Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 15:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe
-
Size
488KB
-
MD5
acaaf05b8e9fd982e61b5ad6ed58eb32
-
SHA1
780ebec383089dd884e65f7cee9cf0691d543de4
-
SHA256
fc93ad95e8b8fe51e8eaa1e0b01eebd37c4bc624c44e7476f8c78d40ad608a83
-
SHA512
ade25cb435f6cbe6d2bba957a28411e3a2d28187a134ea0fd677c5dbcd6676dd0993f4d1936bc682d201bceb58a92cf3f7577641ecbb6ea547e8a5d1fddce4df
-
SSDEEP
12288:/U5rCOTeiDLrlRC1ty6iza48rJXnZzINZ:/UQOJDLZRC69zeJXSN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2332 EC92.tmp 3100 ED5D.tmp 416 EE19.tmp 4696 EED4.tmp 3600 EFBF.tmp 4460 F0B9.tmp 5020 F145.tmp 1868 F1F1.tmp 4428 F2AD.tmp 840 F339.tmp 2940 F3E5.tmp 1124 F491.tmp 1336 F54D.tmp 4836 F5E9.tmp 4304 F676.tmp 4268 F741.tmp 1076 F7ED.tmp 1628 F8D7.tmp 1508 F973.tmp 4500 F9F0.tmp 3508 FABB.tmp 2000 FBC5.tmp 4676 FC90.tmp 680 FD5B.tmp 468 FE17.tmp 3856 FF01.tmp 4052 FFAD.tmp 3796 59.tmp 2948 143.tmp 1320 1DF.tmp 1872 318.tmp 1992 412.tmp 4240 47F.tmp 4552 50C.tmp 1192 589.tmp 3604 606.tmp 4348 6A2.tmp 5096 75E.tmp 3976 7FA.tmp 2812 8D5.tmp 3028 990.tmp 4944 A7B.tmp 4680 B07.tmp 3556 BD2.tmp 4300 C8E.tmp 2884 D2A.tmp 312 DC6.tmp 3440 E91.tmp 708 F3D.tmp 2644 1008.tmp 4608 1095.tmp 440 1170.tmp 1480 122B.tmp 4556 12C8.tmp 3928 1335.tmp 4712 13C2.tmp 4320 145E.tmp 4564 14FA.tmp 2720 1596.tmp 1412 15F4.tmp 2776 16A0.tmp 1868 171D.tmp 2836 17AA.tmp 2988 1827.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 2332 752 acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe 82 PID 752 wrote to memory of 2332 752 acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe 82 PID 752 wrote to memory of 2332 752 acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe 82 PID 2332 wrote to memory of 3100 2332 EC92.tmp 83 PID 2332 wrote to memory of 3100 2332 EC92.tmp 83 PID 2332 wrote to memory of 3100 2332 EC92.tmp 83 PID 3100 wrote to memory of 416 3100 ED5D.tmp 84 PID 3100 wrote to memory of 416 3100 ED5D.tmp 84 PID 3100 wrote to memory of 416 3100 ED5D.tmp 84 PID 416 wrote to memory of 4696 416 EE19.tmp 85 PID 416 wrote to memory of 4696 416 EE19.tmp 85 PID 416 wrote to memory of 4696 416 EE19.tmp 85 PID 4696 wrote to memory of 3600 4696 EED4.tmp 86 PID 4696 wrote to memory of 3600 4696 EED4.tmp 86 PID 4696 wrote to memory of 3600 4696 EED4.tmp 86 PID 3600 wrote to memory of 4460 3600 EFBF.tmp 87 PID 3600 wrote to memory of 4460 3600 EFBF.tmp 87 PID 3600 wrote to memory of 4460 3600 EFBF.tmp 87 PID 4460 wrote to memory of 5020 4460 F0B9.tmp 88 PID 4460 wrote to memory of 5020 4460 F0B9.tmp 88 PID 4460 wrote to memory of 5020 4460 F0B9.tmp 88 PID 5020 wrote to memory of 1868 5020 F145.tmp 89 PID 5020 wrote to memory of 1868 5020 F145.tmp 89 PID 5020 wrote to memory of 1868 5020 F145.tmp 89 PID 1868 wrote to memory of 4428 1868 F1F1.tmp 90 PID 1868 wrote to memory of 4428 1868 F1F1.tmp 90 PID 1868 wrote to memory of 4428 1868 F1F1.tmp 90 PID 4428 wrote to memory of 840 4428 F2AD.tmp 92 PID 4428 wrote to memory of 840 4428 F2AD.tmp 92 PID 4428 wrote to memory of 840 4428 F2AD.tmp 92 PID 840 wrote to memory of 2940 840 F339.tmp 93 PID 840 wrote to memory of 2940 840 F339.tmp 93 PID 840 wrote to memory of 2940 840 F339.tmp 93 PID 2940 wrote to memory of 1124 2940 F3E5.tmp 94 PID 2940 wrote to memory of 1124 2940 F3E5.tmp 94 PID 2940 wrote to memory of 1124 2940 F3E5.tmp 94 PID 1124 wrote to memory of 1336 1124 F491.tmp 95 PID 1124 wrote to memory of 1336 1124 F491.tmp 95 PID 1124 wrote to memory of 1336 1124 F491.tmp 95 PID 1336 wrote to memory of 4836 1336 F54D.tmp 96 PID 1336 wrote to memory of 4836 1336 F54D.tmp 96 PID 1336 wrote to memory of 4836 1336 F54D.tmp 96 PID 4836 wrote to memory of 4304 4836 F5E9.tmp 97 PID 4836 wrote to memory of 4304 4836 F5E9.tmp 97 PID 4836 wrote to memory of 4304 4836 F5E9.tmp 97 PID 4304 wrote to memory of 4268 4304 F676.tmp 98 PID 4304 wrote to memory of 4268 4304 F676.tmp 98 PID 4304 wrote to memory of 4268 4304 F676.tmp 98 PID 4268 wrote to memory of 1076 4268 F741.tmp 99 PID 4268 wrote to memory of 1076 4268 F741.tmp 99 PID 4268 wrote to memory of 1076 4268 F741.tmp 99 PID 1076 wrote to memory of 1628 1076 F7ED.tmp 100 PID 1076 wrote to memory of 1628 1076 F7ED.tmp 100 PID 1076 wrote to memory of 1628 1076 F7ED.tmp 100 PID 1628 wrote to memory of 1508 1628 F8D7.tmp 103 PID 1628 wrote to memory of 1508 1628 F8D7.tmp 103 PID 1628 wrote to memory of 1508 1628 F8D7.tmp 103 PID 1508 wrote to memory of 4500 1508 F973.tmp 104 PID 1508 wrote to memory of 4500 1508 F973.tmp 104 PID 1508 wrote to memory of 4500 1508 F973.tmp 104 PID 4500 wrote to memory of 3508 4500 F9F0.tmp 105 PID 4500 wrote to memory of 3508 4500 F9F0.tmp 105 PID 4500 wrote to memory of 3508 4500 F9F0.tmp 105 PID 3508 wrote to memory of 2000 3508 FABB.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\acaaf05b8e9fd982e61b5ad6ed58eb32_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\EED4.tmp"C:\Users\Admin\AppData\Local\Temp\EED4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\F491.tmp"C:\Users\Admin\AppData\Local\Temp\F491.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\F741.tmp"C:\Users\Admin\AppData\Local\Temp\F741.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\F973.tmp"C:\Users\Admin\AppData\Local\Temp\F973.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"23⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\FC90.tmp"C:\Users\Admin\AppData\Local\Temp\FC90.tmp"24⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\FD5B.tmp"C:\Users\Admin\AppData\Local\Temp\FD5B.tmp"25⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\FE17.tmp"C:\Users\Admin\AppData\Local\Temp\FE17.tmp"26⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"27⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"28⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"29⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"30⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"31⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\318.tmp"C:\Users\Admin\AppData\Local\Temp\318.tmp"32⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"33⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"34⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\50C.tmp"C:\Users\Admin\AppData\Local\Temp\50C.tmp"35⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\589.tmp"C:\Users\Admin\AppData\Local\Temp\589.tmp"36⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"37⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\6A2.tmp"C:\Users\Admin\AppData\Local\Temp\6A2.tmp"38⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\75E.tmp"C:\Users\Admin\AppData\Local\Temp\75E.tmp"39⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\7FA.tmp"C:\Users\Admin\AppData\Local\Temp\7FA.tmp"40⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\8D5.tmp"C:\Users\Admin\AppData\Local\Temp\8D5.tmp"41⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"42⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"43⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\B07.tmp"C:\Users\Admin\AppData\Local\Temp\B07.tmp"44⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"45⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"46⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"47⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"48⤵
- Executes dropped EXE
PID:312 -
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"49⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"50⤵
- Executes dropped EXE
PID:708 -
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"51⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"52⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"53⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\122B.tmp"C:\Users\Admin\AppData\Local\Temp\122B.tmp"54⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\12C8.tmp"C:\Users\Admin\AppData\Local\Temp\12C8.tmp"55⤵
- Executes dropped EXE
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\1335.tmp"C:\Users\Admin\AppData\Local\Temp\1335.tmp"56⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"57⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\145E.tmp"C:\Users\Admin\AppData\Local\Temp\145E.tmp"58⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"59⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"60⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"61⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\16A0.tmp"C:\Users\Admin\AppData\Local\Temp\16A0.tmp"62⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"63⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\17AA.tmp"C:\Users\Admin\AppData\Local\Temp\17AA.tmp"64⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"65⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"66⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"67⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\19BD.tmp"C:\Users\Admin\AppData\Local\Temp\19BD.tmp"68⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\1A59.tmp"C:\Users\Admin\AppData\Local\Temp\1A59.tmp"69⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"70⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\1B63.tmp"C:\Users\Admin\AppData\Local\Temp\1B63.tmp"71⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"72⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"73⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"74⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"75⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"76⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"77⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\1F89.tmp"C:\Users\Admin\AppData\Local\Temp\1F89.tmp"78⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"79⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\2074.tmp"C:\Users\Admin\AppData\Local\Temp\2074.tmp"80⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"81⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"82⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\2219.tmp"C:\Users\Admin\AppData\Local\Temp\2219.tmp"83⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"84⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\2313.tmp"C:\Users\Admin\AppData\Local\Temp\2313.tmp"85⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"86⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"87⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\248A.tmp"C:\Users\Admin\AppData\Local\Temp\248A.tmp"88⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"89⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"90⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"91⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\26DC.tmp"C:\Users\Admin\AppData\Local\Temp\26DC.tmp"92⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"93⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2815.tmp"C:\Users\Admin\AppData\Local\Temp\2815.tmp"94⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"95⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"96⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"97⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"98⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"99⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"100⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"101⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"102⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\2D74.tmp"C:\Users\Admin\AppData\Local\Temp\2D74.tmp"103⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"104⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"105⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2F39.tmp"C:\Users\Admin\AppData\Local\Temp\2F39.tmp"106⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"107⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\3071.tmp"C:\Users\Admin\AppData\Local\Temp\3071.tmp"108⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"109⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\31D9.tmp"C:\Users\Admin\AppData\Local\Temp\31D9.tmp"110⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"111⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"112⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"113⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"114⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"115⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"116⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\360F.tmp"C:\Users\Admin\AppData\Local\Temp\360F.tmp"117⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\36CA.tmp"C:\Users\Admin\AppData\Local\Temp\36CA.tmp"118⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"119⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"120⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"121⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"122⤵PID:4876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-