Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 19:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe
-
Size
488KB
-
MD5
a54ca634e0723cb8e4942b2fd839e904
-
SHA1
137b49048d37a63d5d20342dc320a351dfb10dfc
-
SHA256
36263aba83a3866f941c7752a33660a6940e4be2f55dc702c4efcdbb50b02958
-
SHA512
94efefcb481932638b55f232db5ed935181e37765a15f25dd1545da6f5111565eb33ab55334520545eb56e5610becdddc4a9a6ecdfb4c618e52406d63774293d
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7Sgv0WV7fg/zy4mYDUqICed3wg6VAbht0w4fl:/U5rCOTeiDd0WVM6YDUqh4As70ZhHNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3592 A77B.tmp 2652 A856.tmp 4936 A96F.tmp 5040 AA69.tmp 3316 AB24.tmp 3172 B1DB.tmp 2168 B277.tmp 3048 B333.tmp 2968 B40E.tmp 1524 B4E8.tmp 4260 B5D3.tmp 3712 B6FC.tmp 3236 B7C7.tmp 4148 B853.tmp 1152 B91E.tmp 2536 BA18.tmp 2120 BB12.tmp 3724 BC1C.tmp 1396 BCC8.tmp 1836 BD64.tmp 4220 BE4F.tmp 1136 BF39.tmp 568 C004.tmp 2268 C10E.tmp 2896 C285.tmp 3296 C331.tmp 4736 C3DC.tmp 4628 C498.tmp 2400 C5A2.tmp 408 C6EA.tmp 1816 C7C4.tmp 3664 C8DE.tmp 4620 C9B8.tmp 1964 CA64.tmp 3852 CB10.tmp 4764 CBCC.tmp 4088 CC87.tmp 4728 CD23.tmp 4676 CDC0.tmp 2440 CE8B.tmp 2716 CF27.tmp 2924 CFB4.tmp 2828 D06F.tmp 4908 D11B.tmp 1068 D1B7.tmp 4876 D234.tmp 3848 D2D1.tmp 4436 D39C.tmp 3148 D476.tmp 3928 D503.tmp 2920 D5AF.tmp 892 D65B.tmp 4228 D745.tmp 2508 D7D2.tmp 2272 D87E.tmp 4068 D90A.tmp 1228 D997.tmp 4708 DA24.tmp 4092 DAB0.tmp 3108 DB5C.tmp 2412 DBD9.tmp 2392 DC85.tmp 4588 DD21.tmp 2968 DDAE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3592 1008 a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe 81 PID 1008 wrote to memory of 3592 1008 a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe 81 PID 1008 wrote to memory of 3592 1008 a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe 81 PID 3592 wrote to memory of 2652 3592 A77B.tmp 82 PID 3592 wrote to memory of 2652 3592 A77B.tmp 82 PID 3592 wrote to memory of 2652 3592 A77B.tmp 82 PID 2652 wrote to memory of 4936 2652 A856.tmp 83 PID 2652 wrote to memory of 4936 2652 A856.tmp 83 PID 2652 wrote to memory of 4936 2652 A856.tmp 83 PID 4936 wrote to memory of 5040 4936 A96F.tmp 84 PID 4936 wrote to memory of 5040 4936 A96F.tmp 84 PID 4936 wrote to memory of 5040 4936 A96F.tmp 84 PID 5040 wrote to memory of 3316 5040 AA69.tmp 85 PID 5040 wrote to memory of 3316 5040 AA69.tmp 85 PID 5040 wrote to memory of 3316 5040 AA69.tmp 85 PID 3316 wrote to memory of 3172 3316 AB24.tmp 86 PID 3316 wrote to memory of 3172 3316 AB24.tmp 86 PID 3316 wrote to memory of 3172 3316 AB24.tmp 86 PID 3172 wrote to memory of 2168 3172 B1DB.tmp 87 PID 3172 wrote to memory of 2168 3172 B1DB.tmp 87 PID 3172 wrote to memory of 2168 3172 B1DB.tmp 87 PID 2168 wrote to memory of 3048 2168 B277.tmp 89 PID 2168 wrote to memory of 3048 2168 B277.tmp 89 PID 2168 wrote to memory of 3048 2168 B277.tmp 89 PID 3048 wrote to memory of 2968 3048 B333.tmp 90 PID 3048 wrote to memory of 2968 3048 B333.tmp 90 PID 3048 wrote to memory of 2968 3048 B333.tmp 90 PID 2968 wrote to memory of 1524 2968 B40E.tmp 91 PID 2968 wrote to memory of 1524 2968 B40E.tmp 91 PID 2968 wrote to memory of 1524 2968 B40E.tmp 91 PID 1524 wrote to memory of 4260 1524 B4E8.tmp 92 PID 1524 wrote to memory of 4260 1524 B4E8.tmp 92 PID 1524 wrote to memory of 4260 1524 B4E8.tmp 92 PID 4260 wrote to memory of 3712 4260 B5D3.tmp 93 PID 4260 wrote to memory of 3712 4260 B5D3.tmp 93 PID 4260 wrote to memory of 3712 4260 B5D3.tmp 93 PID 3712 wrote to memory of 3236 3712 B6FC.tmp 94 PID 3712 wrote to memory of 3236 3712 B6FC.tmp 94 PID 3712 wrote to memory of 3236 3712 B6FC.tmp 94 PID 3236 wrote to memory of 4148 3236 B7C7.tmp 95 PID 3236 wrote to memory of 4148 3236 B7C7.tmp 95 PID 3236 wrote to memory of 4148 3236 B7C7.tmp 95 PID 4148 wrote to memory of 1152 4148 B853.tmp 96 PID 4148 wrote to memory of 1152 4148 B853.tmp 96 PID 4148 wrote to memory of 1152 4148 B853.tmp 96 PID 1152 wrote to memory of 2536 1152 B91E.tmp 97 PID 1152 wrote to memory of 2536 1152 B91E.tmp 97 PID 1152 wrote to memory of 2536 1152 B91E.tmp 97 PID 2536 wrote to memory of 2120 2536 BA18.tmp 100 PID 2536 wrote to memory of 2120 2536 BA18.tmp 100 PID 2536 wrote to memory of 2120 2536 BA18.tmp 100 PID 2120 wrote to memory of 3724 2120 BB12.tmp 101 PID 2120 wrote to memory of 3724 2120 BB12.tmp 101 PID 2120 wrote to memory of 3724 2120 BB12.tmp 101 PID 3724 wrote to memory of 1396 3724 BC1C.tmp 102 PID 3724 wrote to memory of 1396 3724 BC1C.tmp 102 PID 3724 wrote to memory of 1396 3724 BC1C.tmp 102 PID 1396 wrote to memory of 1836 1396 BCC8.tmp 103 PID 1396 wrote to memory of 1836 1396 BCC8.tmp 103 PID 1396 wrote to memory of 1836 1396 BCC8.tmp 103 PID 1836 wrote to memory of 4220 1836 BD64.tmp 104 PID 1836 wrote to memory of 4220 1836 BD64.tmp 104 PID 1836 wrote to memory of 4220 1836 BD64.tmp 104 PID 4220 wrote to memory of 1136 4220 BE4F.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\a54ca634e0723cb8e4942b2fd839e904_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\A77B.tmp"C:\Users\Admin\AppData\Local\Temp\A77B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\A856.tmp"C:\Users\Admin\AppData\Local\Temp\A856.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\AA69.tmp"C:\Users\Admin\AppData\Local\Temp\AA69.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\B277.tmp"C:\Users\Admin\AppData\Local\Temp\B277.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\B40E.tmp"C:\Users\Admin\AppData\Local\Temp\B40E.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\BB12.tmp"C:\Users\Admin\AppData\Local\Temp\BB12.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\BC1C.tmp"C:\Users\Admin\AppData\Local\Temp\BC1C.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"C:\Users\Admin\AppData\Local\Temp\BCC8.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"23⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\C004.tmp"C:\Users\Admin\AppData\Local\Temp\C004.tmp"24⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"25⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"26⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"27⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"28⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\C498.tmp"C:\Users\Admin\AppData\Local\Temp\C498.tmp"29⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"30⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"31⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"32⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\C8DE.tmp"C:\Users\Admin\AppData\Local\Temp\C8DE.tmp"33⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"34⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\CA64.tmp"C:\Users\Admin\AppData\Local\Temp\CA64.tmp"35⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"36⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"37⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\CC87.tmp"C:\Users\Admin\AppData\Local\Temp\CC87.tmp"38⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\CD23.tmp"C:\Users\Admin\AppData\Local\Temp\CD23.tmp"39⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"40⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"41⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"42⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"43⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"44⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"45⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"46⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"47⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"48⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"49⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"50⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"51⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"52⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"53⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\D745.tmp"C:\Users\Admin\AppData\Local\Temp\D745.tmp"54⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"55⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"56⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"57⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\D997.tmp"C:\Users\Admin\AppData\Local\Temp\D997.tmp"58⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\DA24.tmp"C:\Users\Admin\AppData\Local\Temp\DA24.tmp"59⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"60⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"61⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\DBD9.tmp"C:\Users\Admin\AppData\Local\Temp\DBD9.tmp"62⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"63⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"64⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"65⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"66⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"67⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"68⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"69⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"70⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"71⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\E196.tmp"C:\Users\Admin\AppData\Local\Temp\E196.tmp"72⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"73⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\E29F.tmp"C:\Users\Admin\AppData\Local\Temp\E29F.tmp"74⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\E34B.tmp"C:\Users\Admin\AppData\Local\Temp\E34B.tmp"75⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"76⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"77⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\E520.tmp"C:\Users\Admin\AppData\Local\Temp\E520.tmp"78⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"79⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\E639.tmp"C:\Users\Admin\AppData\Local\Temp\E639.tmp"80⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"81⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"82⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"83⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"84⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\E937.tmp"C:\Users\Admin\AppData\Local\Temp\E937.tmp"85⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"86⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\EA60.tmp"C:\Users\Admin\AppData\Local\Temp\EA60.tmp"87⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"88⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"89⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"90⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"91⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\ED4E.tmp"C:\Users\Admin\AppData\Local\Temp\ED4E.tmp"92⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"93⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\EEB5.tmp"C:\Users\Admin\AppData\Local\Temp\EEB5.tmp"94⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\EF80.tmp"C:\Users\Admin\AppData\Local\Temp\EF80.tmp"95⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"96⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"97⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"98⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"99⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"100⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\F31A.tmp"C:\Users\Admin\AppData\Local\Temp\F31A.tmp"101⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"102⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\F443.tmp"C:\Users\Admin\AppData\Local\Temp\F443.tmp"103⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"104⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\F59B.tmp"C:\Users\Admin\AppData\Local\Temp\F59B.tmp"105⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"106⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"107⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\F79E.tmp"C:\Users\Admin\AppData\Local\Temp\F79E.tmp"108⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"109⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"110⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\F964.tmp"C:\Users\Admin\AppData\Local\Temp\F964.tmp"111⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"112⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"113⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"114⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"115⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"116⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"117⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\FE17.tmp"C:\Users\Admin\AppData\Local\Temp\FE17.tmp"118⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"119⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\FF20.tmp"C:\Users\Admin\AppData\Local\Temp\FF20.tmp"120⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"121⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"122⤵PID:4920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-