppData\Local\Temp\12C8.tmp"91⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"92⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"93⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"94⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"95⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"96⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\1661.tmp"C:\Users\Admin\AppData\Local\Temp\1661.tmp"97⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"98⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"99⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"100⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"101⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\1911.tmp"C:\Users\Admin\AppData\Local\Temp\1911.tmp"102⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\197E.tmp"C:\Users\Admin\AppData\Local\Temp\197E.tmp"103⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\19FB.tmp"C:\Users\Admin\AppData\Local\Temp\19FB.tmp"104⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"105⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"106⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"107⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"108⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"109⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\1D66.tmp"C:\Users\Admin\AppData\Local\Temp\1D66.tmp"110⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"111⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\1E80.tmp"C:\Users\Admin\AppData\Local\Temp\1E80.tmp"112⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"113⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"114⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\2045.tmp"C:\Users\Admin\AppData\Local\Temp\2045.tmp"115⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"116⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\215E.tmp"C:\Users\Admin\AppData\Local\Temp\215E.tmp"117⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"118⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"119⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"120⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"121⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"122⤵PID:2856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-