Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 16:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe
-
Size
486KB
-
MD5
f65ebd8ea82556bfec85c87a80c8dd1a
-
SHA1
bcf8cf9bad7041f5cfcb4ba62ee02b5e23ad614a
-
SHA256
930b7bc4c96dc66e14b205e16c01fb38e024eee83a53d945fe90f5ab762834bb
-
SHA512
6fecedd532ec1b3010c54414b50811d0e706e4129c899365ade959b1f9f91d9efea687462a3ad37f52462e7899c20af9f8b1f1c6c46ff0eee547e56c72adeddb
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7COebI40hI1y1SU1gQCf5x7kAE53pTmuhlsHT:/U5rCOTeiDZebz0hI1at/Wx767h6NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5052 AC7C.tmp 4492 AD38.tmp 2164 AE03.tmp 4644 AEFD.tmp 3448 AF99.tmp 4000 B016.tmp 1308 B0D1.tmp 4172 B14E.tmp 4164 B1BC.tmp 4260 B248.tmp 1456 B314.tmp 848 B3DF.tmp 3928 B47B.tmp 4956 B517.tmp 2064 B5A4.tmp 1556 B621.tmp 2396 B6CD.tmp 1736 B788.tmp 2996 B9F9.tmp 4184 BAC4.tmp 3308 BB8F.tmp 4796 BC0C.tmp 760 BCD8.tmp 2984 BD74.tmp 228 BE20.tmp 2744 BF0A.tmp 1248 C023.tmp 4680 C10E.tmp 4048 C208.tmp 2792 C331.tmp 4468 C41B.tmp 4488 C515.tmp 4508 C63E.tmp 2772 C719.tmp 3816 C7B5.tmp 2304 C880.tmp 728 C96A.tmp 2728 CA35.tmp 4344 CAE1.tmp 1252 CB8D.tmp 1896 CC39.tmp 4332 CCF5.tmp 400 CD72.tmp 5100 CE1D.tmp 1876 CEBA.tmp 3044 CF66.tmp 2876 D011.tmp 1868 D0CD.tmp 3916 D188.tmp 5016 D2D1.tmp 4820 D3AB.tmp 4828 D428.tmp 5000 D4B5.tmp 1580 D551.tmp 4448 D5DE.tmp 3964 D65B.tmp 2424 D6D8.tmp 3904 D784.tmp 3040 D820.tmp 4568 D8EB.tmp 4260 D968.tmp 3432 D9D5.tmp 1456 DA52.tmp 848 DAC0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 5052 3212 f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe 82 PID 3212 wrote to memory of 5052 3212 f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe 82 PID 3212 wrote to memory of 5052 3212 f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe 82 PID 5052 wrote to memory of 4492 5052 AC7C.tmp 83 PID 5052 wrote to memory of 4492 5052 AC7C.tmp 83 PID 5052 wrote to memory of 4492 5052 AC7C.tmp 83 PID 4492 wrote to memory of 2164 4492 AD38.tmp 84 PID 4492 wrote to memory of 2164 4492 AD38.tmp 84 PID 4492 wrote to memory of 2164 4492 AD38.tmp 84 PID 2164 wrote to memory of 4644 2164 AE03.tmp 85 PID 2164 wrote to memory of 4644 2164 AE03.tmp 85 PID 2164 wrote to memory of 4644 2164 AE03.tmp 85 PID 4644 wrote to memory of 3448 4644 AEFD.tmp 86 PID 4644 wrote to memory of 3448 4644 AEFD.tmp 86 PID 4644 wrote to memory of 3448 4644 AEFD.tmp 86 PID 3448 wrote to memory of 4000 3448 AF99.tmp 87 PID 3448 wrote to memory of 4000 3448 AF99.tmp 87 PID 3448 wrote to memory of 4000 3448 AF99.tmp 87 PID 4000 wrote to memory of 1308 4000 B016.tmp 88 PID 4000 wrote to memory of 1308 4000 B016.tmp 88 PID 4000 wrote to memory of 1308 4000 B016.tmp 88 PID 1308 wrote to memory of 4172 1308 B0D1.tmp 90 PID 1308 wrote to memory of 4172 1308 B0D1.tmp 90 PID 1308 wrote to memory of 4172 1308 B0D1.tmp 90 PID 4172 wrote to memory of 4164 4172 B14E.tmp 91 PID 4172 wrote to memory of 4164 4172 B14E.tmp 91 PID 4172 wrote to memory of 4164 4172 B14E.tmp 91 PID 4164 wrote to memory of 4260 4164 B1BC.tmp 92 PID 4164 wrote to memory of 4260 4164 B1BC.tmp 92 PID 4164 wrote to memory of 4260 4164 B1BC.tmp 92 PID 4260 wrote to memory of 1456 4260 B248.tmp 93 PID 4260 wrote to memory of 1456 4260 B248.tmp 93 PID 4260 wrote to memory of 1456 4260 B248.tmp 93 PID 1456 wrote to memory of 848 1456 B314.tmp 94 PID 1456 wrote to memory of 848 1456 B314.tmp 94 PID 1456 wrote to memory of 848 1456 B314.tmp 94 PID 848 wrote to memory of 3928 848 B3DF.tmp 95 PID 848 wrote to memory of 3928 848 B3DF.tmp 95 PID 848 wrote to memory of 3928 848 B3DF.tmp 95 PID 3928 wrote to memory of 4956 3928 B47B.tmp 96 PID 3928 wrote to memory of 4956 3928 B47B.tmp 96 PID 3928 wrote to memory of 4956 3928 B47B.tmp 96 PID 4956 wrote to memory of 2064 4956 B517.tmp 97 PID 4956 wrote to memory of 2064 4956 B517.tmp 97 PID 4956 wrote to memory of 2064 4956 B517.tmp 97 PID 2064 wrote to memory of 1556 2064 B5A4.tmp 100 PID 2064 wrote to memory of 1556 2064 B5A4.tmp 100 PID 2064 wrote to memory of 1556 2064 B5A4.tmp 100 PID 1556 wrote to memory of 2396 1556 B621.tmp 101 PID 1556 wrote to memory of 2396 1556 B621.tmp 101 PID 1556 wrote to memory of 2396 1556 B621.tmp 101 PID 2396 wrote to memory of 1736 2396 B6CD.tmp 102 PID 2396 wrote to memory of 1736 2396 B6CD.tmp 102 PID 2396 wrote to memory of 1736 2396 B6CD.tmp 102 PID 1736 wrote to memory of 2996 1736 B788.tmp 103 PID 1736 wrote to memory of 2996 1736 B788.tmp 103 PID 1736 wrote to memory of 2996 1736 B788.tmp 103 PID 2996 wrote to memory of 4184 2996 B9F9.tmp 105 PID 2996 wrote to memory of 4184 2996 B9F9.tmp 105 PID 2996 wrote to memory of 4184 2996 B9F9.tmp 105 PID 4184 wrote to memory of 3308 4184 BAC4.tmp 106 PID 4184 wrote to memory of 3308 4184 BAC4.tmp 106 PID 4184 wrote to memory of 3308 4184 BAC4.tmp 106 PID 3308 wrote to memory of 4796 3308 BB8F.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\f65ebd8ea82556bfec85c87a80c8dd1a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\AD38.tmp"C:\Users\Admin\AppData\Local\Temp\AD38.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\B016.tmp"C:\Users\Admin\AppData\Local\Temp\B016.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\B0D1.tmp"C:\Users\Admin\AppData\Local\Temp\B0D1.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\B248.tmp"C:\Users\Admin\AppData\Local\Temp\B248.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\B517.tmp"C:\Users\Admin\AppData\Local\Temp\B517.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\B621.tmp"C:\Users\Admin\AppData\Local\Temp\B621.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\B788.tmp"C:\Users\Admin\AppData\Local\Temp\B788.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\BC0C.tmp"C:\Users\Admin\AppData\Local\Temp\BC0C.tmp"23⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"24⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\BD74.tmp"C:\Users\Admin\AppData\Local\Temp\BD74.tmp"25⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\BE20.tmp"C:\Users\Admin\AppData\Local\Temp\BE20.tmp"26⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"27⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"28⤵
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"29⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"30⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"31⤵
- Executes dropped EXE
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\C41B.tmp"C:\Users\Admin\AppData\Local\Temp\C41B.tmp"32⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\C515.tmp"C:\Users\Admin\AppData\Local\Temp\C515.tmp"33⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\C63E.tmp"C:\Users\Admin\AppData\Local\Temp\C63E.tmp"34⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"35⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"36⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"37⤵
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\C96A.tmp"C:\Users\Admin\AppData\Local\Temp\C96A.tmp"38⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"39⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"40⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\CB8D.tmp"C:\Users\Admin\AppData\Local\Temp\CB8D.tmp"41⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\CC39.tmp"C:\Users\Admin\AppData\Local\Temp\CC39.tmp"42⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"43⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\CD72.tmp"C:\Users\Admin\AppData\Local\Temp\CD72.tmp"44⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"45⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"46⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"47⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"48⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"49⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\D188.tmp"C:\Users\Admin\AppData\Local\Temp\D188.tmp"50⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\D215.tmp"C:\Users\Admin\AppData\Local\Temp\D215.tmp"51⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"52⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"53⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\D428.tmp"C:\Users\Admin\AppData\Local\Temp\D428.tmp"54⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\D4B5.tmp"C:\Users\Admin\AppData\Local\Temp\D4B5.tmp"55⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"56⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"57⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"58⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"59⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\D784.tmp"C:\Users\Admin\AppData\Local\Temp\D784.tmp"60⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"61⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"62⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\D968.tmp"C:\Users\Admin\AppData\Local\Temp\D968.tmp"63⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"64⤵
- Executes dropped EXE
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\DA52.tmp"C:\Users\Admin\AppData\Local\Temp\DA52.tmp"65⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"66⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\DB4C.tmp"C:\Users\Admin\AppData\Local\Temp\DB4C.tmp"67⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"68⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"69⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"70⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"71⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"72⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"73⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"74⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"75⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"76⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"77⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"78⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\E222.tmp"C:\Users\Admin\AppData\Local\Temp\E222.tmp"79⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"80⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\E30D.tmp"C:\Users\Admin\AppData\Local\Temp\E30D.tmp"81⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\E38A.tmp"C:\Users\Admin\AppData\Local\Temp\E38A.tmp"82⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\E407.tmp"C:\Users\Admin\AppData\Local\Temp\E407.tmp"83⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"84⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\E54F.tmp"C:\Users\Admin\AppData\Local\Temp\E54F.tmp"85⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"86⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"87⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\E704.tmp"C:\Users\Admin\AppData\Local\Temp\E704.tmp"88⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"89⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\E85C.tmp"C:\Users\Admin\AppData\Local\Temp\E85C.tmp"90⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\E918.tmp"C:\Users\Admin\AppData\Local\Temp\E918.tmp"91⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"92⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"93⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"94⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"95⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"96⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"97⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"98⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"99⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\EF42.tmp"C:\Users\Admin\AppData\Local\Temp\EF42.tmp"100⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"101⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"102⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"103⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"104⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"105⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\F32A.tmp"C:\Users\Admin\AppData\Local\Temp\F32A.tmp"106⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"107⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"108⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"109⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"110⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"111⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\F695.tmp"C:\Users\Admin\AppData\Local\Temp\F695.tmp"112⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"113⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"114⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"115⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"116⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"117⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"118⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"119⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"120⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\FC03.tmp"C:\Users\Admin\AppData\Local\Temp\FC03.tmp"121⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"122⤵PID:3840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-