Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe
-
Size
520KB
-
MD5
d93d848d88ab8280a4bdb321f4db39e9
-
SHA1
e07c1d3a9a84e7224d4931f6bd16e2b61403c32a
-
SHA256
75049bb6e6848f4decdb87b260d3ff1a658ec035b303764318d08cb54d2f4e7e
-
SHA512
24b3f895555fdf7dfb1343e7f4e45c75e26a031d9778dd644a831f725dccca5d23bca06b800ec9bde619d5bd728eeff67aed0d9c5f5c5ba4b1d71de01d535023
-
SSDEEP
12288:roRXOQjmOywABfpF05MWQOMs29N/i1XNZ:rogQ9ywABfpFjvn5PKhN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3684 BF0A.tmp 1136 BFD5.tmp 3476 C0DF.tmp 2108 C1D9.tmp 4820 C2A4.tmp 2384 C37F.tmp 2972 C43A.tmp 1760 C4F6.tmp 1164 C5B1.tmp 4212 C64D.tmp 1244 C738.tmp 2656 C7A5.tmp 3452 C870.tmp 3616 C92C.tmp 4664 C9F7.tmp 3256 CBEB.tmp 2936 CCB6.tmp 1016 CD81.tmp 4124 CE5C.tmp 1268 CEC9.tmp 4672 CFA4.tmp 4156 D031.tmp 3044 D11B.tmp 4536 D1F6.tmp 1184 D2B1.tmp 3108 D34E.tmp 1120 D419.tmp 4004 D4A5.tmp 4032 D561.tmp 3756 D60D.tmp 4140 D6E7.tmp 4928 D7D2.tmp 944 D87E.tmp 556 D91A.tmp 5084 DA24.tmp 4632 DACF.tmp 2240 DB8B.tmp 4408 DC37.tmp 2200 DCB4.tmp 4960 DD50.tmp 4308 DDDD.tmp 1600 DE89.tmp 2864 DF25.tmp 2868 DFC1.tmp 4688 E05D.tmp 5096 E109.tmp 3900 E1C5.tmp 2212 E242.tmp 2160 E2CE.tmp 2856 E35B.tmp 3300 E3E8.tmp 3472 E493.tmp 4296 E53F.tmp 3236 E5EB.tmp 4160 E6A7.tmp 4380 E733.tmp 4364 E7B0.tmp 1604 E84D.tmp 1140 E8D9.tmp 3684 E985.tmp 4436 EA41.tmp 960 EACD.tmp 1552 EB89.tmp 396 EC15.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3684 2704 d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe 80 PID 2704 wrote to memory of 3684 2704 d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe 80 PID 2704 wrote to memory of 3684 2704 d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe 80 PID 3684 wrote to memory of 1136 3684 BF0A.tmp 81 PID 3684 wrote to memory of 1136 3684 BF0A.tmp 81 PID 3684 wrote to memory of 1136 3684 BF0A.tmp 81 PID 1136 wrote to memory of 3476 1136 BFD5.tmp 82 PID 1136 wrote to memory of 3476 1136 BFD5.tmp 82 PID 1136 wrote to memory of 3476 1136 BFD5.tmp 82 PID 3476 wrote to memory of 2108 3476 C0DF.tmp 83 PID 3476 wrote to memory of 2108 3476 C0DF.tmp 83 PID 3476 wrote to memory of 2108 3476 C0DF.tmp 83 PID 2108 wrote to memory of 4820 2108 C1D9.tmp 84 PID 2108 wrote to memory of 4820 2108 C1D9.tmp 84 PID 2108 wrote to memory of 4820 2108 C1D9.tmp 84 PID 4820 wrote to memory of 2384 4820 C2A4.tmp 85 PID 4820 wrote to memory of 2384 4820 C2A4.tmp 85 PID 4820 wrote to memory of 2384 4820 C2A4.tmp 85 PID 2384 wrote to memory of 2972 2384 C37F.tmp 86 PID 2384 wrote to memory of 2972 2384 C37F.tmp 86 PID 2384 wrote to memory of 2972 2384 C37F.tmp 86 PID 2972 wrote to memory of 1760 2972 C43A.tmp 87 PID 2972 wrote to memory of 1760 2972 C43A.tmp 87 PID 2972 wrote to memory of 1760 2972 C43A.tmp 87 PID 1760 wrote to memory of 1164 1760 C4F6.tmp 88 PID 1760 wrote to memory of 1164 1760 C4F6.tmp 88 PID 1760 wrote to memory of 1164 1760 C4F6.tmp 88 PID 1164 wrote to memory of 4212 1164 C5B1.tmp 89 PID 1164 wrote to memory of 4212 1164 C5B1.tmp 89 PID 1164 wrote to memory of 4212 1164 C5B1.tmp 89 PID 4212 wrote to memory of 1244 4212 C64D.tmp 91 PID 4212 wrote to memory of 1244 4212 C64D.tmp 91 PID 4212 wrote to memory of 1244 4212 C64D.tmp 91 PID 1244 wrote to memory of 2656 1244 C738.tmp 92 PID 1244 wrote to memory of 2656 1244 C738.tmp 92 PID 1244 wrote to memory of 2656 1244 C738.tmp 92 PID 2656 wrote to memory of 3452 2656 C7A5.tmp 93 PID 2656 wrote to memory of 3452 2656 C7A5.tmp 93 PID 2656 wrote to memory of 3452 2656 C7A5.tmp 93 PID 3452 wrote to memory of 3616 3452 C870.tmp 94 PID 3452 wrote to memory of 3616 3452 C870.tmp 94 PID 3452 wrote to memory of 3616 3452 C870.tmp 94 PID 3616 wrote to memory of 4664 3616 C92C.tmp 95 PID 3616 wrote to memory of 4664 3616 C92C.tmp 95 PID 3616 wrote to memory of 4664 3616 C92C.tmp 95 PID 4664 wrote to memory of 3256 4664 C9F7.tmp 96 PID 4664 wrote to memory of 3256 4664 C9F7.tmp 96 PID 4664 wrote to memory of 3256 4664 C9F7.tmp 96 PID 3256 wrote to memory of 2936 3256 CBEB.tmp 97 PID 3256 wrote to memory of 2936 3256 CBEB.tmp 97 PID 3256 wrote to memory of 2936 3256 CBEB.tmp 97 PID 2936 wrote to memory of 1016 2936 CCB6.tmp 98 PID 2936 wrote to memory of 1016 2936 CCB6.tmp 98 PID 2936 wrote to memory of 1016 2936 CCB6.tmp 98 PID 1016 wrote to memory of 4124 1016 CD81.tmp 101 PID 1016 wrote to memory of 4124 1016 CD81.tmp 101 PID 1016 wrote to memory of 4124 1016 CD81.tmp 101 PID 4124 wrote to memory of 1268 4124 CE5C.tmp 102 PID 4124 wrote to memory of 1268 4124 CE5C.tmp 102 PID 4124 wrote to memory of 1268 4124 CE5C.tmp 102 PID 1268 wrote to memory of 4672 1268 CEC9.tmp 103 PID 1268 wrote to memory of 4672 1268 CEC9.tmp 103 PID 1268 wrote to memory of 4672 1268 CEC9.tmp 103 PID 4672 wrote to memory of 4156 4672 CFA4.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\d93d848d88ab8280a4bdb321f4db39e9_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\C43A.tmp"C:\Users\Admin\AppData\Local\Temp\C43A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\C64D.tmp"C:\Users\Admin\AppData\Local\Temp\C64D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\C870.tmp"C:\Users\Admin\AppData\Local\Temp\C870.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\C92C.tmp"C:\Users\Admin\AppData\Local\Temp\C92C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\CCB6.tmp"C:\Users\Admin\AppData\Local\Temp\CCB6.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\CD81.tmp"C:\Users\Admin\AppData\Local\Temp\CD81.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"23⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"24⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"25⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"26⤵
- Executes dropped EXE
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"27⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"28⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"29⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\D561.tmp"C:\Users\Admin\AppData\Local\Temp\D561.tmp"30⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\D60D.tmp"C:\Users\Admin\AppData\Local\Temp\D60D.tmp"31⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"32⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"33⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"34⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"35⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\DA24.tmp"C:\Users\Admin\AppData\Local\Temp\DA24.tmp"36⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"37⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"38⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\DC37.tmp"C:\Users\Admin\AppData\Local\Temp\DC37.tmp"39⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"40⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\DD50.tmp"C:\Users\Admin\AppData\Local\Temp\DD50.tmp"41⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"42⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\DE89.tmp"C:\Users\Admin\AppData\Local\Temp\DE89.tmp"43⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"44⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"45⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"46⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"47⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"48⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"49⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"50⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"51⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"52⤵
- Executes dropped EXE
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\E493.tmp"C:\Users\Admin\AppData\Local\Temp\E493.tmp"53⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\E53F.tmp"C:\Users\Admin\AppData\Local\Temp\E53F.tmp"54⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"55⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"56⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\E733.tmp"C:\Users\Admin\AppData\Local\Temp\E733.tmp"57⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"58⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\E84D.tmp"C:\Users\Admin\AppData\Local\Temp\E84D.tmp"59⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"60⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"61⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"62⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\EACD.tmp"C:\Users\Admin\AppData\Local\Temp\EACD.tmp"63⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\EB89.tmp"C:\Users\Admin\AppData\Local\Temp\EB89.tmp"64⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"65⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\EC83.tmp"C:\Users\Admin\AppData\Local\Temp\EC83.tmp"66⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"67⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"68⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"69⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"70⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"71⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"72⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"73⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"74⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"75⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"76⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"77⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\F29D.tmp"C:\Users\Admin\AppData\Local\Temp\F29D.tmp"78⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\F31A.tmp"C:\Users\Admin\AppData\Local\Temp\F31A.tmp"79⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"80⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\F453.tmp"C:\Users\Admin\AppData\Local\Temp\F453.tmp"81⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"82⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"83⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"84⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\F656.tmp"C:\Users\Admin\AppData\Local\Temp\F656.tmp"85⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"86⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\F78F.tmp"C:\Users\Admin\AppData\Local\Temp\F78F.tmp"87⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"88⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\F889.tmp"C:\Users\Admin\AppData\Local\Temp\F889.tmp"89⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\F925.tmp"C:\Users\Admin\AppData\Local\Temp\F925.tmp"90⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"91⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"92⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"93⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"94⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"95⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\FC80.tmp"C:\Users\Admin\AppData\Local\Temp\FC80.tmp"96⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"97⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"98⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\FE46.tmp"C:\Users\Admin\AppData\Local\Temp\FE46.tmp"99⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"100⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"101⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"102⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"103⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\172.tmp"C:\Users\Admin\AppData\Local\Temp\172.tmp"104⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"105⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"106⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"107⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"108⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"109⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"110⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\599.tmp"C:\Users\Admin\AppData\Local\Temp\599.tmp"111⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"112⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"113⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\77D.tmp"C:\Users\Admin\AppData\Local\Temp\77D.tmp"114⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"115⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\8D5.tmp"C:\Users\Admin\AppData\Local\Temp\8D5.tmp"116⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"117⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\9DE.tmp"C:\Users\Admin\AppData\Local\Temp\9DE.tmp"118⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"119⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\AE8.tmp"C:\Users\Admin\AppData\Local\Temp\AE8.tmp"120⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\BA3.tmp"C:\Users\Admin\AppData\Local\Temp\BA3.tmp"121⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"122⤵PID:4364
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-