Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 17:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe
-
Size
486KB
-
MD5
e4640fa08fcda36d24d37e9d713106cd
-
SHA1
4830d82b444741cef73c5cea29c13da20a8fc6c4
-
SHA256
84c48fb5c8a32b58479d71f3a95fff891d58a355d9134824ed5733e234d6bb83
-
SHA512
3bda785d4df3b9405b5d76c37b20ef93fa1b25392c12764a0230783a060192f19a36d77f8d9179486440b52419f2a310f10491877ea8b009b4129feec2373aa7
-
SSDEEP
12288:UU5rCOTeiDCDmxqgbfg3CnbcYCgzHFmbGNZ:UUQOJDCDMqgbY3CbceLFmiN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4120 F7AE.tmp 3508 F85A.tmp 4956 F906.tmp 4864 F9F0.tmp 4900 FACB.tmp 4444 FB86.tmp 3840 FC42.tmp 2488 FCFD.tmp 228 FD9A.tmp 4104 FE74.tmp 2892 FF11.tmp 3224 FFCC.tmp 1748 78.tmp 208 134.tmp 3608 366.tmp 732 422.tmp 540 4DD.tmp 640 589.tmp 4132 673.tmp 2916 71F.tmp 5012 7BB.tmp 4752 858.tmp 3412 952.tmp 3668 A5B.tmp 220 B46.tmp 3264 BD2.tmp 4404 C9D.tmp 4052 D69.tmp 4628 DF5.tmp 4288 E91.tmp 1668 F6C.tmp 1132 1018.tmp 1768 10D4.tmp 4340 1151.tmp 1960 1279.tmp 2124 14BC.tmp 4112 1548.tmp 4784 15C5.tmp 3804 1681.tmp 4964 171D.tmp 4884 17B9.tmp 3392 1836.tmp 3156 18B3.tmp 3696 195F.tmp 3908 19EC.tmp 4468 1AA7.tmp 2064 1B63.tmp 3456 1C0F.tmp 1552 1C9B.tmp 3824 1D47.tmp 1036 1DF3.tmp 3112 1E8F.tmp 4192 1F1C.tmp 4168 1FC8.tmp 4792 2045.tmp 1136 20D1.tmp 4580 217D.tmp 1612 2219.tmp 4644 22C5.tmp 3472 2362.tmp 4108 23DF.tmp 676 249A.tmp 1496 2517.tmp 4212 2594.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4120 4088 e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe 81 PID 4088 wrote to memory of 4120 4088 e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe 81 PID 4088 wrote to memory of 4120 4088 e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe 81 PID 4120 wrote to memory of 3508 4120 F7AE.tmp 82 PID 4120 wrote to memory of 3508 4120 F7AE.tmp 82 PID 4120 wrote to memory of 3508 4120 F7AE.tmp 82 PID 3508 wrote to memory of 4956 3508 F85A.tmp 83 PID 3508 wrote to memory of 4956 3508 F85A.tmp 83 PID 3508 wrote to memory of 4956 3508 F85A.tmp 83 PID 4956 wrote to memory of 4864 4956 F906.tmp 84 PID 4956 wrote to memory of 4864 4956 F906.tmp 84 PID 4956 wrote to memory of 4864 4956 F906.tmp 84 PID 4864 wrote to memory of 4900 4864 F9F0.tmp 85 PID 4864 wrote to memory of 4900 4864 F9F0.tmp 85 PID 4864 wrote to memory of 4900 4864 F9F0.tmp 85 PID 4900 wrote to memory of 4444 4900 FACB.tmp 86 PID 4900 wrote to memory of 4444 4900 FACB.tmp 86 PID 4900 wrote to memory of 4444 4900 FACB.tmp 86 PID 4444 wrote to memory of 3840 4444 FB86.tmp 87 PID 4444 wrote to memory of 3840 4444 FB86.tmp 87 PID 4444 wrote to memory of 3840 4444 FB86.tmp 87 PID 3840 wrote to memory of 2488 3840 FC42.tmp 88 PID 3840 wrote to memory of 2488 3840 FC42.tmp 88 PID 3840 wrote to memory of 2488 3840 FC42.tmp 88 PID 2488 wrote to memory of 228 2488 FCFD.tmp 89 PID 2488 wrote to memory of 228 2488 FCFD.tmp 89 PID 2488 wrote to memory of 228 2488 FCFD.tmp 89 PID 228 wrote to memory of 4104 228 FD9A.tmp 90 PID 228 wrote to memory of 4104 228 FD9A.tmp 90 PID 228 wrote to memory of 4104 228 FD9A.tmp 90 PID 4104 wrote to memory of 2892 4104 FE74.tmp 92 PID 4104 wrote to memory of 2892 4104 FE74.tmp 92 PID 4104 wrote to memory of 2892 4104 FE74.tmp 92 PID 2892 wrote to memory of 3224 2892 FF11.tmp 93 PID 2892 wrote to memory of 3224 2892 FF11.tmp 93 PID 2892 wrote to memory of 3224 2892 FF11.tmp 93 PID 3224 wrote to memory of 1748 3224 FFCC.tmp 94 PID 3224 wrote to memory of 1748 3224 FFCC.tmp 94 PID 3224 wrote to memory of 1748 3224 FFCC.tmp 94 PID 1748 wrote to memory of 208 1748 78.tmp 95 PID 1748 wrote to memory of 208 1748 78.tmp 95 PID 1748 wrote to memory of 208 1748 78.tmp 95 PID 208 wrote to memory of 3608 208 134.tmp 96 PID 208 wrote to memory of 3608 208 134.tmp 96 PID 208 wrote to memory of 3608 208 134.tmp 96 PID 3608 wrote to memory of 732 3608 366.tmp 97 PID 3608 wrote to memory of 732 3608 366.tmp 97 PID 3608 wrote to memory of 732 3608 366.tmp 97 PID 732 wrote to memory of 540 732 422.tmp 98 PID 732 wrote to memory of 540 732 422.tmp 98 PID 732 wrote to memory of 540 732 422.tmp 98 PID 540 wrote to memory of 640 540 4DD.tmp 99 PID 540 wrote to memory of 640 540 4DD.tmp 99 PID 540 wrote to memory of 640 540 4DD.tmp 99 PID 640 wrote to memory of 4132 640 589.tmp 100 PID 640 wrote to memory of 4132 640 589.tmp 100 PID 640 wrote to memory of 4132 640 589.tmp 100 PID 4132 wrote to memory of 2916 4132 673.tmp 103 PID 4132 wrote to memory of 2916 4132 673.tmp 103 PID 4132 wrote to memory of 2916 4132 673.tmp 103 PID 2916 wrote to memory of 5012 2916 71F.tmp 104 PID 2916 wrote to memory of 5012 2916 71F.tmp 104 PID 2916 wrote to memory of 5012 2916 71F.tmp 104 PID 5012 wrote to memory of 4752 5012 7BB.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\e4640fa08fcda36d24d37e9d713106cd_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\FACB.tmp"C:\Users\Admin\AppData\Local\Temp\FACB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\FF11.tmp"C:\Users\Admin\AppData\Local\Temp\FF11.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\422.tmp"C:\Users\Admin\AppData\Local\Temp\422.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\4DD.tmp"C:\Users\Admin\AppData\Local\Temp\4DD.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\589.tmp"C:\Users\Admin\AppData\Local\Temp\589.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\673.tmp"C:\Users\Admin\AppData\Local\Temp\673.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\71F.tmp"C:\Users\Admin\AppData\Local\Temp\71F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\858.tmp"C:\Users\Admin\AppData\Local\Temp\858.tmp"23⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"24⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"25⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\B46.tmp"C:\Users\Admin\AppData\Local\Temp\B46.tmp"26⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"27⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\C9D.tmp"C:\Users\Admin\AppData\Local\Temp\C9D.tmp"28⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"29⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"30⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"31⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"32⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\1018.tmp"C:\Users\Admin\AppData\Local\Temp\1018.tmp"33⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"34⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1151.tmp"C:\Users\Admin\AppData\Local\Temp\1151.tmp"35⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\1279.tmp"C:\Users\Admin\AppData\Local\Temp\1279.tmp"36⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\14BC.tmp"C:\Users\Admin\AppData\Local\Temp\14BC.tmp"37⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"38⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"39⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"40⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"41⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"42⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\1836.tmp"C:\Users\Admin\AppData\Local\Temp\1836.tmp"43⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\18B3.tmp"C:\Users\Admin\AppData\Local\Temp\18B3.tmp"44⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"45⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"46⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\1AA7.tmp"C:\Users\Admin\AppData\Local\Temp\1AA7.tmp"47⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\1B63.tmp"C:\Users\Admin\AppData\Local\Temp\1B63.tmp"48⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"49⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\1C9B.tmp"C:\Users\Admin\AppData\Local\Temp\1C9B.tmp"50⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"51⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"52⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"53⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"54⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"55⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\2045.tmp"C:\Users\Admin\AppData\Local\Temp\2045.tmp"56⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"57⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"58⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\2219.tmp"C:\Users\Admin\AppData\Local\Temp\2219.tmp"59⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"60⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"61⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\23DF.tmp"C:\Users\Admin\AppData\Local\Temp\23DF.tmp"62⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"63⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"64⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"65⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\2611.tmp"C:\Users\Admin\AppData\Local\Temp\2611.tmp"66⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"67⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\26DC.tmp"C:\Users\Admin\AppData\Local\Temp\26DC.tmp"68⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"69⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\2805.tmp"C:\Users\Admin\AppData\Local\Temp\2805.tmp"70⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\28A1.tmp"C:\Users\Admin\AppData\Local\Temp\28A1.tmp"71⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\291E.tmp"C:\Users\Admin\AppData\Local\Temp\291E.tmp"72⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\29AB.tmp"C:\Users\Admin\AppData\Local\Temp\29AB.tmp"73⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\2A18.tmp"C:\Users\Admin\AppData\Local\Temp\2A18.tmp"74⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"75⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"76⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"77⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"78⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\2D16.tmp"C:\Users\Admin\AppData\Local\Temp\2D16.tmp"79⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\2D83.tmp"C:\Users\Admin\AppData\Local\Temp\2D83.tmp"80⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\2E00.tmp"C:\Users\Admin\AppData\Local\Temp\2E00.tmp"81⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"82⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"83⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"84⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"85⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\30EE.tmp"C:\Users\Admin\AppData\Local\Temp\30EE.tmp"86⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\316B.tmp"C:\Users\Admin\AppData\Local\Temp\316B.tmp"87⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"88⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"89⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"90⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"91⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"92⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"93⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"94⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"95⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"96⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"97⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"98⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"99⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\38BE.tmp"C:\Users\Admin\AppData\Local\Temp\38BE.tmp"100⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"101⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"102⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"103⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"104⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"105⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"106⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\3D62.tmp"C:\Users\Admin\AppData\Local\Temp\3D62.tmp"107⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"108⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"109⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"110⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"111⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"112⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"113⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\4188.tmp"C:\Users\Admin\AppData\Local\Temp\4188.tmp"114⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\4225.tmp"C:\Users\Admin\AppData\Local\Temp\4225.tmp"115⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"116⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"117⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"118⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\44A5.tmp"C:\Users\Admin\AppData\Local\Temp\44A5.tmp"119⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\4513.tmp"C:\Users\Admin\AppData\Local\Temp\4513.tmp"120⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\45AF.tmp"C:\Users\Admin\AppData\Local\Temp\45AF.tmp"121⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\464B.tmp"C:\Users\Admin\AppData\Local\Temp\464B.tmp"122⤵PID:772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-