Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 21:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe
-
Size
487KB
-
MD5
f28858fee94a7ad322ace3e397deed78
-
SHA1
c732aaba84664051dac85109dd9011bcf7fcc026
-
SHA256
8cc48d1c48130fc3e7fde6cad417355b65d2dbda025864cb7d26c6fa108db4bb
-
SHA512
55df3e0ac8a917aaf219926a8b403865768f265112432abaea391422522e327f0add0bc66b6f58f948f50dc1e704238356fe1fdb79329b709235925ec70d87f8
-
SSDEEP
12288:yU5rCOTeiN6Vl1YzaIVgUXjoFVWuCYmSB4PbZ:yUQOJN21YzatXquSPb
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4440 7639.tmp 4696 76E5.tmp 3032 77A1.tmp 4464 786C.tmp 4400 7908.tmp 1380 79A4.tmp 4308 7A7F.tmp 4904 7B3B.tmp 2176 7BC7.tmp 1920 7C54.tmp 4780 7CD1.tmp 1680 7D7D.tmp 1184 7E29.tmp 3068 7EA6.tmp 960 7F52.tmp 1064 7FAF.tmp 3728 80F7.tmp 2220 8184.tmp 4088 81F1.tmp 532 828E.tmp 4788 8368.tmp 3668 83F5.tmp 1660 84A1.tmp 572 855C.tmp 3900 85F9.tmp 496 8685.tmp 2916 8760.tmp 4320 882B.tmp 4696 88D7.tmp 1244 89D1.tmp 1672 8A4E.tmp 2240 8B38.tmp 4516 8C23.tmp 3344 8CAF.tmp 544 8D3C.tmp 3224 8DC9.tmp 808 8EA3.tmp 4792 8F7E.tmp 4752 901A.tmp 4780 90A7.tmp 3628 9134.tmp 4852 91C0.tmp 1184 926C.tmp 4848 9308.tmp 4680 93B4.tmp 5104 9451.tmp 4728 94DD.tmp 1740 9589.tmp 648 96A2.tmp 1728 973F.tmp 4208 97CB.tmp 2384 9867.tmp 4152 98F4.tmp 1788 9990.tmp 3940 9A0D.tmp 3200 9A8A.tmp 4772 9B07.tmp 3868 9B94.tmp 448 9C11.tmp 2916 9C6F.tmp 464 9CCC.tmp 4544 9D3A.tmp 2644 9D98.tmp 1180 9E05.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 4440 1980 2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe 86 PID 1980 wrote to memory of 4440 1980 2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe 86 PID 1980 wrote to memory of 4440 1980 2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe 86 PID 4440 wrote to memory of 4696 4440 7639.tmp 88 PID 4440 wrote to memory of 4696 4440 7639.tmp 88 PID 4440 wrote to memory of 4696 4440 7639.tmp 88 PID 4696 wrote to memory of 3032 4696 76E5.tmp 89 PID 4696 wrote to memory of 3032 4696 76E5.tmp 89 PID 4696 wrote to memory of 3032 4696 76E5.tmp 89 PID 3032 wrote to memory of 4464 3032 77A1.tmp 90 PID 3032 wrote to memory of 4464 3032 77A1.tmp 90 PID 3032 wrote to memory of 4464 3032 77A1.tmp 90 PID 4464 wrote to memory of 4400 4464 786C.tmp 91 PID 4464 wrote to memory of 4400 4464 786C.tmp 91 PID 4464 wrote to memory of 4400 4464 786C.tmp 91 PID 4400 wrote to memory of 1380 4400 7908.tmp 92 PID 4400 wrote to memory of 1380 4400 7908.tmp 92 PID 4400 wrote to memory of 1380 4400 7908.tmp 92 PID 1380 wrote to memory of 4308 1380 79A4.tmp 93 PID 1380 wrote to memory of 4308 1380 79A4.tmp 93 PID 1380 wrote to memory of 4308 1380 79A4.tmp 93 PID 4308 wrote to memory of 4904 4308 7A7F.tmp 94 PID 4308 wrote to memory of 4904 4308 7A7F.tmp 94 PID 4308 wrote to memory of 4904 4308 7A7F.tmp 94 PID 4904 wrote to memory of 2176 4904 7B3B.tmp 95 PID 4904 wrote to memory of 2176 4904 7B3B.tmp 95 PID 4904 wrote to memory of 2176 4904 7B3B.tmp 95 PID 2176 wrote to memory of 1920 2176 7BC7.tmp 96 PID 2176 wrote to memory of 1920 2176 7BC7.tmp 96 PID 2176 wrote to memory of 1920 2176 7BC7.tmp 96 PID 1920 wrote to memory of 4780 1920 7C54.tmp 97 PID 1920 wrote to memory of 4780 1920 7C54.tmp 97 PID 1920 wrote to memory of 4780 1920 7C54.tmp 97 PID 4780 wrote to memory of 1680 4780 7CD1.tmp 98 PID 4780 wrote to memory of 1680 4780 7CD1.tmp 98 PID 4780 wrote to memory of 1680 4780 7CD1.tmp 98 PID 1680 wrote to memory of 1184 1680 7D7D.tmp 99 PID 1680 wrote to memory of 1184 1680 7D7D.tmp 99 PID 1680 wrote to memory of 1184 1680 7D7D.tmp 99 PID 1184 wrote to memory of 3068 1184 7E29.tmp 100 PID 1184 wrote to memory of 3068 1184 7E29.tmp 100 PID 1184 wrote to memory of 3068 1184 7E29.tmp 100 PID 3068 wrote to memory of 960 3068 7EA6.tmp 101 PID 3068 wrote to memory of 960 3068 7EA6.tmp 101 PID 3068 wrote to memory of 960 3068 7EA6.tmp 101 PID 960 wrote to memory of 1064 960 7F52.tmp 104 PID 960 wrote to memory of 1064 960 7F52.tmp 104 PID 960 wrote to memory of 1064 960 7F52.tmp 104 PID 1064 wrote to memory of 3728 1064 7FAF.tmp 106 PID 1064 wrote to memory of 3728 1064 7FAF.tmp 106 PID 1064 wrote to memory of 3728 1064 7FAF.tmp 106 PID 3728 wrote to memory of 2220 3728 80F7.tmp 107 PID 3728 wrote to memory of 2220 3728 80F7.tmp 107 PID 3728 wrote to memory of 2220 3728 80F7.tmp 107 PID 2220 wrote to memory of 4088 2220 8184.tmp 108 PID 2220 wrote to memory of 4088 2220 8184.tmp 108 PID 2220 wrote to memory of 4088 2220 8184.tmp 108 PID 4088 wrote to memory of 532 4088 81F1.tmp 109 PID 4088 wrote to memory of 532 4088 81F1.tmp 109 PID 4088 wrote to memory of 532 4088 81F1.tmp 109 PID 532 wrote to memory of 4788 532 828E.tmp 111 PID 532 wrote to memory of 4788 532 828E.tmp 111 PID 532 wrote to memory of 4788 532 828E.tmp 111 PID 4788 wrote to memory of 3668 4788 8368.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_f28858fee94a7ad322ace3e397deed78_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\7639.tmp"C:\Users\Admin\AppData\Local\Temp\7639.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\76E5.tmp"C:\Users\Admin\AppData\Local\Temp\76E5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\786C.tmp"C:\Users\Admin\AppData\Local\Temp\786C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\7908.tmp"C:\Users\Admin\AppData\Local\Temp\7908.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"C:\Users\Admin\AppData\Local\Temp\7B3B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\7C54.tmp"C:\Users\Admin\AppData\Local\Temp\7C54.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"C:\Users\Admin\AppData\Local\Temp\7CD1.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\7E29.tmp"C:\Users\Admin\AppData\Local\Temp\7E29.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\7EA6.tmp"C:\Users\Admin\AppData\Local\Temp\7EA6.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\8184.tmp"C:\Users\Admin\AppData\Local\Temp\8184.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\81F1.tmp"C:\Users\Admin\AppData\Local\Temp\81F1.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\8368.tmp"C:\Users\Admin\AppData\Local\Temp\8368.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\83F5.tmp"C:\Users\Admin\AppData\Local\Temp\83F5.tmp"23⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\84A1.tmp"C:\Users\Admin\AppData\Local\Temp\84A1.tmp"24⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\855C.tmp"C:\Users\Admin\AppData\Local\Temp\855C.tmp"25⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\85F9.tmp"C:\Users\Admin\AppData\Local\Temp\85F9.tmp"26⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\8685.tmp"C:\Users\Admin\AppData\Local\Temp\8685.tmp"27⤵
- Executes dropped EXE
PID:496 -
C:\Users\Admin\AppData\Local\Temp\8760.tmp"C:\Users\Admin\AppData\Local\Temp\8760.tmp"28⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"29⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\88D7.tmp"C:\Users\Admin\AppData\Local\Temp\88D7.tmp"30⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"31⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\8A4E.tmp"C:\Users\Admin\AppData\Local\Temp\8A4E.tmp"32⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\8B38.tmp"C:\Users\Admin\AppData\Local\Temp\8B38.tmp"33⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\8C23.tmp"C:\Users\Admin\AppData\Local\Temp\8C23.tmp"34⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"35⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"36⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"37⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"38⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\8F7E.tmp"C:\Users\Admin\AppData\Local\Temp\8F7E.tmp"39⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\901A.tmp"C:\Users\Admin\AppData\Local\Temp\901A.tmp"40⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\90A7.tmp"C:\Users\Admin\AppData\Local\Temp\90A7.tmp"41⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\9134.tmp"C:\Users\Admin\AppData\Local\Temp\9134.tmp"42⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\91C0.tmp"C:\Users\Admin\AppData\Local\Temp\91C0.tmp"43⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\926C.tmp"C:\Users\Admin\AppData\Local\Temp\926C.tmp"44⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\9308.tmp"C:\Users\Admin\AppData\Local\Temp\9308.tmp"45⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\93B4.tmp"C:\Users\Admin\AppData\Local\Temp\93B4.tmp"46⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\9451.tmp"C:\Users\Admin\AppData\Local\Temp\9451.tmp"47⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"48⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"49⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\96A2.tmp"C:\Users\Admin\AppData\Local\Temp\96A2.tmp"50⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\973F.tmp"C:\Users\Admin\AppData\Local\Temp\973F.tmp"51⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\97CB.tmp"C:\Users\Admin\AppData\Local\Temp\97CB.tmp"52⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"53⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\98F4.tmp"C:\Users\Admin\AppData\Local\Temp\98F4.tmp"54⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\9990.tmp"C:\Users\Admin\AppData\Local\Temp\9990.tmp"55⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\9A0D.tmp"C:\Users\Admin\AppData\Local\Temp\9A0D.tmp"56⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"57⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"58⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\9B94.tmp"C:\Users\Admin\AppData\Local\Temp\9B94.tmp"59⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\9C11.tmp"C:\Users\Admin\AppData\Local\Temp\9C11.tmp"60⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"61⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"62⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"63⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"64⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\9E05.tmp"C:\Users\Admin\AppData\Local\Temp\9E05.tmp"65⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\9E82.tmp"C:\Users\Admin\AppData\Local\Temp\9E82.tmp"66⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"67⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"68⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"69⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"70⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\A170.tmp"C:\Users\Admin\AppData\Local\Temp\A170.tmp"71⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"72⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\A25A.tmp"C:\Users\Admin\AppData\Local\Temp\A25A.tmp"73⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"74⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\A345.tmp"C:\Users\Admin\AppData\Local\Temp\A345.tmp"75⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"76⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\A46E.tmp"C:\Users\Admin\AppData\Local\Temp\A46E.tmp"77⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\A529.tmp"C:\Users\Admin\AppData\Local\Temp\A529.tmp"78⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"79⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\A690.tmp"C:\Users\Admin\AppData\Local\Temp\A690.tmp"80⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\A71D.tmp"C:\Users\Admin\AppData\Local\Temp\A71D.tmp"81⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"82⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\A807.tmp"C:\Users\Admin\AppData\Local\Temp\A807.tmp"83⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\A894.tmp"C:\Users\Admin\AppData\Local\Temp\A894.tmp"84⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\A911.tmp"C:\Users\Admin\AppData\Local\Temp\A911.tmp"85⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\A97E.tmp"C:\Users\Admin\AppData\Local\Temp\A97E.tmp"86⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"87⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\AA69.tmp"C:\Users\Admin\AppData\Local\Temp\AA69.tmp"88⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"89⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"90⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"91⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\AC8C.tmp"C:\Users\Admin\AppData\Local\Temp\AC8C.tmp"92⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\AD28.tmp"C:\Users\Admin\AppData\Local\Temp\AD28.tmp"93⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"94⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\AE51.tmp"C:\Users\Admin\AppData\Local\Temp\AE51.tmp"95⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\AECE.tmp"C:\Users\Admin\AppData\Local\Temp\AECE.tmp"96⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"97⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"98⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\B054.tmp"C:\Users\Admin\AppData\Local\Temp\B054.tmp"99⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"100⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"101⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\B1CB.tmp"C:\Users\Admin\AppData\Local\Temp\B1CB.tmp"102⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\B268.tmp"C:\Users\Admin\AppData\Local\Temp\B268.tmp"103⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"104⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"105⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"106⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"107⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"108⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"109⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\B650.tmp"C:\Users\Admin\AppData\Local\Temp\B650.tmp"110⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"111⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"112⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"113⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"114⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"115⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"116⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"117⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"118⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"119⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"120⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"121⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"122⤵PID:4740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-