Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 19:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe
Resource
win7-20230824-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe
-
Size
488KB
-
MD5
a52e622bfcc8b06d705f9b70ec52ea86
-
SHA1
f2ea13bd27f2037235dc23b85304ead325b8173e
-
SHA256
41e1c8760c34f3dd5e7ace36c6a331704d48d4e036ec98084a46ffd55871b10d
-
SHA512
cb5e36eab6c568635a7baefd746b688028bd89c0fc13d14af1776e8b74d753b2dc8a8223812dd8d6cbc947098e1dcc27fd5dc91036eabaf0602b170852b497b2
-
SSDEEP
12288:/U5rCOTeiDs3xB7WrHVdb8k0WeNi7RNZ:/UQOJDs3xBmHok0F+RN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5064 CB9D.tmp 4520 CC49.tmp 408 CD14.tmp 4324 CDDF.tmp 1220 CEAA.tmp 2160 CF46.tmp 4628 D031.tmp 4420 D0FC.tmp 436 D1C7.tmp 1040 D292.tmp 1388 D31F.tmp 4368 D3DA.tmp 1772 D486.tmp 4876 D532.tmp 1008 D5BF.tmp 3008 D6B9.tmp 4396 D764.tmp 3612 D810.tmp 8 D8BC.tmp 456 DEA8.tmp 3424 DF25.tmp 4996 DFE0.tmp 1384 E0AB.tmp 3120 E177.tmp 1352 E222.tmp 768 E2DE.tmp 1324 E3D8.tmp 4232 E4B3.tmp 3088 E5AD.tmp 4840 E678.tmp 4960 E772.tmp 3580 E87B.tmp 552 E927.tmp 2332 E9E3.tmp 2364 EA8F.tmp 1840 EB5A.tmp 2992 EBD7.tmp 648 EC92.tmp 3208 ED1F.tmp 1396 EDCB.tmp 4272 EE96.tmp 4360 EF42.tmp 4820 EFFD.tmp 3956 F0B9.tmp 2820 F165.tmp 4196 F211.tmp 1972 F3F5.tmp 716 F4A1.tmp 4372 F57C.tmp 3896 F627.tmp 4848 F6E3.tmp 4560 F77F.tmp 1332 F80C.tmp 1220 F898.tmp 3040 F915.tmp 5088 F9A2.tmp 336 FA3E.tmp 1648 FABB.tmp 4432 FB58.tmp 2512 FBE4.tmp 3308 FC71.tmp 4832 FCEE.tmp 4368 FD6B.tmp 1772 FDE8.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 5064 4264 a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe 81 PID 4264 wrote to memory of 5064 4264 a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe 81 PID 4264 wrote to memory of 5064 4264 a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe 81 PID 5064 wrote to memory of 4520 5064 CB9D.tmp 82 PID 5064 wrote to memory of 4520 5064 CB9D.tmp 82 PID 5064 wrote to memory of 4520 5064 CB9D.tmp 82 PID 4520 wrote to memory of 408 4520 CC49.tmp 83 PID 4520 wrote to memory of 408 4520 CC49.tmp 83 PID 4520 wrote to memory of 408 4520 CC49.tmp 83 PID 408 wrote to memory of 4324 408 CD14.tmp 84 PID 408 wrote to memory of 4324 408 CD14.tmp 84 PID 408 wrote to memory of 4324 408 CD14.tmp 84 PID 4324 wrote to memory of 1220 4324 CDDF.tmp 85 PID 4324 wrote to memory of 1220 4324 CDDF.tmp 85 PID 4324 wrote to memory of 1220 4324 CDDF.tmp 85 PID 1220 wrote to memory of 2160 1220 CEAA.tmp 86 PID 1220 wrote to memory of 2160 1220 CEAA.tmp 86 PID 1220 wrote to memory of 2160 1220 CEAA.tmp 86 PID 2160 wrote to memory of 4628 2160 CF46.tmp 87 PID 2160 wrote to memory of 4628 2160 CF46.tmp 87 PID 2160 wrote to memory of 4628 2160 CF46.tmp 87 PID 4628 wrote to memory of 4420 4628 D031.tmp 88 PID 4628 wrote to memory of 4420 4628 D031.tmp 88 PID 4628 wrote to memory of 4420 4628 D031.tmp 88 PID 4420 wrote to memory of 436 4420 D0FC.tmp 89 PID 4420 wrote to memory of 436 4420 D0FC.tmp 89 PID 4420 wrote to memory of 436 4420 D0FC.tmp 89 PID 436 wrote to memory of 1040 436 D1C7.tmp 90 PID 436 wrote to memory of 1040 436 D1C7.tmp 90 PID 436 wrote to memory of 1040 436 D1C7.tmp 90 PID 1040 wrote to memory of 1388 1040 D292.tmp 92 PID 1040 wrote to memory of 1388 1040 D292.tmp 92 PID 1040 wrote to memory of 1388 1040 D292.tmp 92 PID 1388 wrote to memory of 4368 1388 D31F.tmp 93 PID 1388 wrote to memory of 4368 1388 D31F.tmp 93 PID 1388 wrote to memory of 4368 1388 D31F.tmp 93 PID 4368 wrote to memory of 1772 4368 D3DA.tmp 94 PID 4368 wrote to memory of 1772 4368 D3DA.tmp 94 PID 4368 wrote to memory of 1772 4368 D3DA.tmp 94 PID 1772 wrote to memory of 4876 1772 D486.tmp 95 PID 1772 wrote to memory of 4876 1772 D486.tmp 95 PID 1772 wrote to memory of 4876 1772 D486.tmp 95 PID 4876 wrote to memory of 1008 4876 D532.tmp 96 PID 4876 wrote to memory of 1008 4876 D532.tmp 96 PID 4876 wrote to memory of 1008 4876 D532.tmp 96 PID 1008 wrote to memory of 3008 1008 D5BF.tmp 97 PID 1008 wrote to memory of 3008 1008 D5BF.tmp 97 PID 1008 wrote to memory of 3008 1008 D5BF.tmp 97 PID 3008 wrote to memory of 4396 3008 D6B9.tmp 98 PID 3008 wrote to memory of 4396 3008 D6B9.tmp 98 PID 3008 wrote to memory of 4396 3008 D6B9.tmp 98 PID 4396 wrote to memory of 3612 4396 D764.tmp 99 PID 4396 wrote to memory of 3612 4396 D764.tmp 99 PID 4396 wrote to memory of 3612 4396 D764.tmp 99 PID 3612 wrote to memory of 8 3612 D810.tmp 100 PID 3612 wrote to memory of 8 3612 D810.tmp 100 PID 3612 wrote to memory of 8 3612 D810.tmp 100 PID 8 wrote to memory of 456 8 D8BC.tmp 103 PID 8 wrote to memory of 456 8 D8BC.tmp 103 PID 8 wrote to memory of 456 8 D8BC.tmp 103 PID 456 wrote to memory of 3424 456 DEA8.tmp 105 PID 456 wrote to memory of 3424 456 DEA8.tmp 105 PID 456 wrote to memory of 3424 456 DEA8.tmp 105 PID 3424 wrote to memory of 4996 3424 DF25.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\a52e622bfcc8b06d705f9b70ec52ea86_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\CC49.tmp"C:\Users\Admin\AppData\Local\Temp\CC49.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\CD14.tmp"C:\Users\Admin\AppData\Local\Temp\CD14.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\CEAA.tmp"C:\Users\Admin\AppData\Local\Temp\CEAA.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\D486.tmp"C:\Users\Admin\AppData\Local\Temp\D486.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\D532.tmp"C:\Users\Admin\AppData\Local\Temp\D532.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"23⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"24⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"25⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\E222.tmp"C:\Users\Admin\AppData\Local\Temp\E222.tmp"26⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"27⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"28⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"29⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"30⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\E678.tmp"C:\Users\Admin\AppData\Local\Temp\E678.tmp"31⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\E772.tmp"C:\Users\Admin\AppData\Local\Temp\E772.tmp"32⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"33⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\E927.tmp"C:\Users\Admin\AppData\Local\Temp\E927.tmp"34⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"35⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"36⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"37⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"38⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"39⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"40⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"41⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"42⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\EF42.tmp"C:\Users\Admin\AppData\Local\Temp\EF42.tmp"43⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"44⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"45⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\F165.tmp"C:\Users\Admin\AppData\Local\Temp\F165.tmp"46⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"47⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"48⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"49⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\F57C.tmp"C:\Users\Admin\AppData\Local\Temp\F57C.tmp"50⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\F627.tmp"C:\Users\Admin\AppData\Local\Temp\F627.tmp"51⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"52⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"53⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"54⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\F898.tmp"C:\Users\Admin\AppData\Local\Temp\F898.tmp"55⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\F915.tmp"C:\Users\Admin\AppData\Local\Temp\F915.tmp"56⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"57⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"58⤵
- Executes dropped EXE
PID:336 -
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"59⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\FB58.tmp"C:\Users\Admin\AppData\Local\Temp\FB58.tmp"60⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\FBE4.tmp"C:\Users\Admin\AppData\Local\Temp\FBE4.tmp"61⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\FC71.tmp"C:\Users\Admin\AppData\Local\Temp\FC71.tmp"62⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"63⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"64⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"65⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"66⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"67⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"68⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"69⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\D6.tmp"C:\Users\Admin\AppData\Local\Temp\D6.tmp"70⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"71⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"72⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"73⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\2CA.tmp"C:\Users\Admin\AppData\Local\Temp\2CA.tmp"74⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"75⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3E3.tmp"C:\Users\Admin\AppData\Local\Temp\3E3.tmp"76⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\460.tmp"C:\Users\Admin\AppData\Local\Temp\460.tmp"77⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"78⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\53B.tmp"C:\Users\Admin\AppData\Local\Temp\53B.tmp"79⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\5C7.tmp"C:\Users\Admin\AppData\Local\Temp\5C7.tmp"80⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"81⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"82⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\78D.tmp"C:\Users\Admin\AppData\Local\Temp\78D.tmp"83⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"84⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"85⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\971.tmp"C:\Users\Admin\AppData\Local\Temp\971.tmp"86⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"87⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"88⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\B46.tmp"C:\Users\Admin\AppData\Local\Temp\B46.tmp"89⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\BF2.tmp"C:\Users\Admin\AppData\Local\Temp\BF2.tmp"90⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"91⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"92⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\E43.tmp"C:\Users\Admin\AppData\Local\Temp\E43.tmp"93⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\EFF.tmp"C:\Users\Admin\AppData\Local\Temp\EFF.tmp"94⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"95⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"96⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"97⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"98⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\11FC.tmp"C:\Users\Admin\AppData\Local\Temp\11FC.tmp"99⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\12B8.tmp"C:\Users\Admin\AppData\Local\Temp\12B8.tmp"100⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"101⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"102⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\14BC.tmp"C:\Users\Admin\AppData\Local\Temp\14BC.tmp"103⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"104⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"105⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\16A0.tmp"C:\Users\Admin\AppData\Local\Temp\16A0.tmp"106⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\174C.tmp"C:\Users\Admin\AppData\Local\Temp\174C.tmp"107⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"108⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\1855.tmp"C:\Users\Admin\AppData\Local\Temp\1855.tmp"109⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\18C3.tmp"C:\Users\Admin\AppData\Local\Temp\18C3.tmp"110⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\198E.tmp"C:\Users\Admin\AppData\Local\Temp\198E.tmp"111⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"112⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"113⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\1B63.tmp"C:\Users\Admin\AppData\Local\Temp\1B63.tmp"114⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"115⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"116⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\1D18.tmp"C:\Users\Admin\AppData\Local\Temp\1D18.tmp"117⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\1D95.tmp"C:\Users\Admin\AppData\Local\Temp\1D95.tmp"118⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"119⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\1EED.tmp"C:\Users\Admin\AppData\Local\Temp\1EED.tmp"120⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"121⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"122⤵PID:2888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-