Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 13:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe
-
Size
488KB
-
MD5
25224cc1501d603bf29fd359a0717e1b
-
SHA1
34f41c55cea87984e51d0584e64721affa79d7bb
-
SHA256
ac8c6c58dc81b42573cef1f1de46c05912c1c09444ca8733d3ac1c63ce70e0a8
-
SHA512
535df7a5005dde232339a684bc9721e590db240c7106dece617f878bf3374724f93dee65266682d300d34b940767d31284a9128d2bfc593d619ebbfbb584d719
-
SSDEEP
12288:/U5rCOTeiD+Tk5rPwEzboOqykpwRpArkfHhNZ:/UQOJDAbxPxCN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2840 7EA6.tmp 4828 7F32.tmp 3840 7FEE.tmp 988 80F7.tmp 2220 8174.tmp 936 826E.tmp 372 8349.tmp 3608 8405.tmp 2536 8491.tmp 3720 852E.tmp 3604 85D9.tmp 1840 883B.tmp 4944 8906.tmp 4564 89D1.tmp 4524 8A3E.tmp 2696 8ADB.tmp 2736 8C61.tmp 4260 8CFE.tmp 2656 8DE8.tmp 756 8E94.tmp 2464 8F20.tmp 2592 8FDC.tmp 2320 9097.tmp 4372 9143.tmp 1720 91E0.tmp 5092 929B.tmp 2508 9328.tmp 1316 93C4.tmp 804 9441.tmp 2436 94ED.tmp 1260 9599.tmp 4252 9673.tmp 628 9710.tmp 4308 97BC.tmp 3960 9819.tmp 3712 98C5.tmp 2896 9942.tmp 1860 99CF.tmp 4188 9A3C.tmp 3284 9AC9.tmp 3936 9B55.tmp 3668 9BE2.tmp 648 9C5F.tmp 632 9E53.tmp 472 9EE0.tmp 4204 9F8C.tmp 3064 A018.tmp 3240 A42F.tmp 3472 A4BC.tmp 4840 A558.tmp 4184 A5E5.tmp 4828 A681.tmp 4268 A6EE.tmp 968 A78A.tmp 940 A7F8.tmp 4728 A894.tmp 2112 A940.tmp 1772 A9DC.tmp 3784 AA4A.tmp 3988 AAB7.tmp 4424 AB24.tmp 2528 AB92.tmp 4012 AC0F.tmp 4696 ACAB.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 2840 4960 25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe 81 PID 4960 wrote to memory of 2840 4960 25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe 81 PID 4960 wrote to memory of 2840 4960 25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe 81 PID 2840 wrote to memory of 4828 2840 7EA6.tmp 82 PID 2840 wrote to memory of 4828 2840 7EA6.tmp 82 PID 2840 wrote to memory of 4828 2840 7EA6.tmp 82 PID 4828 wrote to memory of 3840 4828 7F32.tmp 83 PID 4828 wrote to memory of 3840 4828 7F32.tmp 83 PID 4828 wrote to memory of 3840 4828 7F32.tmp 83 PID 3840 wrote to memory of 988 3840 7FEE.tmp 84 PID 3840 wrote to memory of 988 3840 7FEE.tmp 84 PID 3840 wrote to memory of 988 3840 7FEE.tmp 84 PID 988 wrote to memory of 2220 988 80F7.tmp 85 PID 988 wrote to memory of 2220 988 80F7.tmp 85 PID 988 wrote to memory of 2220 988 80F7.tmp 85 PID 2220 wrote to memory of 936 2220 8174.tmp 86 PID 2220 wrote to memory of 936 2220 8174.tmp 86 PID 2220 wrote to memory of 936 2220 8174.tmp 86 PID 936 wrote to memory of 372 936 826E.tmp 87 PID 936 wrote to memory of 372 936 826E.tmp 87 PID 936 wrote to memory of 372 936 826E.tmp 87 PID 372 wrote to memory of 3608 372 8349.tmp 88 PID 372 wrote to memory of 3608 372 8349.tmp 88 PID 372 wrote to memory of 3608 372 8349.tmp 88 PID 3608 wrote to memory of 2536 3608 8405.tmp 89 PID 3608 wrote to memory of 2536 3608 8405.tmp 89 PID 3608 wrote to memory of 2536 3608 8405.tmp 89 PID 2536 wrote to memory of 3720 2536 8491.tmp 90 PID 2536 wrote to memory of 3720 2536 8491.tmp 90 PID 2536 wrote to memory of 3720 2536 8491.tmp 90 PID 3720 wrote to memory of 3604 3720 852E.tmp 91 PID 3720 wrote to memory of 3604 3720 852E.tmp 91 PID 3720 wrote to memory of 3604 3720 852E.tmp 91 PID 3604 wrote to memory of 1840 3604 85D9.tmp 92 PID 3604 wrote to memory of 1840 3604 85D9.tmp 92 PID 3604 wrote to memory of 1840 3604 85D9.tmp 92 PID 1840 wrote to memory of 4944 1840 883B.tmp 93 PID 1840 wrote to memory of 4944 1840 883B.tmp 93 PID 1840 wrote to memory of 4944 1840 883B.tmp 93 PID 4944 wrote to memory of 4564 4944 8906.tmp 94 PID 4944 wrote to memory of 4564 4944 8906.tmp 94 PID 4944 wrote to memory of 4564 4944 8906.tmp 94 PID 4564 wrote to memory of 4524 4564 89D1.tmp 95 PID 4564 wrote to memory of 4524 4564 89D1.tmp 95 PID 4564 wrote to memory of 4524 4564 89D1.tmp 95 PID 4524 wrote to memory of 2696 4524 8A3E.tmp 96 PID 4524 wrote to memory of 2696 4524 8A3E.tmp 96 PID 4524 wrote to memory of 2696 4524 8A3E.tmp 96 PID 2696 wrote to memory of 2736 2696 8ADB.tmp 97 PID 2696 wrote to memory of 2736 2696 8ADB.tmp 97 PID 2696 wrote to memory of 2736 2696 8ADB.tmp 97 PID 2736 wrote to memory of 4260 2736 8C61.tmp 100 PID 2736 wrote to memory of 4260 2736 8C61.tmp 100 PID 2736 wrote to memory of 4260 2736 8C61.tmp 100 PID 4260 wrote to memory of 2656 4260 8CFE.tmp 101 PID 4260 wrote to memory of 2656 4260 8CFE.tmp 101 PID 4260 wrote to memory of 2656 4260 8CFE.tmp 101 PID 2656 wrote to memory of 756 2656 8DE8.tmp 102 PID 2656 wrote to memory of 756 2656 8DE8.tmp 102 PID 2656 wrote to memory of 756 2656 8DE8.tmp 102 PID 756 wrote to memory of 2464 756 8E94.tmp 103 PID 756 wrote to memory of 2464 756 8E94.tmp 103 PID 756 wrote to memory of 2464 756 8E94.tmp 103 PID 2464 wrote to memory of 2592 2464 8F20.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\25224cc1501d603bf29fd359a0717e1b_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\7EA6.tmp"C:\Users\Admin\AppData\Local\Temp\7EA6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\7F32.tmp"C:\Users\Admin\AppData\Local\Temp\7F32.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\8349.tmp"C:\Users\Admin\AppData\Local\Temp\8349.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\852E.tmp"C:\Users\Admin\AppData\Local\Temp\852E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\85D9.tmp"C:\Users\Admin\AppData\Local\Temp\85D9.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\883B.tmp"C:\Users\Admin\AppData\Local\Temp\883B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\8906.tmp"C:\Users\Admin\AppData\Local\Temp\8906.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\8C61.tmp"C:\Users\Admin\AppData\Local\Temp\8C61.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\8F20.tmp"C:\Users\Admin\AppData\Local\Temp\8F20.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"23⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\9097.tmp"C:\Users\Admin\AppData\Local\Temp\9097.tmp"24⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\9143.tmp"C:\Users\Admin\AppData\Local\Temp\9143.tmp"25⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"26⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\929B.tmp"C:\Users\Admin\AppData\Local\Temp\929B.tmp"27⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\9328.tmp"C:\Users\Admin\AppData\Local\Temp\9328.tmp"28⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\93C4.tmp"C:\Users\Admin\AppData\Local\Temp\93C4.tmp"29⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\9441.tmp"C:\Users\Admin\AppData\Local\Temp\9441.tmp"30⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\94ED.tmp"C:\Users\Admin\AppData\Local\Temp\94ED.tmp"31⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\9599.tmp"C:\Users\Admin\AppData\Local\Temp\9599.tmp"32⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\9673.tmp"C:\Users\Admin\AppData\Local\Temp\9673.tmp"33⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\9710.tmp"C:\Users\Admin\AppData\Local\Temp\9710.tmp"34⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\97BC.tmp"C:\Users\Admin\AppData\Local\Temp\97BC.tmp"35⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\9819.tmp"C:\Users\Admin\AppData\Local\Temp\9819.tmp"36⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"37⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"38⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\99CF.tmp"C:\Users\Admin\AppData\Local\Temp\99CF.tmp"39⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\9A3C.tmp"C:\Users\Admin\AppData\Local\Temp\9A3C.tmp"40⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"41⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\9B55.tmp"C:\Users\Admin\AppData\Local\Temp\9B55.tmp"42⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"43⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"44⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\9E53.tmp"C:\Users\Admin\AppData\Local\Temp\9E53.tmp"45⤵
- Executes dropped EXE
PID:632 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"46⤵
- Executes dropped EXE
PID:472 -
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"47⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"48⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"49⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\A4BC.tmp"C:\Users\Admin\AppData\Local\Temp\A4BC.tmp"50⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"51⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\A5E5.tmp"C:\Users\Admin\AppData\Local\Temp\A5E5.tmp"52⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\A681.tmp"C:\Users\Admin\AppData\Local\Temp\A681.tmp"53⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"54⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\A78A.tmp"C:\Users\Admin\AppData\Local\Temp\A78A.tmp"55⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"56⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\A894.tmp"C:\Users\Admin\AppData\Local\Temp\A894.tmp"57⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"58⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"59⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"60⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"61⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"62⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"63⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"64⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"65⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\AE41.tmp"C:\Users\Admin\AppData\Local\Temp\AE41.tmp"66⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"67⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"68⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"69⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\B054.tmp"C:\Users\Admin\AppData\Local\Temp\B054.tmp"70⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"71⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"72⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"73⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\B268.tmp"C:\Users\Admin\AppData\Local\Temp\B268.tmp"74⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"75⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"76⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\B43C.tmp"C:\Users\Admin\AppData\Local\Temp\B43C.tmp"77⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"78⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\B565.tmp"C:\Users\Admin\AppData\Local\Temp\B565.tmp"79⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\B611.tmp"C:\Users\Admin\AppData\Local\Temp\B611.tmp"80⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"81⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\B779.tmp"C:\Users\Admin\AppData\Local\Temp\B779.tmp"82⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\B815.tmp"C:\Users\Admin\AppData\Local\Temp\B815.tmp"83⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\B892.tmp"C:\Users\Admin\AppData\Local\Temp\B892.tmp"84⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"85⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"86⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\BEFA.tmp"C:\Users\Admin\AppData\Local\Temp\BEFA.tmp"87⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"88⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\C0B0.tmp"C:\Users\Admin\AppData\Local\Temp\C0B0.tmp"89⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"90⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"91⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\C256.tmp"C:\Users\Admin\AppData\Local\Temp\C256.tmp"92⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\C2D3.tmp"C:\Users\Admin\AppData\Local\Temp\C2D3.tmp"93⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"94⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"95⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\C459.tmp"C:\Users\Admin\AppData\Local\Temp\C459.tmp"96⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"97⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\C582.tmp"C:\Users\Admin\AppData\Local\Temp\C582.tmp"98⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"99⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"100⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\C861.tmp"C:\Users\Admin\AppData\Local\Temp\C861.tmp"101⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"102⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\C97A.tmp"C:\Users\Admin\AppData\Local\Temp\C97A.tmp"103⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"104⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\CA93.tmp"C:\Users\Admin\AppData\Local\Temp\CA93.tmp"105⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"106⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"107⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\CC39.tmp"C:\Users\Admin\AppData\Local\Temp\CC39.tmp"108⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"109⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"110⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"111⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"112⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"113⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"114⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\D050.tmp"C:\Users\Admin\AppData\Local\Temp\D050.tmp"115⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"116⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\D198.tmp"C:\Users\Admin\AppData\Local\Temp\D198.tmp"117⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\D3EA.tmp"C:\Users\Admin\AppData\Local\Temp\D3EA.tmp"118⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"119⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"120⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"121⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"122⤵PID:1468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-