Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 17:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe
-
Size
486KB
-
MD5
629621d6f7d8338f1d6d3e61cc0cd206
-
SHA1
7369164ed2f9bb27cb23baac20b626a2079a8b4f
-
SHA256
ab8e0a5f1c9a2351ae25677efe74ae71cf6d9f3c03680ed709befe7e3f52acb8
-
SHA512
bce285c57c0f0c0bdaf47227f8f8cd4ce3caa7da0cb5fcc6407e7d9b5c7205f123d12b2670695f248d0460aafb7727be69e100f8e6104394b510d652c74e2621
-
SSDEEP
12288:/U5rCOTeiD0BhWktdY4bO6MJDaTajfMDlxNZ:/UQOJD0BhfZ2pa4MZxN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 904 A99E.tmp 4352 AA78.tmp 4196 AAF5.tmp 3008 ABE0.tmp 4940 AC9B.tmp 3048 AD95.tmp 3160 B44C.tmp 4364 B4E8.tmp 3880 B585.tmp 4728 B640.tmp 840 B6EC.tmp 2204 B7B7.tmp 2604 B844.tmp 4948 B93E.tmp 180 BA28.tmp 4656 BAE4.tmp 4124 BBAF.tmp 3684 BC7A.tmp 1448 BD83.tmp 880 BE3F.tmp 1756 BF77.tmp 4836 C033.tmp 2800 C0C0.tmp 4796 C18B.tmp 4344 C275.tmp 4112 C35F.tmp 4024 C44A.tmp 3820 C505.tmp 1752 C5C1.tmp 1000 C66D.tmp 3928 C6EA.tmp 1428 C776.tmp 4056 C841.tmp 2344 C8BE.tmp 1388 C95B.tmp 2100 C9D8.tmp 2064 CA45.tmp 3512 CAB2.tmp 3648 CB20.tmp 1308 CB9D.tmp 1060 CC1A.tmp 1792 CC97.tmp 1384 CD14.tmp 3156 CDB0.tmp 3408 CE4C.tmp 1860 CEBA.tmp 3396 CF56.tmp 4748 CFD3.tmp 4452 D060.tmp 3200 D0DD.tmp 4604 D179.tmp 4116 D1F6.tmp 1824 D292.tmp 2144 D31F.tmp 4500 D39C.tmp 2108 D428.tmp 4672 D4C5.tmp 904 D580.tmp 3484 D63C.tmp 752 D726.tmp 3436 D7F1.tmp 1864 D88D.tmp 224 D949.tmp 4940 D9F5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 904 1520 629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe 82 PID 1520 wrote to memory of 904 1520 629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe 82 PID 1520 wrote to memory of 904 1520 629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe 82 PID 904 wrote to memory of 4352 904 A99E.tmp 83 PID 904 wrote to memory of 4352 904 A99E.tmp 83 PID 904 wrote to memory of 4352 904 A99E.tmp 83 PID 4352 wrote to memory of 4196 4352 AA78.tmp 84 PID 4352 wrote to memory of 4196 4352 AA78.tmp 84 PID 4352 wrote to memory of 4196 4352 AA78.tmp 84 PID 4196 wrote to memory of 3008 4196 AAF5.tmp 85 PID 4196 wrote to memory of 3008 4196 AAF5.tmp 85 PID 4196 wrote to memory of 3008 4196 AAF5.tmp 85 PID 3008 wrote to memory of 4940 3008 ABE0.tmp 86 PID 3008 wrote to memory of 4940 3008 ABE0.tmp 86 PID 3008 wrote to memory of 4940 3008 ABE0.tmp 86 PID 4940 wrote to memory of 3048 4940 AC9B.tmp 87 PID 4940 wrote to memory of 3048 4940 AC9B.tmp 87 PID 4940 wrote to memory of 3048 4940 AC9B.tmp 87 PID 3048 wrote to memory of 3160 3048 AD95.tmp 88 PID 3048 wrote to memory of 3160 3048 AD95.tmp 88 PID 3048 wrote to memory of 3160 3048 AD95.tmp 88 PID 3160 wrote to memory of 4364 3160 B44C.tmp 89 PID 3160 wrote to memory of 4364 3160 B44C.tmp 89 PID 3160 wrote to memory of 4364 3160 B44C.tmp 89 PID 4364 wrote to memory of 3880 4364 B4E8.tmp 90 PID 4364 wrote to memory of 3880 4364 B4E8.tmp 90 PID 4364 wrote to memory of 3880 4364 B4E8.tmp 90 PID 3880 wrote to memory of 4728 3880 B585.tmp 91 PID 3880 wrote to memory of 4728 3880 B585.tmp 91 PID 3880 wrote to memory of 4728 3880 B585.tmp 91 PID 4728 wrote to memory of 840 4728 B640.tmp 92 PID 4728 wrote to memory of 840 4728 B640.tmp 92 PID 4728 wrote to memory of 840 4728 B640.tmp 92 PID 840 wrote to memory of 2204 840 B6EC.tmp 94 PID 840 wrote to memory of 2204 840 B6EC.tmp 94 PID 840 wrote to memory of 2204 840 B6EC.tmp 94 PID 2204 wrote to memory of 2604 2204 B7B7.tmp 95 PID 2204 wrote to memory of 2604 2204 B7B7.tmp 95 PID 2204 wrote to memory of 2604 2204 B7B7.tmp 95 PID 2604 wrote to memory of 4948 2604 B844.tmp 96 PID 2604 wrote to memory of 4948 2604 B844.tmp 96 PID 2604 wrote to memory of 4948 2604 B844.tmp 96 PID 4948 wrote to memory of 180 4948 B93E.tmp 97 PID 4948 wrote to memory of 180 4948 B93E.tmp 97 PID 4948 wrote to memory of 180 4948 B93E.tmp 97 PID 180 wrote to memory of 4656 180 BA28.tmp 98 PID 180 wrote to memory of 4656 180 BA28.tmp 98 PID 180 wrote to memory of 4656 180 BA28.tmp 98 PID 4656 wrote to memory of 4124 4656 BAE4.tmp 99 PID 4656 wrote to memory of 4124 4656 BAE4.tmp 99 PID 4656 wrote to memory of 4124 4656 BAE4.tmp 99 PID 4124 wrote to memory of 3684 4124 BBAF.tmp 100 PID 4124 wrote to memory of 3684 4124 BBAF.tmp 100 PID 4124 wrote to memory of 3684 4124 BBAF.tmp 100 PID 3684 wrote to memory of 1448 3684 BC7A.tmp 101 PID 3684 wrote to memory of 1448 3684 BC7A.tmp 101 PID 3684 wrote to memory of 1448 3684 BC7A.tmp 101 PID 1448 wrote to memory of 880 1448 BD83.tmp 102 PID 1448 wrote to memory of 880 1448 BD83.tmp 102 PID 1448 wrote to memory of 880 1448 BD83.tmp 102 PID 880 wrote to memory of 1756 880 BE3F.tmp 105 PID 880 wrote to memory of 1756 880 BE3F.tmp 105 PID 880 wrote to memory of 1756 880 BE3F.tmp 105 PID 1756 wrote to memory of 4836 1756 BF77.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\629621d6f7d8338f1d6d3e61cc0cd206_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\A99E.tmp"C:\Users\Admin\AppData\Local\Temp\A99E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\AD95.tmp"C:\Users\Admin\AppData\Local\Temp\AD95.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\B585.tmp"C:\Users\Admin\AppData\Local\Temp\B585.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\B844.tmp"C:\Users\Admin\AppData\Local\Temp\B844.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\B93E.tmp"C:\Users\Admin\AppData\Local\Temp\B93E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\BD83.tmp"C:\Users\Admin\AppData\Local\Temp\BD83.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\BF77.tmp"C:\Users\Admin\AppData\Local\Temp\BF77.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\C033.tmp"C:\Users\Admin\AppData\Local\Temp\C033.tmp"23⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"24⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"25⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\C275.tmp"C:\Users\Admin\AppData\Local\Temp\C275.tmp"26⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\C35F.tmp"C:\Users\Admin\AppData\Local\Temp\C35F.tmp"27⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"28⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\C505.tmp"C:\Users\Admin\AppData\Local\Temp\C505.tmp"29⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"30⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\C66D.tmp"C:\Users\Admin\AppData\Local\Temp\C66D.tmp"31⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"32⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"33⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"34⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\C8BE.tmp"C:\Users\Admin\AppData\Local\Temp\C8BE.tmp"35⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"36⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"37⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"38⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"39⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"40⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"41⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"42⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"43⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\CD14.tmp"C:\Users\Admin\AppData\Local\Temp\CD14.tmp"44⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\CDB0.tmp"C:\Users\Admin\AppData\Local\Temp\CDB0.tmp"45⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"46⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"47⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\CF56.tmp"C:\Users\Admin\AppData\Local\Temp\CF56.tmp"48⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"49⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"50⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\D0DD.tmp"C:\Users\Admin\AppData\Local\Temp\D0DD.tmp"51⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\D179.tmp"C:\Users\Admin\AppData\Local\Temp\D179.tmp"52⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"53⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"54⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"55⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"56⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\D428.tmp"C:\Users\Admin\AppData\Local\Temp\D428.tmp"57⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"58⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"59⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"60⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\D726.tmp"C:\Users\Admin\AppData\Local\Temp\D726.tmp"61⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"62⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\D88D.tmp"C:\Users\Admin\AppData\Local\Temp\D88D.tmp"63⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\D949.tmp"C:\Users\Admin\AppData\Local\Temp\D949.tmp"64⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"65⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"66⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"67⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"68⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"69⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\DD60.tmp"C:\Users\Admin\AppData\Local\Temp\DD60.tmp"70⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"71⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"72⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"73⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\DF73.tmp"C:\Users\Admin\AppData\Local\Temp\DF73.tmp"74⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"75⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"76⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"77⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"78⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"79⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"80⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"81⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\E436.tmp"C:\Users\Admin\AppData\Local\Temp\E436.tmp"82⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\E501.tmp"C:\Users\Admin\AppData\Local\Temp\E501.tmp"83⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"84⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"85⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"86⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"87⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"88⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"89⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\E918.tmp"C:\Users\Admin\AppData\Local\Temp\E918.tmp"90⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\E975.tmp"C:\Users\Admin\AppData\Local\Temp\E975.tmp"91⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"92⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"93⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"94⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"95⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"96⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"97⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"98⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"99⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\EE57.tmp"C:\Users\Admin\AppData\Local\Temp\EE57.tmp"100⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"101⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\EF80.tmp"C:\Users\Admin\AppData\Local\Temp\EF80.tmp"102⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"103⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\F06B.tmp"C:\Users\Admin\AppData\Local\Temp\F06B.tmp"104⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"105⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"106⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"107⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"108⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\F378.tmp"C:\Users\Admin\AppData\Local\Temp\F378.tmp"109⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\F414.tmp"C:\Users\Admin\AppData\Local\Temp\F414.tmp"110⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"111⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"112⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"113⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\F685.tmp"C:\Users\Admin\AppData\Local\Temp\F685.tmp"114⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"115⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"116⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"117⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\F915.tmp"C:\Users\Admin\AppData\Local\Temp\F915.tmp"118⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"119⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"120⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"121⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\FB58.tmp"C:\Users\Admin\AppData\Local\Temp\FB58.tmp"122⤵PID:4196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-