Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 19:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe
-
Size
488KB
-
MD5
ff75c68c3ffe76f6cbbc4f9c689e9a58
-
SHA1
ce14ddf21d5d97b910a80260d57888220bda3e11
-
SHA256
fee4e50a5bb33c3d842eece01c6f3ba765bbc917556a9191a04e08986f4b4b47
-
SHA512
4a08f16d11bc10b14c43fdcd38b99a60beeaa7c2ea233dffb31675df48b3e93ce25c4639789fc0d89b5ff8babdf0986f132e6a793a40908e853f4c944982b403
-
SSDEEP
12288:/U5rCOTeiD7sqrUadKr8mvORHvAcKzIm7gATJNZ:/UQOJD7KaM4dRHYcKZ7gCN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4684 A99E.tmp 312 AA2A.tmp 4828 AAB7.tmp 1400 AB82.tmp 2628 AC5D.tmp 4792 ACF9.tmp 2244 AD86.tmp 1792 AE60.tmp 5012 AF1C.tmp 2656 AF99.tmp 3392 B064.tmp 3756 B120.tmp 4044 B20A.tmp 2284 B352.tmp 3100 B42D.tmp 1508 B4F8.tmp 1996 B5B3.tmp 2304 B640.tmp 3388 B6DC.tmp 4560 B798.tmp 5032 B824.tmp 4268 B8E0.tmp 4344 B97C.tmp 3280 BA47.tmp 1960 BB03.tmp 3656 BB8F.tmp 1216 BC5B.tmp 2116 BCF7.tmp 3076 BD83.tmp 1972 BE20.tmp 5040 BE9D.tmp 4480 BF58.tmp 4024 C023.tmp 2316 C081.tmp 1524 C10E.tmp 4568 C19A.tmp 1884 C237.tmp 3416 C2C3.tmp 3680 C36F.tmp 1848 C41B.tmp 452 C4B7.tmp 4428 C553.tmp 3216 C5F0.tmp 3124 C64D.tmp 2844 C6F9.tmp 1296 C7A5.tmp 3968 C851.tmp 3784 C92C.tmp 4416 C9B8.tmp 5112 CA35.tmp 3444 CB01.tmp 3400 CBAC.tmp 4408 CC49.tmp 4240 CCC6.tmp 5044 CD52.tmp 1052 CDC0.tmp 4168 CE5C.tmp 2964 CEC9.tmp 4356 CF46.tmp 4952 CFA4.tmp 2880 D031.tmp 4532 D0BD.tmp 4092 D169.tmp 872 D1D7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4684 2820 ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe 82 PID 2820 wrote to memory of 4684 2820 ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe 82 PID 2820 wrote to memory of 4684 2820 ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe 82 PID 4684 wrote to memory of 312 4684 A99E.tmp 83 PID 4684 wrote to memory of 312 4684 A99E.tmp 83 PID 4684 wrote to memory of 312 4684 A99E.tmp 83 PID 312 wrote to memory of 4828 312 AA2A.tmp 84 PID 312 wrote to memory of 4828 312 AA2A.tmp 84 PID 312 wrote to memory of 4828 312 AA2A.tmp 84 PID 4828 wrote to memory of 1400 4828 AAB7.tmp 85 PID 4828 wrote to memory of 1400 4828 AAB7.tmp 85 PID 4828 wrote to memory of 1400 4828 AAB7.tmp 85 PID 1400 wrote to memory of 2628 1400 AB82.tmp 86 PID 1400 wrote to memory of 2628 1400 AB82.tmp 86 PID 1400 wrote to memory of 2628 1400 AB82.tmp 86 PID 2628 wrote to memory of 4792 2628 AC5D.tmp 87 PID 2628 wrote to memory of 4792 2628 AC5D.tmp 87 PID 2628 wrote to memory of 4792 2628 AC5D.tmp 87 PID 4792 wrote to memory of 2244 4792 ACF9.tmp 88 PID 4792 wrote to memory of 2244 4792 ACF9.tmp 88 PID 4792 wrote to memory of 2244 4792 ACF9.tmp 88 PID 2244 wrote to memory of 1792 2244 AD86.tmp 89 PID 2244 wrote to memory of 1792 2244 AD86.tmp 89 PID 2244 wrote to memory of 1792 2244 AD86.tmp 89 PID 1792 wrote to memory of 5012 1792 AE60.tmp 91 PID 1792 wrote to memory of 5012 1792 AE60.tmp 91 PID 1792 wrote to memory of 5012 1792 AE60.tmp 91 PID 5012 wrote to memory of 2656 5012 AF1C.tmp 92 PID 5012 wrote to memory of 2656 5012 AF1C.tmp 92 PID 5012 wrote to memory of 2656 5012 AF1C.tmp 92 PID 2656 wrote to memory of 3392 2656 AF99.tmp 93 PID 2656 wrote to memory of 3392 2656 AF99.tmp 93 PID 2656 wrote to memory of 3392 2656 AF99.tmp 93 PID 3392 wrote to memory of 3756 3392 B064.tmp 94 PID 3392 wrote to memory of 3756 3392 B064.tmp 94 PID 3392 wrote to memory of 3756 3392 B064.tmp 94 PID 3756 wrote to memory of 4044 3756 B120.tmp 95 PID 3756 wrote to memory of 4044 3756 B120.tmp 95 PID 3756 wrote to memory of 4044 3756 B120.tmp 95 PID 4044 wrote to memory of 2284 4044 B20A.tmp 96 PID 4044 wrote to memory of 2284 4044 B20A.tmp 96 PID 4044 wrote to memory of 2284 4044 B20A.tmp 96 PID 2284 wrote to memory of 3100 2284 B352.tmp 97 PID 2284 wrote to memory of 3100 2284 B352.tmp 97 PID 2284 wrote to memory of 3100 2284 B352.tmp 97 PID 3100 wrote to memory of 1508 3100 B42D.tmp 98 PID 3100 wrote to memory of 1508 3100 B42D.tmp 98 PID 3100 wrote to memory of 1508 3100 B42D.tmp 98 PID 1508 wrote to memory of 1996 1508 B4F8.tmp 99 PID 1508 wrote to memory of 1996 1508 B4F8.tmp 99 PID 1508 wrote to memory of 1996 1508 B4F8.tmp 99 PID 1996 wrote to memory of 2304 1996 B5B3.tmp 100 PID 1996 wrote to memory of 2304 1996 B5B3.tmp 100 PID 1996 wrote to memory of 2304 1996 B5B3.tmp 100 PID 2304 wrote to memory of 3388 2304 B640.tmp 101 PID 2304 wrote to memory of 3388 2304 B640.tmp 101 PID 2304 wrote to memory of 3388 2304 B640.tmp 101 PID 3388 wrote to memory of 4560 3388 B6DC.tmp 104 PID 3388 wrote to memory of 4560 3388 B6DC.tmp 104 PID 3388 wrote to memory of 4560 3388 B6DC.tmp 104 PID 4560 wrote to memory of 5032 4560 B798.tmp 105 PID 4560 wrote to memory of 5032 4560 B798.tmp 105 PID 4560 wrote to memory of 5032 4560 B798.tmp 105 PID 5032 wrote to memory of 4268 5032 B824.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\ff75c68c3ffe76f6cbbc4f9c689e9a58_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\A99E.tmp"C:\Users\Admin\AppData\Local\Temp\A99E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\AC5D.tmp"C:\Users\Admin\AppData\Local\Temp\AC5D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\AD86.tmp"C:\Users\Admin\AppData\Local\Temp\AD86.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"C:\Users\Admin\AppData\Local\Temp\AF1C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\B120.tmp"C:\Users\Admin\AppData\Local\Temp\B120.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\B20A.tmp"C:\Users\Admin\AppData\Local\Temp\B20A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\B824.tmp"C:\Users\Admin\AppData\Local\Temp\B824.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"23⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"24⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"25⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"26⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"27⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"28⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"29⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\BD83.tmp"C:\Users\Admin\AppData\Local\Temp\BD83.tmp"30⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\BE20.tmp"C:\Users\Admin\AppData\Local\Temp\BE20.tmp"31⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"32⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\BF58.tmp"C:\Users\Admin\AppData\Local\Temp\BF58.tmp"33⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"34⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"35⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"36⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"37⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"38⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"39⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"40⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\C41B.tmp"C:\Users\Admin\AppData\Local\Temp\C41B.tmp"41⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"42⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\C553.tmp"C:\Users\Admin\AppData\Local\Temp\C553.tmp"43⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"44⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\C64D.tmp"C:\Users\Admin\AppData\Local\Temp\C64D.tmp"45⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"46⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"47⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\C851.tmp"C:\Users\Admin\AppData\Local\Temp\C851.tmp"48⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\C92C.tmp"C:\Users\Admin\AppData\Local\Temp\C92C.tmp"49⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"50⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"51⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\CB01.tmp"C:\Users\Admin\AppData\Local\Temp\CB01.tmp"52⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"53⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\CC49.tmp"C:\Users\Admin\AppData\Local\Temp\CC49.tmp"54⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"55⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"56⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"C:\Users\Admin\AppData\Local\Temp\CDC0.tmp"57⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"58⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"59⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"60⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"61⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"62⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"63⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\D169.tmp"C:\Users\Admin\AppData\Local\Temp\D169.tmp"64⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"65⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"66⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"67⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\D38C.tmp"C:\Users\Admin\AppData\Local\Temp\D38C.tmp"68⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\D409.tmp"C:\Users\Admin\AppData\Local\Temp\D409.tmp"69⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"70⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"71⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"72⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"73⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"74⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\D707.tmp"C:\Users\Admin\AppData\Local\Temp\D707.tmp"75⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"76⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"77⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\D84F.tmp"C:\Users\Admin\AppData\Local\Temp\D84F.tmp"78⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\D939.tmp"C:\Users\Admin\AppData\Local\Temp\D939.tmp"79⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"80⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"81⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"82⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"83⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"84⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"85⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"86⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"87⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"88⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"89⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"90⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"91⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"92⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"93⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"94⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\E119.tmp"C:\Users\Admin\AppData\Local\Temp\E119.tmp"95⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"96⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"97⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"98⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\E2FD.tmp"C:\Users\Admin\AppData\Local\Temp\E2FD.tmp"99⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\E37A.tmp"C:\Users\Admin\AppData\Local\Temp\E37A.tmp"100⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\E416.tmp"C:\Users\Admin\AppData\Local\Temp\E416.tmp"101⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\E484.tmp"C:\Users\Admin\AppData\Local\Temp\E484.tmp"102⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"103⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\E59D.tmp"C:\Users\Admin\AppData\Local\Temp\E59D.tmp"104⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\E62A.tmp"C:\Users\Admin\AppData\Local\Temp\E62A.tmp"105⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"106⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"107⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"108⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"109⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"110⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"111⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"112⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"113⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"114⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"115⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\EC44.tmp"C:\Users\Admin\AppData\Local\Temp\EC44.tmp"116⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"117⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"118⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\EE48.tmp"C:\Users\Admin\AppData\Local\Temp\EE48.tmp"119⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"120⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"121⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\F02C.tmp"C:\Users\Admin\AppData\Local\Temp\F02C.tmp"122⤵PID:4952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-