Analysis
-
max time kernel
190s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 13:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe
-
Size
486KB
-
MD5
76881e4ff483108ba2e9d9071e8e54fc
-
SHA1
f88b7905ea60a675dcb101cf2d979abc9419a9e3
-
SHA256
56731677e3de3004a66aa4081ea1c01355e071c1d50263f1e1976a41cafcda56
-
SHA512
4f1e72f7151aedc5ae07b94f2a1f00fd85688f6ed0c3ce0fbcd51eb222ce5c7467c7c1d3ac45040623f770ba53a6831ba2c81ecda94c2d7963bf75de7cedc3d5
-
SSDEEP
12288:UU5rCOTeiDXXRZkAQ2cZm3a/6RViJ9fO8zefbix4NZ:UUQOJDXvkAQtZOa/CVO92Wa2x4N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4204 2FC5.tmp 3184 30DF.tmp 4564 31AA.tmp 1212 342A.tmp 4068 34D6.tmp 3584 35C1.tmp 4624 36AB.tmp 1768 397A.tmp 2656 3AA3.tmp 4956 3BEB.tmp 3816 3CA6.tmp 984 3DB0.tmp 796 3F08.tmp 5112 3FA4.tmp 4212 4050.tmp 1144 40FC.tmp 2420 41B7.tmp 3828 4282.tmp 2176 437C.tmp 3568 4447.tmp 5080 5213.tmp 4528 52DE.tmp 1324 53C8.tmp 4996 5530.tmp 3304 55EB.tmp 1088 B438.tmp 5044 C704.tmp 404 CFFD.tmp 4728 D230.tmp 4480 D424.tmp 4508 D4FE.tmp 4732 D5E9.tmp 2988 D750.tmp 4552 D8D7.tmp 3696 D934.tmp 3704 DACB.tmp 1508 DB86.tmp 3844 DC9F.tmp 3900 DD99.tmp 4824 DE16.tmp 2896 DEA3.tmp 1940 DF30.tmp 1944 DFDC.tmp 3380 E191.tmp 4620 E2F8.tmp 4212 E5B8.tmp 3308 E635.tmp 2280 E6F0.tmp 628 E942.tmp 244 E9DE.tmp 2952 EA6B.tmp 1112 EB07.tmp 5108 EB65.tmp 1912 EBB3.tmp 3508 EC20.tmp 744 EC8E.tmp 2208 ECFB.tmp 2228 ED68.tmp 452 EDF5.tmp 4844 EE62.tmp 4684 EEDF.tmp 544 EF4D.tmp 1888 EFCA.tmp 1400 F037.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4204 4064 2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe 87 PID 4064 wrote to memory of 4204 4064 2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe 87 PID 4064 wrote to memory of 4204 4064 2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe 87 PID 4204 wrote to memory of 3184 4204 2FC5.tmp 88 PID 4204 wrote to memory of 3184 4204 2FC5.tmp 88 PID 4204 wrote to memory of 3184 4204 2FC5.tmp 88 PID 3184 wrote to memory of 4564 3184 30DF.tmp 89 PID 3184 wrote to memory of 4564 3184 30DF.tmp 89 PID 3184 wrote to memory of 4564 3184 30DF.tmp 89 PID 4564 wrote to memory of 1212 4564 31AA.tmp 90 PID 4564 wrote to memory of 1212 4564 31AA.tmp 90 PID 4564 wrote to memory of 1212 4564 31AA.tmp 90 PID 1212 wrote to memory of 4068 1212 342A.tmp 91 PID 1212 wrote to memory of 4068 1212 342A.tmp 91 PID 1212 wrote to memory of 4068 1212 342A.tmp 91 PID 4068 wrote to memory of 3584 4068 34D6.tmp 92 PID 4068 wrote to memory of 3584 4068 34D6.tmp 92 PID 4068 wrote to memory of 3584 4068 34D6.tmp 92 PID 3584 wrote to memory of 4624 3584 35C1.tmp 93 PID 3584 wrote to memory of 4624 3584 35C1.tmp 93 PID 3584 wrote to memory of 4624 3584 35C1.tmp 93 PID 4624 wrote to memory of 1768 4624 36AB.tmp 95 PID 4624 wrote to memory of 1768 4624 36AB.tmp 95 PID 4624 wrote to memory of 1768 4624 36AB.tmp 95 PID 1768 wrote to memory of 2656 1768 397A.tmp 96 PID 1768 wrote to memory of 2656 1768 397A.tmp 96 PID 1768 wrote to memory of 2656 1768 397A.tmp 96 PID 2656 wrote to memory of 4956 2656 3AA3.tmp 97 PID 2656 wrote to memory of 4956 2656 3AA3.tmp 97 PID 2656 wrote to memory of 4956 2656 3AA3.tmp 97 PID 4956 wrote to memory of 3816 4956 3BEB.tmp 98 PID 4956 wrote to memory of 3816 4956 3BEB.tmp 98 PID 4956 wrote to memory of 3816 4956 3BEB.tmp 98 PID 3816 wrote to memory of 984 3816 3CA6.tmp 99 PID 3816 wrote to memory of 984 3816 3CA6.tmp 99 PID 3816 wrote to memory of 984 3816 3CA6.tmp 99 PID 984 wrote to memory of 796 984 3DB0.tmp 101 PID 984 wrote to memory of 796 984 3DB0.tmp 101 PID 984 wrote to memory of 796 984 3DB0.tmp 101 PID 796 wrote to memory of 5112 796 3F08.tmp 102 PID 796 wrote to memory of 5112 796 3F08.tmp 102 PID 796 wrote to memory of 5112 796 3F08.tmp 102 PID 5112 wrote to memory of 4212 5112 3FA4.tmp 103 PID 5112 wrote to memory of 4212 5112 3FA4.tmp 103 PID 5112 wrote to memory of 4212 5112 3FA4.tmp 103 PID 4212 wrote to memory of 1144 4212 4050.tmp 104 PID 4212 wrote to memory of 1144 4212 4050.tmp 104 PID 4212 wrote to memory of 1144 4212 4050.tmp 104 PID 1144 wrote to memory of 2420 1144 40FC.tmp 105 PID 1144 wrote to memory of 2420 1144 40FC.tmp 105 PID 1144 wrote to memory of 2420 1144 40FC.tmp 105 PID 2420 wrote to memory of 3828 2420 41B7.tmp 106 PID 2420 wrote to memory of 3828 2420 41B7.tmp 106 PID 2420 wrote to memory of 3828 2420 41B7.tmp 106 PID 3828 wrote to memory of 2176 3828 4282.tmp 107 PID 3828 wrote to memory of 2176 3828 4282.tmp 107 PID 3828 wrote to memory of 2176 3828 4282.tmp 107 PID 2176 wrote to memory of 3568 2176 437C.tmp 108 PID 2176 wrote to memory of 3568 2176 437C.tmp 108 PID 2176 wrote to memory of 3568 2176 437C.tmp 108 PID 3568 wrote to memory of 5080 3568 4447.tmp 109 PID 3568 wrote to memory of 5080 3568 4447.tmp 109 PID 3568 wrote to memory of 5080 3568 4447.tmp 109 PID 5080 wrote to memory of 4528 5080 5213.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_76881e4ff483108ba2e9d9071e8e54fc_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\2FC5.tmp"C:\Users\Admin\AppData\Local\Temp\2FC5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\31AA.tmp"C:\Users\Admin\AppData\Local\Temp\31AA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\397A.tmp"C:\Users\Admin\AppData\Local\Temp\397A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\4282.tmp"C:\Users\Admin\AppData\Local\Temp\4282.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\437C.tmp"C:\Users\Admin\AppData\Local\Temp\437C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"23⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"24⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\5530.tmp"C:\Users\Admin\AppData\Local\Temp\5530.tmp"25⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\55EB.tmp"C:\Users\Admin\AppData\Local\Temp\55EB.tmp"26⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\B438.tmp"C:\Users\Admin\AppData\Local\Temp\B438.tmp"27⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\C704.tmp"C:\Users\Admin\AppData\Local\Temp\C704.tmp"28⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"29⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\D230.tmp"C:\Users\Admin\AppData\Local\Temp\D230.tmp"30⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\D424.tmp"C:\Users\Admin\AppData\Local\Temp\D424.tmp"31⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\D4FE.tmp"C:\Users\Admin\AppData\Local\Temp\D4FE.tmp"32⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\D5E9.tmp"C:\Users\Admin\AppData\Local\Temp\D5E9.tmp"33⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\D750.tmp"C:\Users\Admin\AppData\Local\Temp\D750.tmp"34⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\D8D7.tmp"C:\Users\Admin\AppData\Local\Temp\D8D7.tmp"35⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\D934.tmp"C:\Users\Admin\AppData\Local\Temp\D934.tmp"36⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\DACB.tmp"C:\Users\Admin\AppData\Local\Temp\DACB.tmp"37⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\DB86.tmp"C:\Users\Admin\AppData\Local\Temp\DB86.tmp"38⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"39⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\DD99.tmp"C:\Users\Admin\AppData\Local\Temp\DD99.tmp"40⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\DE16.tmp"C:\Users\Admin\AppData\Local\Temp\DE16.tmp"41⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\DEA3.tmp"C:\Users\Admin\AppData\Local\Temp\DEA3.tmp"42⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\DF30.tmp"C:\Users\Admin\AppData\Local\Temp\DF30.tmp"43⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\DFDC.tmp"C:\Users\Admin\AppData\Local\Temp\DFDC.tmp"44⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\E191.tmp"C:\Users\Admin\AppData\Local\Temp\E191.tmp"45⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\E2F8.tmp"C:\Users\Admin\AppData\Local\Temp\E2F8.tmp"46⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\E5B8.tmp"C:\Users\Admin\AppData\Local\Temp\E5B8.tmp"47⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\E635.tmp"C:\Users\Admin\AppData\Local\Temp\E635.tmp"48⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\E6F0.tmp"C:\Users\Admin\AppData\Local\Temp\E6F0.tmp"49⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\E942.tmp"C:\Users\Admin\AppData\Local\Temp\E942.tmp"50⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\E9DE.tmp"C:\Users\Admin\AppData\Local\Temp\E9DE.tmp"51⤵
- Executes dropped EXE
PID:244 -
C:\Users\Admin\AppData\Local\Temp\EA6B.tmp"C:\Users\Admin\AppData\Local\Temp\EA6B.tmp"52⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\EB07.tmp"C:\Users\Admin\AppData\Local\Temp\EB07.tmp"53⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\EB65.tmp"C:\Users\Admin\AppData\Local\Temp\EB65.tmp"54⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\EBB3.tmp"C:\Users\Admin\AppData\Local\Temp\EBB3.tmp"55⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\EC20.tmp"C:\Users\Admin\AppData\Local\Temp\EC20.tmp"56⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"57⤵
- Executes dropped EXE
PID:744 -
C:\Users\Admin\AppData\Local\Temp\ECFB.tmp"C:\Users\Admin\AppData\Local\Temp\ECFB.tmp"58⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\ED68.tmp"C:\Users\Admin\AppData\Local\Temp\ED68.tmp"59⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\EDF5.tmp"C:\Users\Admin\AppData\Local\Temp\EDF5.tmp"60⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\EE62.tmp"C:\Users\Admin\AppData\Local\Temp\EE62.tmp"61⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\EEDF.tmp"C:\Users\Admin\AppData\Local\Temp\EEDF.tmp"62⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\EF4D.tmp"C:\Users\Admin\AppData\Local\Temp\EF4D.tmp"63⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\EFCA.tmp"C:\Users\Admin\AppData\Local\Temp\EFCA.tmp"64⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\F037.tmp"C:\Users\Admin\AppData\Local\Temp\F037.tmp"65⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\F0A4.tmp"C:\Users\Admin\AppData\Local\Temp\F0A4.tmp"66⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\F102.tmp"C:\Users\Admin\AppData\Local\Temp\F102.tmp"67⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\F17F.tmp"C:\Users\Admin\AppData\Local\Temp\F17F.tmp"68⤵PID:2124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F1ED.tmp"C:\Users\Admin\AppData\Local\Temp\F1ED.tmp"1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\F24A.tmp"C:\Users\Admin\AppData\Local\Temp\F24A.tmp"2⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\F364.tmp"C:\Users\Admin\AppData\Local\Temp\F364.tmp"3⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\F3C1.tmp"C:\Users\Admin\AppData\Local\Temp\F3C1.tmp"4⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\F42F.tmp"C:\Users\Admin\AppData\Local\Temp\F42F.tmp"5⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\143A.tmp"C:\Users\Admin\AppData\Local\Temp\143A.tmp"6⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\14A7.tmp"C:\Users\Admin\AppData\Local\Temp\14A7.tmp"7⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\1515.tmp"C:\Users\Admin\AppData\Local\Temp\1515.tmp"8⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\5683.tmp"C:\Users\Admin\AppData\Local\Temp\5683.tmp"9⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\5AD8.tmp"C:\Users\Admin\AppData\Local\Temp\5AD8.tmp"10⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\5DF5.tmp"C:\Users\Admin\AppData\Local\Temp\5DF5.tmp"11⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\694F.tmp"C:\Users\Admin\AppData\Local\Temp\694F.tmp"12⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\7834.tmp"C:\Users\Admin\AppData\Local\Temp\7834.tmp"13⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\7B41.tmp"C:\Users\Admin\AppData\Local\Temp\7B41.tmp"14⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\7D93.tmp"C:\Users\Admin\AppData\Local\Temp\7D93.tmp"15⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\7FD5.tmp"C:\Users\Admin\AppData\Local\Temp\7FD5.tmp"16⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\814C.tmp"C:\Users\Admin\AppData\Local\Temp\814C.tmp"17⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\82E2.tmp"C:\Users\Admin\AppData\Local\Temp\82E2.tmp"18⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\840B.tmp"C:\Users\Admin\AppData\Local\Temp\840B.tmp"19⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\8514.tmp"C:\Users\Admin\AppData\Local\Temp\8514.tmp"20⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\86CA.tmp"C:\Users\Admin\AppData\Local\Temp\86CA.tmp"21⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\87F3.tmp"C:\Users\Admin\AppData\Local\Temp\87F3.tmp"22⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\88FC.tmp"C:\Users\Admin\AppData\Local\Temp\88FC.tmp"23⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\8A93.tmp"C:\Users\Admin\AppData\Local\Temp\8A93.tmp"24⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\8C67.tmp"C:\Users\Admin\AppData\Local\Temp\8C67.tmp"25⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\8D42.tmp"C:\Users\Admin\AppData\Local\Temp\8D42.tmp"26⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\8DEE.tmp"C:\Users\Admin\AppData\Local\Temp\8DEE.tmp"27⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\8F36.tmp"C:\Users\Admin\AppData\Local\Temp\8F36.tmp"28⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\8FD2.tmp"C:\Users\Admin\AppData\Local\Temp\8FD2.tmp"29⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\90EC.tmp"C:\Users\Admin\AppData\Local\Temp\90EC.tmp"30⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\91A7.tmp"C:\Users\Admin\AppData\Local\Temp\91A7.tmp"31⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\9282.tmp"C:\Users\Admin\AppData\Local\Temp\9282.tmp"32⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\92EF.tmp"C:\Users\Admin\AppData\Local\Temp\92EF.tmp"33⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\939B.tmp"C:\Users\Admin\AppData\Local\Temp\939B.tmp"34⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\9476.tmp"C:\Users\Admin\AppData\Local\Temp\9476.tmp"35⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\94D4.tmp"C:\Users\Admin\AppData\Local\Temp\94D4.tmp"36⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\9531.tmp"C:\Users\Admin\AppData\Local\Temp\9531.tmp"37⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\959F.tmp"C:\Users\Admin\AppData\Local\Temp\959F.tmp"38⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\960C.tmp"C:\Users\Admin\AppData\Local\Temp\960C.tmp"39⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\96A8.tmp"C:\Users\Admin\AppData\Local\Temp\96A8.tmp"40⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\9783.tmp"C:\Users\Admin\AppData\Local\Temp\9783.tmp"41⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\982F.tmp"C:\Users\Admin\AppData\Local\Temp\982F.tmp"42⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\98BC.tmp"C:\Users\Admin\AppData\Local\Temp\98BC.tmp"43⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\9958.tmp"C:\Users\Admin\AppData\Local\Temp\9958.tmp"44⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\99C5.tmp"C:\Users\Admin\AppData\Local\Temp\99C5.tmp"45⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\9A42.tmp"C:\Users\Admin\AppData\Local\Temp\9A42.tmp"46⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\9ABF.tmp"C:\Users\Admin\AppData\Local\Temp\9ABF.tmp"47⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\9B4C.tmp"C:\Users\Admin\AppData\Local\Temp\9B4C.tmp"48⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\9BD9.tmp"C:\Users\Admin\AppData\Local\Temp\9BD9.tmp"49⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\9C56.tmp"C:\Users\Admin\AppData\Local\Temp\9C56.tmp"50⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\9D40.tmp"C:\Users\Admin\AppData\Local\Temp\9D40.tmp"51⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\9DFB.tmp"C:\Users\Admin\AppData\Local\Temp\9DFB.tmp"52⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\9E78.tmp"C:\Users\Admin\AppData\Local\Temp\9E78.tmp"53⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\9F15.tmp"C:\Users\Admin\AppData\Local\Temp\9F15.tmp"54⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\9FB1.tmp"C:\Users\Admin\AppData\Local\Temp\9FB1.tmp"55⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\A0BB.tmp"C:\Users\Admin\AppData\Local\Temp\A0BB.tmp"56⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\AACD.tmp"C:\Users\Admin\AppData\Local\Temp\AACD.tmp"57⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\AB59.tmp"C:\Users\Admin\AppData\Local\Temp\AB59.tmp"58⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\ABE6.tmp"C:\Users\Admin\AppData\Local\Temp\ABE6.tmp"59⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\AC73.tmp"C:\Users\Admin\AppData\Local\Temp\AC73.tmp"60⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\AD0F.tmp"C:\Users\Admin\AppData\Local\Temp\AD0F.tmp"61⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\AD9B.tmp"C:\Users\Admin\AppData\Local\Temp\AD9B.tmp"62⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\AE28.tmp"C:\Users\Admin\AppData\Local\Temp\AE28.tmp"63⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\AEB5.tmp"C:\Users\Admin\AppData\Local\Temp\AEB5.tmp"64⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\C7F9.tmp"C:\Users\Admin\AppData\Local\Temp\C7F9.tmp"65⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\C942.tmp"C:\Users\Admin\AppData\Local\Temp\C942.tmp"66⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\E313.tmp"C:\Users\Admin\AppData\Local\Temp\E313.tmp"67⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\E96C.tmp"C:\Users\Admin\AppData\Local\Temp\E96C.tmp"68⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\F11D.tmp"C:\Users\Admin\AppData\Local\Temp\F11D.tmp"69⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\FDDE.tmp"C:\Users\Admin\AppData\Local\Temp\FDDE.tmp"70⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\689.tmp"C:\Users\Admin\AppData\Local\Temp\689.tmp"71⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\1677.tmp"C:\Users\Admin\AppData\Local\Temp\1677.tmp"72⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\1F03.tmp"C:\Users\Admin\AppData\Local\Temp\1F03.tmp"73⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\23F4.tmp"C:\Users\Admin\AppData\Local\Temp\23F4.tmp"74⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\2636.tmp"C:\Users\Admin\AppData\Local\Temp\2636.tmp"75⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"76⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\2721.tmp"C:\Users\Admin\AppData\Local\Temp\2721.tmp"77⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\27AD.tmp"C:\Users\Admin\AppData\Local\Temp\27AD.tmp"78⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\283A.tmp"C:\Users\Admin\AppData\Local\Temp\283A.tmp"79⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\28C7.tmp"C:\Users\Admin\AppData\Local\Temp\28C7.tmp"80⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\2A6D.tmp"C:\Users\Admin\AppData\Local\Temp\2A6D.tmp"81⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2B09.tmp"C:\Users\Admin\AppData\Local\Temp\2B09.tmp"82⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\2B95.tmp"C:\Users\Admin\AppData\Local\Temp\2B95.tmp"83⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2C22.tmp"C:\Users\Admin\AppData\Local\Temp\2C22.tmp"84⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2C9F.tmp"C:\Users\Admin\AppData\Local\Temp\2C9F.tmp"85⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2D2C.tmp"C:\Users\Admin\AppData\Local\Temp\2D2C.tmp"86⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\2DC8.tmp"C:\Users\Admin\AppData\Local\Temp\2DC8.tmp"87⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2E64.tmp"C:\Users\Admin\AppData\Local\Temp\2E64.tmp"88⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2F7D.tmp"C:\Users\Admin\AppData\Local\Temp\2F7D.tmp"89⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\300A.tmp"C:\Users\Admin\AppData\Local\Temp\300A.tmp"90⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\3087.tmp"C:\Users\Admin\AppData\Local\Temp\3087.tmp"91⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\30F4.tmp"C:\Users\Admin\AppData\Local\Temp\30F4.tmp"92⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\31A0.tmp"C:\Users\Admin\AppData\Local\Temp\31A0.tmp"93⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\322D.tmp"C:\Users\Admin\AppData\Local\Temp\322D.tmp"94⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\32AA.tmp"C:\Users\Admin\AppData\Local\Temp\32AA.tmp"95⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\3337.tmp"C:\Users\Admin\AppData\Local\Temp\3337.tmp"96⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\33C3.tmp"C:\Users\Admin\AppData\Local\Temp\33C3.tmp"97⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\349E.tmp"C:\Users\Admin\AppData\Local\Temp\349E.tmp"98⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\353A.tmp"C:\Users\Admin\AppData\Local\Temp\353A.tmp"99⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\35C7.tmp"C:\Users\Admin\AppData\Local\Temp\35C7.tmp"100⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3644.tmp"C:\Users\Admin\AppData\Local\Temp\3644.tmp"101⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\36D0.tmp"C:\Users\Admin\AppData\Local\Temp\36D0.tmp"102⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\375D.tmp"C:\Users\Admin\AppData\Local\Temp\375D.tmp"103⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\37CA.tmp"C:\Users\Admin\AppData\Local\Temp\37CA.tmp"104⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\3857.tmp"C:\Users\Admin\AppData\Local\Temp\3857.tmp"105⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\38F3.tmp"C:\Users\Admin\AppData\Local\Temp\38F3.tmp"106⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\3A2C.tmp"C:\Users\Admin\AppData\Local\Temp\3A2C.tmp"107⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\3AA9.tmp"C:\Users\Admin\AppData\Local\Temp\3AA9.tmp"108⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3B26.tmp"C:\Users\Admin\AppData\Local\Temp\3B26.tmp"109⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\3BA3.tmp"C:\Users\Admin\AppData\Local\Temp\3BA3.tmp"110⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3C2F.tmp"C:\Users\Admin\AppData\Local\Temp\3C2F.tmp"111⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\3CCC.tmp"C:\Users\Admin\AppData\Local\Temp\3CCC.tmp"112⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\3D97.tmp"C:\Users\Admin\AppData\Local\Temp\3D97.tmp"113⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\3E33.tmp"C:\Users\Admin\AppData\Local\Temp\3E33.tmp"114⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\3EC0.tmp"C:\Users\Admin\AppData\Local\Temp\3EC0.tmp"115⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\3F3D.tmp"C:\Users\Admin\AppData\Local\Temp\3F3D.tmp"116⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\3FD9.tmp"C:\Users\Admin\AppData\Local\Temp\3FD9.tmp"117⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\4075.tmp"C:\Users\Admin\AppData\Local\Temp\4075.tmp"118⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\4102.tmp"C:\Users\Admin\AppData\Local\Temp\4102.tmp"119⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\418E.tmp"C:\Users\Admin\AppData\Local\Temp\418E.tmp"120⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\421B.tmp"C:\Users\Admin\AppData\Local\Temp\421B.tmp"121⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\4298.tmp"C:\Users\Admin\AppData\Local\Temp\4298.tmp"122⤵PID:732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-