Analysis
-
max time kernel
162s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2023 15:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
30b1184b48f8ae36752a464481befaa8_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
30b1184b48f8ae36752a464481befaa8_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
30b1184b48f8ae36752a464481befaa8_mafia_JC.exe
-
Size
486KB
-
MD5
30b1184b48f8ae36752a464481befaa8
-
SHA1
f8f59b2847992815cef5982a6c86ee13d120c9c9
-
SHA256
0f534f384f1fee781d53d3db9cbe5d13ddd13ffc8610ab2f80923c4a536eb983
-
SHA512
1c01708d402b87fbcb29aff6e5c5881d0f1b87ef15e9473753633ca2ca22a40e3e3b0ed3d6cbfd869ec18b05845d4b1ad921b9a3b57a3d578cb9df05eb3ead28
-
SSDEEP
12288:/U5rCOTeiDMGZwKFTMPwSZibA2K9S4NZ:/UQOJDoKFTMebrK93N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1804 DF34.tmp 1348 E01F.tmp 4824 E0AB.tmp 4644 E1D4.tmp 648 E32C.tmp 4308 EFAF.tmp 4940 F32A.tmp 4500 7AC.tmp 1532 867.tmp 2040 1596.tmp 2264 19FB.tmp 3872 1AD6.tmp 2744 1C1E.tmp 1328 1CAB.tmp 1668 1D37.tmp 2768 1DD4.tmp 4888 1E70.tmp 4996 1F5A.tmp 3076 1FE7.tmp 3668 22E5.tmp 3420 2390.tmp 4312 244C.tmp 3372 24F8.tmp 2672 2594.tmp 4796 2B8F.tmp 1088 3294.tmp 1140 3350.tmp 5100 40DC.tmp 3796 4590.tmp 3632 468A.tmp 3532 4793.tmp 4528 485E.tmp 3092 4939.tmp 1988 4AA0.tmp 2356 4B0E.tmp 3180 4B9A.tmp 1464 529F.tmp 4688 57C0.tmp 64 5A21.tmp 4256 650E.tmp 4884 6E45.tmp 1804 6EE2.tmp 3176 6F6E.tmp 2820 6FFB.tmp 4508 7078.tmp 4644 7114.tmp 2948 720E.tmp 3196 729B.tmp 2100 7337.tmp 4112 73A4.tmp 4788 7CBD.tmp 1632 7F0E.tmp 2824 8316.tmp 4520 871D.tmp 1532 8D66.tmp 2576 97B7.tmp 3276 99AB.tmp 1924 9E10.tmp 2064 A3BD.tmp 2692 A563.tmp 1460 A67C.tmp 1648 A9D7.tmp 3736 ACE5.tmp 2228 AED9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 1804 2688 30b1184b48f8ae36752a464481befaa8_mafia_JC.exe 81 PID 2688 wrote to memory of 1804 2688 30b1184b48f8ae36752a464481befaa8_mafia_JC.exe 81 PID 2688 wrote to memory of 1804 2688 30b1184b48f8ae36752a464481befaa8_mafia_JC.exe 81 PID 1804 wrote to memory of 1348 1804 DF34.tmp 82 PID 1804 wrote to memory of 1348 1804 DF34.tmp 82 PID 1804 wrote to memory of 1348 1804 DF34.tmp 82 PID 1348 wrote to memory of 4824 1348 E01F.tmp 83 PID 1348 wrote to memory of 4824 1348 E01F.tmp 83 PID 1348 wrote to memory of 4824 1348 E01F.tmp 83 PID 4824 wrote to memory of 4644 4824 E0AB.tmp 84 PID 4824 wrote to memory of 4644 4824 E0AB.tmp 84 PID 4824 wrote to memory of 4644 4824 E0AB.tmp 84 PID 4644 wrote to memory of 648 4644 E1D4.tmp 85 PID 4644 wrote to memory of 648 4644 E1D4.tmp 85 PID 4644 wrote to memory of 648 4644 E1D4.tmp 85 PID 648 wrote to memory of 4308 648 E32C.tmp 86 PID 648 wrote to memory of 4308 648 E32C.tmp 86 PID 648 wrote to memory of 4308 648 E32C.tmp 86 PID 4308 wrote to memory of 4940 4308 EFAF.tmp 87 PID 4308 wrote to memory of 4940 4308 EFAF.tmp 87 PID 4308 wrote to memory of 4940 4308 EFAF.tmp 87 PID 4940 wrote to memory of 4500 4940 F32A.tmp 88 PID 4940 wrote to memory of 4500 4940 F32A.tmp 88 PID 4940 wrote to memory of 4500 4940 F32A.tmp 88 PID 4500 wrote to memory of 1532 4500 7AC.tmp 89 PID 4500 wrote to memory of 1532 4500 7AC.tmp 89 PID 4500 wrote to memory of 1532 4500 7AC.tmp 89 PID 1532 wrote to memory of 2040 1532 867.tmp 90 PID 1532 wrote to memory of 2040 1532 867.tmp 90 PID 1532 wrote to memory of 2040 1532 867.tmp 90 PID 2040 wrote to memory of 2264 2040 1596.tmp 91 PID 2040 wrote to memory of 2264 2040 1596.tmp 91 PID 2040 wrote to memory of 2264 2040 1596.tmp 91 PID 2264 wrote to memory of 3872 2264 19FB.tmp 92 PID 2264 wrote to memory of 3872 2264 19FB.tmp 92 PID 2264 wrote to memory of 3872 2264 19FB.tmp 92 PID 3872 wrote to memory of 2744 3872 1AD6.tmp 93 PID 3872 wrote to memory of 2744 3872 1AD6.tmp 93 PID 3872 wrote to memory of 2744 3872 1AD6.tmp 93 PID 2744 wrote to memory of 1328 2744 1C1E.tmp 94 PID 2744 wrote to memory of 1328 2744 1C1E.tmp 94 PID 2744 wrote to memory of 1328 2744 1C1E.tmp 94 PID 1328 wrote to memory of 1668 1328 1CAB.tmp 95 PID 1328 wrote to memory of 1668 1328 1CAB.tmp 95 PID 1328 wrote to memory of 1668 1328 1CAB.tmp 95 PID 1668 wrote to memory of 2768 1668 1D37.tmp 97 PID 1668 wrote to memory of 2768 1668 1D37.tmp 97 PID 1668 wrote to memory of 2768 1668 1D37.tmp 97 PID 2768 wrote to memory of 4888 2768 1DD4.tmp 100 PID 2768 wrote to memory of 4888 2768 1DD4.tmp 100 PID 2768 wrote to memory of 4888 2768 1DD4.tmp 100 PID 4888 wrote to memory of 4996 4888 1E70.tmp 102 PID 4888 wrote to memory of 4996 4888 1E70.tmp 102 PID 4888 wrote to memory of 4996 4888 1E70.tmp 102 PID 4996 wrote to memory of 3076 4996 1F5A.tmp 103 PID 4996 wrote to memory of 3076 4996 1F5A.tmp 103 PID 4996 wrote to memory of 3076 4996 1F5A.tmp 103 PID 3076 wrote to memory of 3668 3076 1FE7.tmp 105 PID 3076 wrote to memory of 3668 3076 1FE7.tmp 105 PID 3076 wrote to memory of 3668 3076 1FE7.tmp 105 PID 3668 wrote to memory of 3420 3668 22E5.tmp 106 PID 3668 wrote to memory of 3420 3668 22E5.tmp 106 PID 3668 wrote to memory of 3420 3668 22E5.tmp 106 PID 3420 wrote to memory of 4312 3420 2390.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b1184b48f8ae36752a464481befaa8_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\30b1184b48f8ae36752a464481befaa8_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\E01F.tmp"C:\Users\Admin\AppData\Local\Temp\E01F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\F32A.tmp"C:\Users\Admin\AppData\Local\Temp\F32A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\7AC.tmp"C:\Users\Admin\AppData\Local\Temp\7AC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\19FB.tmp"C:\Users\Admin\AppData\Local\Temp\19FB.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\2390.tmp"C:\Users\Admin\AppData\Local\Temp\2390.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"23⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\24F8.tmp"C:\Users\Admin\AppData\Local\Temp\24F8.tmp"24⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"25⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"26⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\3294.tmp"C:\Users\Admin\AppData\Local\Temp\3294.tmp"27⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"28⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\40DC.tmp"C:\Users\Admin\AppData\Local\Temp\40DC.tmp"29⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"30⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"31⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"32⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"33⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\4939.tmp"C:\Users\Admin\AppData\Local\Temp\4939.tmp"34⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"35⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"36⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"C:\Users\Admin\AppData\Local\Temp\4B9A.tmp"37⤵
- Executes dropped EXE
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\529F.tmp"C:\Users\Admin\AppData\Local\Temp\529F.tmp"38⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\57C0.tmp"C:\Users\Admin\AppData\Local\Temp\57C0.tmp"39⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\5A21.tmp"C:\Users\Admin\AppData\Local\Temp\5A21.tmp"40⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\650E.tmp"C:\Users\Admin\AppData\Local\Temp\650E.tmp"41⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\6E45.tmp"C:\Users\Admin\AppData\Local\Temp\6E45.tmp"42⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"43⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\6F6E.tmp"C:\Users\Admin\AppData\Local\Temp\6F6E.tmp"44⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"45⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\7078.tmp"C:\Users\Admin\AppData\Local\Temp\7078.tmp"46⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"47⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\720E.tmp"C:\Users\Admin\AppData\Local\Temp\720E.tmp"48⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\729B.tmp"C:\Users\Admin\AppData\Local\Temp\729B.tmp"49⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\7337.tmp"C:\Users\Admin\AppData\Local\Temp\7337.tmp"50⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\73A4.tmp"C:\Users\Admin\AppData\Local\Temp\73A4.tmp"51⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\7CBD.tmp"C:\Users\Admin\AppData\Local\Temp\7CBD.tmp"52⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"53⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\8316.tmp"C:\Users\Admin\AppData\Local\Temp\8316.tmp"54⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\871D.tmp"C:\Users\Admin\AppData\Local\Temp\871D.tmp"55⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\8D66.tmp"C:\Users\Admin\AppData\Local\Temp\8D66.tmp"56⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\97B7.tmp"C:\Users\Admin\AppData\Local\Temp\97B7.tmp"57⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\99AB.tmp"C:\Users\Admin\AppData\Local\Temp\99AB.tmp"58⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\9E10.tmp"C:\Users\Admin\AppData\Local\Temp\9E10.tmp"59⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"60⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\A563.tmp"C:\Users\Admin\AppData\Local\Temp\A563.tmp"61⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\A67C.tmp"C:\Users\Admin\AppData\Local\Temp\A67C.tmp"62⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\A9D7.tmp"C:\Users\Admin\AppData\Local\Temp\A9D7.tmp"63⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"64⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\AED9.tmp"C:\Users\Admin\AppData\Local\Temp\AED9.tmp"65⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\B3BB.tmp"C:\Users\Admin\AppData\Local\Temp\B3BB.tmp"66⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"67⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"68⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\BA33.tmp"C:\Users\Admin\AppData\Local\Temp\BA33.tmp"69⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\C4E1.tmp"C:\Users\Admin\AppData\Local\Temp\C4E1.tmp"70⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\C5CC.tmp"C:\Users\Admin\AppData\Local\Temp\C5CC.tmp"71⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\C6C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6C6.tmp"72⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\C81D.tmp"C:\Users\Admin\AppData\Local\Temp\C81D.tmp"73⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\CAFC.tmp"C:\Users\Admin\AppData\Local\Temp\CAFC.tmp"74⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\CBF6.tmp"C:\Users\Admin\AppData\Local\Temp\CBF6.tmp"75⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"76⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\D85A.tmp"C:\Users\Admin\AppData\Local\Temp\D85A.tmp"77⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\DA0F.tmp"C:\Users\Admin\AppData\Local\Temp\DA0F.tmp"78⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\DD1C.tmp"C:\Users\Admin\AppData\Local\Temp\DD1C.tmp"79⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\DDF7.tmp"C:\Users\Admin\AppData\Local\Temp\DDF7.tmp"80⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\DF20.tmp"C:\Users\Admin\AppData\Local\Temp\DF20.tmp"81⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\E3D3.tmp"C:\Users\Admin\AppData\Local\Temp\E3D3.tmp"82⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\E72F.tmp"C:\Users\Admin\AppData\Local\Temp\E72F.tmp"83⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\E8F4.tmp"C:\Users\Admin\AppData\Local\Temp\E8F4.tmp"84⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\EC30.tmp"C:\Users\Admin\AppData\Local\Temp\EC30.tmp"85⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\EFE9.tmp"C:\Users\Admin\AppData\Local\Temp\EFE9.tmp"86⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"87⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\F623.tmp"C:\Users\Admin\AppData\Local\Temp\F623.tmp"88⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\F76B.tmp"C:\Users\Admin\AppData\Local\Temp\F76B.tmp"89⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\F8C3.tmp"C:\Users\Admin\AppData\Local\Temp\F8C3.tmp"90⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\FC2E.tmp"C:\Users\Admin\AppData\Local\Temp\FC2E.tmp"91⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\FE60.tmp"C:\Users\Admin\AppData\Local\Temp\FE60.tmp"92⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\100.tmp"C:\Users\Admin\AppData\Local\Temp\100.tmp"93⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\611.tmp"C:\Users\Admin\AppData\Local\Temp\611.tmp"94⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\71A.tmp"C:\Users\Admin\AppData\Local\Temp\71A.tmp"95⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\EFA.tmp"C:\Users\Admin\AppData\Local\Temp\EFA.tmp"96⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\113C.tmp"C:\Users\Admin\AppData\Local\Temp\113C.tmp"97⤵PID:424
-
C:\Users\Admin\AppData\Local\Temp\18BE.tmp"C:\Users\Admin\AppData\Local\Temp\18BE.tmp"98⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\1A54.tmp"C:\Users\Admin\AppData\Local\Temp\1A54.tmp"99⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"100⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\23BB.tmp"C:\Users\Admin\AppData\Local\Temp\23BB.tmp"101⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\286E.tmp"C:\Users\Admin\AppData\Local\Temp\286E.tmp"102⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\2C75.tmp"C:\Users\Admin\AppData\Local\Temp\2C75.tmp"103⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\32FD.tmp"C:\Users\Admin\AppData\Local\Temp\32FD.tmp"104⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\3445.tmp"C:\Users\Admin\AppData\Local\Temp\3445.tmp"105⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\3B0B.tmp"C:\Users\Admin\AppData\Local\Temp\3B0B.tmp"106⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\3C25.tmp"C:\Users\Admin\AppData\Local\Temp\3C25.tmp"107⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\3DAB.tmp"C:\Users\Admin\AppData\Local\Temp\3DAB.tmp"108⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\40A9.tmp"C:\Users\Admin\AppData\Local\Temp\40A9.tmp"109⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\4164.tmp"C:\Users\Admin\AppData\Local\Temp\4164.tmp"110⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\429D.tmp"C:\Users\Admin\AppData\Local\Temp\429D.tmp"111⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\4339.tmp"C:\Users\Admin\AppData\Local\Temp\4339.tmp"112⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\43E5.tmp"C:\Users\Admin\AppData\Local\Temp\43E5.tmp"113⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\4491.tmp"C:\Users\Admin\AppData\Local\Temp\4491.tmp"114⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\453D.tmp"C:\Users\Admin\AppData\Local\Temp\453D.tmp"115⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\45D9.tmp"C:\Users\Admin\AppData\Local\Temp\45D9.tmp"116⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\4E16.tmp"C:\Users\Admin\AppData\Local\Temp\4E16.tmp"117⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\51B0.tmp"C:\Users\Admin\AppData\Local\Temp\51B0.tmp"118⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\523D.tmp"C:\Users\Admin\AppData\Local\Temp\523D.tmp"119⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\52D9.tmp"C:\Users\Admin\AppData\Local\Temp\52D9.tmp"120⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\57BB.tmp"C:\Users\Admin\AppData\Local\Temp\57BB.tmp"121⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\5857.tmp"C:\Users\Admin\AppData\Local\Temp\5857.tmp"122⤵PID:3276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-