Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 10:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe
-
Size
486KB
-
MD5
8cb9a0c65d3a58539dfc8456db2b515b
-
SHA1
c21d9f9f8e402739854b1d830d76bd8751b37bbd
-
SHA256
91d9238ae32bd9bd782b65c19b63fb1053dda677fd7805521fae1f656cf79eec
-
SHA512
21156677386d1d0ec231323925788703e7c3ad0d7f44fa23d8821ac7c93c7fdd328f71a41ad52e4a63e11897d88e0e15d4aeeffd42e628e248ddce6b99b76457
-
SSDEEP
12288:UU5rCOTeiD6FULS+B6mvYoV7FS2jkA3Q4aM1/7NZ:UUQOJD0Um+BDYoVbkAATMxN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4924 D38C.tmp 4788 D448.tmp 3376 D4F3.tmp 4388 D5ED.tmp 5024 D6D8.tmp 2892 D7B3.tmp 3320 D85E.tmp 3692 D92A.tmp 2760 D9E5.tmp 3704 DA81.tmp 760 DB4C.tmp 3032 DC18.tmp 1424 DCB4.tmp 5072 DDAE.tmp 2716 DE79.tmp 2492 DF25.tmp 4120 DFE0.tmp 2004 E34B.tmp 3364 E426.tmp 1412 E4E2.tmp 1972 E5DC.tmp 2732 E697.tmp 4428 E7B0.tmp 3632 E86C.tmp 4696 E918.tmp 1980 E9D3.tmp 1984 EAAE.tmp 2000 EB3B.tmp 836 EB98.tmp 4424 EC63.tmp 708 ED6D.tmp 5048 EE96.tmp 4672 EF90.tmp 2692 F03C.tmp 4816 F0B9.tmp 4636 F145.tmp 4864 F1E2.tmp 4988 F28E.tmp 4512 F32A.tmp 3696 F3C6.tmp 3256 F443.tmp 4240 F4EF.tmp 4200 F58B.tmp 1776 F627.tmp 3308 F6C4.tmp 2932 F731.tmp 3296 F7BE.tmp 4300 F879.tmp 4124 F8F6.tmp 3104 F992.tmp 1920 FA00.tmp 3628 FAAC.tmp 3192 FB38.tmp 3524 FBD5.tmp 1300 FC61.tmp 2636 FCEE.tmp 4788 FD9A.tmp 1364 FE36.tmp 1800 FEC3.tmp 1072 FF40.tmp 1544 FFCC.tmp 2892 59.tmp 3692 D6.tmp 1068 153.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4924 2232 8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe 81 PID 2232 wrote to memory of 4924 2232 8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe 81 PID 2232 wrote to memory of 4924 2232 8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe 81 PID 4924 wrote to memory of 4788 4924 D38C.tmp 82 PID 4924 wrote to memory of 4788 4924 D38C.tmp 82 PID 4924 wrote to memory of 4788 4924 D38C.tmp 82 PID 4788 wrote to memory of 3376 4788 D448.tmp 83 PID 4788 wrote to memory of 3376 4788 D448.tmp 83 PID 4788 wrote to memory of 3376 4788 D448.tmp 83 PID 3376 wrote to memory of 4388 3376 D4F3.tmp 84 PID 3376 wrote to memory of 4388 3376 D4F3.tmp 84 PID 3376 wrote to memory of 4388 3376 D4F3.tmp 84 PID 4388 wrote to memory of 5024 4388 D5ED.tmp 85 PID 4388 wrote to memory of 5024 4388 D5ED.tmp 85 PID 4388 wrote to memory of 5024 4388 D5ED.tmp 85 PID 5024 wrote to memory of 2892 5024 D6D8.tmp 86 PID 5024 wrote to memory of 2892 5024 D6D8.tmp 86 PID 5024 wrote to memory of 2892 5024 D6D8.tmp 86 PID 2892 wrote to memory of 3320 2892 D7B3.tmp 87 PID 2892 wrote to memory of 3320 2892 D7B3.tmp 87 PID 2892 wrote to memory of 3320 2892 D7B3.tmp 87 PID 3320 wrote to memory of 3692 3320 D85E.tmp 88 PID 3320 wrote to memory of 3692 3320 D85E.tmp 88 PID 3320 wrote to memory of 3692 3320 D85E.tmp 88 PID 3692 wrote to memory of 2760 3692 D92A.tmp 89 PID 3692 wrote to memory of 2760 3692 D92A.tmp 89 PID 3692 wrote to memory of 2760 3692 D92A.tmp 89 PID 2760 wrote to memory of 3704 2760 D9E5.tmp 90 PID 2760 wrote to memory of 3704 2760 D9E5.tmp 90 PID 2760 wrote to memory of 3704 2760 D9E5.tmp 90 PID 3704 wrote to memory of 760 3704 DA81.tmp 91 PID 3704 wrote to memory of 760 3704 DA81.tmp 91 PID 3704 wrote to memory of 760 3704 DA81.tmp 91 PID 760 wrote to memory of 3032 760 DB4C.tmp 92 PID 760 wrote to memory of 3032 760 DB4C.tmp 92 PID 760 wrote to memory of 3032 760 DB4C.tmp 92 PID 3032 wrote to memory of 1424 3032 DC18.tmp 93 PID 3032 wrote to memory of 1424 3032 DC18.tmp 93 PID 3032 wrote to memory of 1424 3032 DC18.tmp 93 PID 1424 wrote to memory of 5072 1424 DCB4.tmp 94 PID 1424 wrote to memory of 5072 1424 DCB4.tmp 94 PID 1424 wrote to memory of 5072 1424 DCB4.tmp 94 PID 5072 wrote to memory of 2716 5072 DDAE.tmp 95 PID 5072 wrote to memory of 2716 5072 DDAE.tmp 95 PID 5072 wrote to memory of 2716 5072 DDAE.tmp 95 PID 2716 wrote to memory of 2492 2716 DE79.tmp 96 PID 2716 wrote to memory of 2492 2716 DE79.tmp 96 PID 2716 wrote to memory of 2492 2716 DE79.tmp 96 PID 2492 wrote to memory of 4120 2492 DF25.tmp 97 PID 2492 wrote to memory of 4120 2492 DF25.tmp 97 PID 2492 wrote to memory of 4120 2492 DF25.tmp 97 PID 4120 wrote to memory of 2004 4120 DFE0.tmp 98 PID 4120 wrote to memory of 2004 4120 DFE0.tmp 98 PID 4120 wrote to memory of 2004 4120 DFE0.tmp 98 PID 2004 wrote to memory of 3364 2004 E34B.tmp 101 PID 2004 wrote to memory of 3364 2004 E34B.tmp 101 PID 2004 wrote to memory of 3364 2004 E34B.tmp 101 PID 3364 wrote to memory of 1412 3364 E426.tmp 102 PID 3364 wrote to memory of 1412 3364 E426.tmp 102 PID 3364 wrote to memory of 1412 3364 E426.tmp 102 PID 1412 wrote to memory of 1972 1412 E4E2.tmp 103 PID 1412 wrote to memory of 1972 1412 E4E2.tmp 103 PID 1412 wrote to memory of 1972 1412 E4E2.tmp 103 PID 1972 wrote to memory of 2732 1972 E5DC.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\8cb9a0c65d3a58539dfc8456db2b515b_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\D38C.tmp"C:\Users\Admin\AppData\Local\Temp\D38C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\D448.tmp"C:\Users\Admin\AppData\Local\Temp\D448.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\D92A.tmp"C:\Users\Admin\AppData\Local\Temp\D92A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\DA81.tmp"C:\Users\Admin\AppData\Local\Temp\DA81.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\DB4C.tmp"C:\Users\Admin\AppData\Local\Temp\DB4C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\E34B.tmp"C:\Users\Admin\AppData\Local\Temp\E34B.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"23⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"24⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\E86C.tmp"C:\Users\Admin\AppData\Local\Temp\E86C.tmp"25⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\E918.tmp"C:\Users\Admin\AppData\Local\Temp\E918.tmp"26⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"27⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"28⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"29⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\EB98.tmp"C:\Users\Admin\AppData\Local\Temp\EB98.tmp"30⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"31⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"32⤵
- Executes dropped EXE
PID:708 -
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"33⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"34⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\F03C.tmp"C:\Users\Admin\AppData\Local\Temp\F03C.tmp"35⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"36⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"37⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"38⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"39⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\F32A.tmp"C:\Users\Admin\AppData\Local\Temp\F32A.tmp"40⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"41⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\F443.tmp"C:\Users\Admin\AppData\Local\Temp\F443.tmp"42⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"43⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"44⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\F627.tmp"C:\Users\Admin\AppData\Local\Temp\F627.tmp"45⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\F6C4.tmp"C:\Users\Admin\AppData\Local\Temp\F6C4.tmp"46⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"47⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"48⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"49⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"50⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\F992.tmp"C:\Users\Admin\AppData\Local\Temp\F992.tmp"51⤵
- Executes dropped EXE
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\FA00.tmp"C:\Users\Admin\AppData\Local\Temp\FA00.tmp"52⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"53⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"54⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"55⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"56⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"57⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"58⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\FE36.tmp"C:\Users\Admin\AppData\Local\Temp\FE36.tmp"59⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\FEC3.tmp"C:\Users\Admin\AppData\Local\Temp\FEC3.tmp"60⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"61⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"62⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"63⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\D6.tmp"C:\Users\Admin\AppData\Local\Temp\D6.tmp"64⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\153.tmp"C:\Users\Admin\AppData\Local\Temp\153.tmp"65⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"66⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"67⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"68⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"69⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"70⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\431.tmp"C:\Users\Admin\AppData\Local\Temp\431.tmp"71⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\4BE.tmp"C:\Users\Admin\AppData\Local\Temp\4BE.tmp"72⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"73⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\5E7.tmp"C:\Users\Admin\AppData\Local\Temp\5E7.tmp"74⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"75⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"76⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\77D.tmp"C:\Users\Admin\AppData\Local\Temp\77D.tmp"77⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\7FA.tmp"C:\Users\Admin\AppData\Local\Temp\7FA.tmp"78⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\887.tmp"C:\Users\Admin\AppData\Local\Temp\887.tmp"79⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\913.tmp"C:\Users\Admin\AppData\Local\Temp\913.tmp"80⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"81⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"82⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"83⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"84⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"85⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\C5F.tmp"C:\Users\Admin\AppData\Local\Temp\C5F.tmp"86⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"87⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"88⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"89⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\E63.tmp"C:\Users\Admin\AppData\Local\Temp\E63.tmp"90⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"91⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"92⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\FE9.tmp"C:\Users\Admin\AppData\Local\Temp\FE9.tmp"93⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"94⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\1112.tmp"C:\Users\Admin\AppData\Local\Temp\1112.tmp"95⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"96⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\122B.tmp"C:\Users\Admin\AppData\Local\Temp\122B.tmp"97⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\12C8.tmp"C:\Users\Admin\AppData\Local\Temp\12C8.tmp"98⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"99⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"100⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"101⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\14EA.tmp"C:\Users\Admin\AppData\Local\Temp\14EA.tmp"102⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\1567.tmp"C:\Users\Admin\AppData\Local\Temp\1567.tmp"103⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"104⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"105⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"106⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"107⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\1817.tmp"C:\Users\Admin\AppData\Local\Temp\1817.tmp"108⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"109⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"110⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"111⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"112⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\1AA7.tmp"C:\Users\Admin\AppData\Local\Temp\1AA7.tmp"113⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\1B43.tmp"C:\Users\Admin\AppData\Local\Temp\1B43.tmp"114⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"115⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"116⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"117⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"118⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"119⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"120⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"121⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\2006.tmp"C:\Users\Admin\AppData\Local\Temp\2006.tmp"122⤵PID:1988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-