Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 15:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe
Resource
win7-20230824-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe
-
Size
488KB
-
MD5
ad4c4c44a9b3610f9da038e722caac10
-
SHA1
652e07a92775534749b1700b775e86312febba16
-
SHA256
20e1f2c329a021ec04845993f1388e5fab9aed6f461d9d8a1696c62d0614ee36
-
SHA512
bb1b88463c1a0aaf88468d1ec1a56406bfad5e65b2db97e91d486f22f02fe5186ce2eb6ee2e35d24fd9e8ce2cd0cf7cdfa6891004b14230a009c7c613c046787
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7M5VdV+Y/JUaSBGGwW2PpkbR+7gBPdMsSVMG/:/U5rCOTeiDYdV+yJUaqhxcsBA3+qNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5020 A6CF.tmp 1072 A79A.tmp 2488 A836.tmp 3136 A911.tmp 1824 AA1B.tmp 4204 AB15.tmp 852 ABEF.tmp 4372 ACAB.tmp 5088 AD95.tmp 1588 AF1C.tmp 3896 AFC8.tmp 2968 B074.tmp 460 B13F.tmp 2368 B229.tmp 520 B314.tmp 524 B3CF.tmp 4744 B527.tmp 2020 B5F2.tmp 4056 B69E.tmp 4808 B72A.tmp 3800 B7D6.tmp 4928 B882.tmp 1460 B95D.tmp 3664 BA18.tmp 4352 BB03.tmp 4560 BB8F.tmp 1984 BC89.tmp 5108 BD45.tmp 1604 BE10.tmp 3016 BEDB.tmp 2160 BFD5.tmp 1172 C091.tmp 3296 C1D9.tmp 3368 C265.tmp 1680 C459.tmp 4784 C4D6.tmp 2504 C573.tmp 4696 C60F.tmp 324 C6CA.tmp 1736 C767.tmp 1760 C822.tmp 1200 C8FD.tmp 4720 C999.tmp 4376 CA64.tmp 4184 CAF1.tmp 1608 CB9D.tmp 1440 CC39.tmp 4428 CCD5.tmp 4680 CD81.tmp 3924 CDFE.tmp 4700 CE9A.tmp 4268 CF66.tmp 1412 D002.tmp 3708 D09E.tmp 2924 D15A.tmp 1376 D1F6.tmp 4424 D2D1.tmp 4396 D34E.tmp 4120 D3EA.tmp 3048 D496.tmp 852 D522.tmp 2348 D59F.tmp 4972 D62C.tmp 4088 D6B9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 5020 1376 ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe 82 PID 1376 wrote to memory of 5020 1376 ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe 82 PID 1376 wrote to memory of 5020 1376 ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe 82 PID 5020 wrote to memory of 1072 5020 A6CF.tmp 83 PID 5020 wrote to memory of 1072 5020 A6CF.tmp 83 PID 5020 wrote to memory of 1072 5020 A6CF.tmp 83 PID 1072 wrote to memory of 2488 1072 A79A.tmp 84 PID 1072 wrote to memory of 2488 1072 A79A.tmp 84 PID 1072 wrote to memory of 2488 1072 A79A.tmp 84 PID 2488 wrote to memory of 3136 2488 A836.tmp 85 PID 2488 wrote to memory of 3136 2488 A836.tmp 85 PID 2488 wrote to memory of 3136 2488 A836.tmp 85 PID 3136 wrote to memory of 1824 3136 A911.tmp 86 PID 3136 wrote to memory of 1824 3136 A911.tmp 86 PID 3136 wrote to memory of 1824 3136 A911.tmp 86 PID 1824 wrote to memory of 4204 1824 AA1B.tmp 87 PID 1824 wrote to memory of 4204 1824 AA1B.tmp 87 PID 1824 wrote to memory of 4204 1824 AA1B.tmp 87 PID 4204 wrote to memory of 852 4204 AB15.tmp 88 PID 4204 wrote to memory of 852 4204 AB15.tmp 88 PID 4204 wrote to memory of 852 4204 AB15.tmp 88 PID 852 wrote to memory of 4372 852 ABEF.tmp 89 PID 852 wrote to memory of 4372 852 ABEF.tmp 89 PID 852 wrote to memory of 4372 852 ABEF.tmp 89 PID 4372 wrote to memory of 5088 4372 ACAB.tmp 90 PID 4372 wrote to memory of 5088 4372 ACAB.tmp 90 PID 4372 wrote to memory of 5088 4372 ACAB.tmp 90 PID 5088 wrote to memory of 1588 5088 AD95.tmp 92 PID 5088 wrote to memory of 1588 5088 AD95.tmp 92 PID 5088 wrote to memory of 1588 5088 AD95.tmp 92 PID 1588 wrote to memory of 3896 1588 AF1C.tmp 93 PID 1588 wrote to memory of 3896 1588 AF1C.tmp 93 PID 1588 wrote to memory of 3896 1588 AF1C.tmp 93 PID 3896 wrote to memory of 2968 3896 AFC8.tmp 94 PID 3896 wrote to memory of 2968 3896 AFC8.tmp 94 PID 3896 wrote to memory of 2968 3896 AFC8.tmp 94 PID 2968 wrote to memory of 460 2968 B074.tmp 95 PID 2968 wrote to memory of 460 2968 B074.tmp 95 PID 2968 wrote to memory of 460 2968 B074.tmp 95 PID 460 wrote to memory of 2368 460 B13F.tmp 96 PID 460 wrote to memory of 2368 460 B13F.tmp 96 PID 460 wrote to memory of 2368 460 B13F.tmp 96 PID 2368 wrote to memory of 520 2368 B229.tmp 97 PID 2368 wrote to memory of 520 2368 B229.tmp 97 PID 2368 wrote to memory of 520 2368 B229.tmp 97 PID 520 wrote to memory of 524 520 B314.tmp 98 PID 520 wrote to memory of 524 520 B314.tmp 98 PID 520 wrote to memory of 524 520 B314.tmp 98 PID 524 wrote to memory of 4744 524 B3CF.tmp 99 PID 524 wrote to memory of 4744 524 B3CF.tmp 99 PID 524 wrote to memory of 4744 524 B3CF.tmp 99 PID 4744 wrote to memory of 2020 4744 B527.tmp 102 PID 4744 wrote to memory of 2020 4744 B527.tmp 102 PID 4744 wrote to memory of 2020 4744 B527.tmp 102 PID 2020 wrote to memory of 4056 2020 B5F2.tmp 103 PID 2020 wrote to memory of 4056 2020 B5F2.tmp 103 PID 2020 wrote to memory of 4056 2020 B5F2.tmp 103 PID 4056 wrote to memory of 4808 4056 B69E.tmp 104 PID 4056 wrote to memory of 4808 4056 B69E.tmp 104 PID 4056 wrote to memory of 4808 4056 B69E.tmp 104 PID 4808 wrote to memory of 3800 4808 B72A.tmp 105 PID 4808 wrote to memory of 3800 4808 B72A.tmp 105 PID 4808 wrote to memory of 3800 4808 B72A.tmp 105 PID 3800 wrote to memory of 4928 3800 B7D6.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\ad4c4c44a9b3610f9da038e722caac10_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\A911.tmp"C:\Users\Admin\AppData\Local\Temp\A911.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\AB15.tmp"C:\Users\Admin\AppData\Local\Temp\AB15.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\AD95.tmp"C:\Users\Admin\AppData\Local\Temp\AD95.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\B074.tmp"C:\Users\Admin\AppData\Local\Temp\B074.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\B229.tmp"C:\Users\Admin\AppData\Local\Temp\B229.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\B527.tmp"C:\Users\Admin\AppData\Local\Temp\B527.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\B69E.tmp"C:\Users\Admin\AppData\Local\Temp\B69E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\B72A.tmp"C:\Users\Admin\AppData\Local\Temp\B72A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\B882.tmp"C:\Users\Admin\AppData\Local\Temp\B882.tmp"23⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\B95D.tmp"C:\Users\Admin\AppData\Local\Temp\B95D.tmp"24⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"25⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"26⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"27⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\BC89.tmp"C:\Users\Admin\AppData\Local\Temp\BC89.tmp"28⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\BD45.tmp"C:\Users\Admin\AppData\Local\Temp\BD45.tmp"29⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\BE10.tmp"C:\Users\Admin\AppData\Local\Temp\BE10.tmp"30⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"31⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"32⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\C091.tmp"C:\Users\Admin\AppData\Local\Temp\C091.tmp"33⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"34⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"35⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\C459.tmp"C:\Users\Admin\AppData\Local\Temp\C459.tmp"36⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"37⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\C573.tmp"C:\Users\Admin\AppData\Local\Temp\C573.tmp"38⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"39⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"40⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\C767.tmp"C:\Users\Admin\AppData\Local\Temp\C767.tmp"41⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\C822.tmp"C:\Users\Admin\AppData\Local\Temp\C822.tmp"42⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"C:\Users\Admin\AppData\Local\Temp\C8FD.tmp"43⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"44⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\CA64.tmp"C:\Users\Admin\AppData\Local\Temp\CA64.tmp"45⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\CAF1.tmp"C:\Users\Admin\AppData\Local\Temp\CAF1.tmp"46⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"47⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\CC39.tmp"C:\Users\Admin\AppData\Local\Temp\CC39.tmp"48⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"49⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\CD81.tmp"C:\Users\Admin\AppData\Local\Temp\CD81.tmp"50⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"51⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"52⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"53⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\D002.tmp"C:\Users\Admin\AppData\Local\Temp\D002.tmp"54⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\D09E.tmp"C:\Users\Admin\AppData\Local\Temp\D09E.tmp"55⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\D15A.tmp"C:\Users\Admin\AppData\Local\Temp\D15A.tmp"56⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"57⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"58⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"59⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\D3EA.tmp"C:\Users\Admin\AppData\Local\Temp\D3EA.tmp"60⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"61⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"62⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\D59F.tmp"C:\Users\Admin\AppData\Local\Temp\D59F.tmp"63⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"64⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"65⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\D745.tmp"C:\Users\Admin\AppData\Local\Temp\D745.tmp"66⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"67⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"68⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\D92A.tmp"C:\Users\Admin\AppData\Local\Temp\D92A.tmp"69⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\D997.tmp"C:\Users\Admin\AppData\Local\Temp\D997.tmp"70⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\DA24.tmp"C:\Users\Admin\AppData\Local\Temp\DA24.tmp"71⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"72⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\DB1E.tmp"C:\Users\Admin\AppData\Local\Temp\DB1E.tmp"73⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"74⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\DC75.tmp"C:\Users\Admin\AppData\Local\Temp\DC75.tmp"75⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"76⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\DD60.tmp"C:\Users\Admin\AppData\Local\Temp\DD60.tmp"77⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"C:\Users\Admin\AppData\Local\Temp\DE0C.tmp"78⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"79⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\DF15.tmp"C:\Users\Admin\AppData\Local\Temp\DF15.tmp"80⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"81⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\E07D.tmp"C:\Users\Admin\AppData\Local\Temp\E07D.tmp"82⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"83⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"84⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\E271.tmp"C:\Users\Admin\AppData\Local\Temp\E271.tmp"85⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"86⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"87⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"88⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"89⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"90⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\E659.tmp"C:\Users\Admin\AppData\Local\Temp\E659.tmp"91⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"92⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"93⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\E84D.tmp"C:\Users\Admin\AppData\Local\Temp\E84D.tmp"94⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"95⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"96⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"97⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"98⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"99⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"100⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\ED0F.tmp"C:\Users\Admin\AppData\Local\Temp\ED0F.tmp"101⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"102⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\EE77.tmp"C:\Users\Admin\AppData\Local\Temp\EE77.tmp"103⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"104⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\EF80.tmp"C:\Users\Admin\AppData\Local\Temp\EF80.tmp"105⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\F00D.tmp"C:\Users\Admin\AppData\Local\Temp\F00D.tmp"106⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"107⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"108⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"109⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"110⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"111⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"112⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\F462.tmp"C:\Users\Admin\AppData\Local\Temp\F462.tmp"113⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"114⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"115⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\F627.tmp"C:\Users\Admin\AppData\Local\Temp\F627.tmp"116⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\F6D3.tmp"C:\Users\Admin\AppData\Local\Temp\F6D3.tmp"117⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\F770.tmp"C:\Users\Admin\AppData\Local\Temp\F770.tmp"118⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"119⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\F898.tmp"C:\Users\Admin\AppData\Local\Temp\F898.tmp"120⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\F925.tmp"C:\Users\Admin\AppData\Local\Temp\F925.tmp"121⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"122⤵PID:4120
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-