Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 17:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe
Resource
win10v2004-20230831-en
2 signatures
150 seconds
General
-
Target
2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe
-
Size
520KB
-
MD5
523f7ad8612f494cfd7e1c97201ec3cc
-
SHA1
69e613159a1880296a5c29297aba48839947df8d
-
SHA256
fd2625e04b6895a8bcf9fa13c6b2c919b60691a739a5842926e2a4e3011ff69e
-
SHA512
060468368b041f3bc8ba4b3d13f8b3f5a6a0b006c2dbe726429a92d27ec59bd6a5a4e6b7c5104f2a6fde620254c3bb93c0ebc7560c0aae03e1eb1789f7b3bdf8
-
SSDEEP
12288:gj8fuxR21t5i8faNAImllFflscO9NXZaZYNZ:gj8fuK1GYaNYQXZEYN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1796 C208.tmp 1140 C2E2.tmp 2676 C37F.tmp 1536 C469.tmp 4424 C534.tmp 4476 C5E0.tmp 4640 C6AB.tmp 4596 C747.tmp 2136 C803.tmp 4512 C8CE.tmp 4160 C9C8.tmp 3588 CA45.tmp 2200 CB10.tmp 3784 CBFB.tmp 1332 CDB0.tmp 796 CE2D.tmp 2576 CED9.tmp 4960 CFC3.tmp 2492 D08E.tmp 2556 D14A.tmp 2660 D205.tmp 4880 D2B1.tmp 4440 D34E.tmp 4624 D428.tmp 3176 D4C5.tmp 4144 D580.tmp 3832 D62C.tmp 8 D6F7.tmp 2872 D7A3.tmp 2672 D8BC.tmp 5036 D978.tmp 4824 DA33.tmp 4540 DB8B.tmp 4744 DC37.tmp 3636 DCD3.tmp 4172 DD9E.tmp 2856 DE2B.tmp 3192 DEC7.tmp 4164 DF54.tmp 1288 DFE0.tmp 1932 E0AB.tmp 2244 E157.tmp 1444 E232.tmp 4828 E29F.tmp 2216 E33C.tmp 2164 E3E8.tmp 1312 E465.tmp 5016 E510.tmp 3920 E58D.tmp 3932 E668.tmp 5056 E714.tmp 2580 E7D0.tmp 3152 E86C.tmp 1068 E918.tmp 5076 E9B4.tmp 3660 EA21.tmp 3616 EABE.tmp 3600 EBA8.tmp 1556 EC15.tmp 1216 ECE0.tmp 2720 ED9C.tmp 1740 EE48.tmp 4456 EEE4.tmp 4688 EF80.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1796 1492 2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe 81 PID 1492 wrote to memory of 1796 1492 2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe 81 PID 1492 wrote to memory of 1796 1492 2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe 81 PID 1796 wrote to memory of 1140 1796 C208.tmp 82 PID 1796 wrote to memory of 1140 1796 C208.tmp 82 PID 1796 wrote to memory of 1140 1796 C208.tmp 82 PID 1140 wrote to memory of 2676 1140 C2E2.tmp 83 PID 1140 wrote to memory of 2676 1140 C2E2.tmp 83 PID 1140 wrote to memory of 2676 1140 C2E2.tmp 83 PID 2676 wrote to memory of 1536 2676 C37F.tmp 85 PID 2676 wrote to memory of 1536 2676 C37F.tmp 85 PID 2676 wrote to memory of 1536 2676 C37F.tmp 85 PID 1536 wrote to memory of 4424 1536 C469.tmp 86 PID 1536 wrote to memory of 4424 1536 C469.tmp 86 PID 1536 wrote to memory of 4424 1536 C469.tmp 86 PID 4424 wrote to memory of 4476 4424 C534.tmp 87 PID 4424 wrote to memory of 4476 4424 C534.tmp 87 PID 4424 wrote to memory of 4476 4424 C534.tmp 87 PID 4476 wrote to memory of 4640 4476 C5E0.tmp 88 PID 4476 wrote to memory of 4640 4476 C5E0.tmp 88 PID 4476 wrote to memory of 4640 4476 C5E0.tmp 88 PID 4640 wrote to memory of 4596 4640 C6AB.tmp 89 PID 4640 wrote to memory of 4596 4640 C6AB.tmp 89 PID 4640 wrote to memory of 4596 4640 C6AB.tmp 89 PID 4596 wrote to memory of 2136 4596 C747.tmp 90 PID 4596 wrote to memory of 2136 4596 C747.tmp 90 PID 4596 wrote to memory of 2136 4596 C747.tmp 90 PID 2136 wrote to memory of 4512 2136 C803.tmp 91 PID 2136 wrote to memory of 4512 2136 C803.tmp 91 PID 2136 wrote to memory of 4512 2136 C803.tmp 91 PID 4512 wrote to memory of 4160 4512 C8CE.tmp 92 PID 4512 wrote to memory of 4160 4512 C8CE.tmp 92 PID 4512 wrote to memory of 4160 4512 C8CE.tmp 92 PID 4160 wrote to memory of 3588 4160 C9C8.tmp 93 PID 4160 wrote to memory of 3588 4160 C9C8.tmp 93 PID 4160 wrote to memory of 3588 4160 C9C8.tmp 93 PID 3588 wrote to memory of 2200 3588 CA45.tmp 94 PID 3588 wrote to memory of 2200 3588 CA45.tmp 94 PID 3588 wrote to memory of 2200 3588 CA45.tmp 94 PID 2200 wrote to memory of 3784 2200 CB10.tmp 95 PID 2200 wrote to memory of 3784 2200 CB10.tmp 95 PID 2200 wrote to memory of 3784 2200 CB10.tmp 95 PID 3784 wrote to memory of 1332 3784 CBFB.tmp 96 PID 3784 wrote to memory of 1332 3784 CBFB.tmp 96 PID 3784 wrote to memory of 1332 3784 CBFB.tmp 96 PID 1332 wrote to memory of 796 1332 CDB0.tmp 97 PID 1332 wrote to memory of 796 1332 CDB0.tmp 97 PID 1332 wrote to memory of 796 1332 CDB0.tmp 97 PID 796 wrote to memory of 2576 796 CE2D.tmp 98 PID 796 wrote to memory of 2576 796 CE2D.tmp 98 PID 796 wrote to memory of 2576 796 CE2D.tmp 98 PID 2576 wrote to memory of 4960 2576 CED9.tmp 99 PID 2576 wrote to memory of 4960 2576 CED9.tmp 99 PID 2576 wrote to memory of 4960 2576 CED9.tmp 99 PID 4960 wrote to memory of 2492 4960 CFC3.tmp 100 PID 4960 wrote to memory of 2492 4960 CFC3.tmp 100 PID 4960 wrote to memory of 2492 4960 CFC3.tmp 100 PID 2492 wrote to memory of 2556 2492 D08E.tmp 101 PID 2492 wrote to memory of 2556 2492 D08E.tmp 101 PID 2492 wrote to memory of 2556 2492 D08E.tmp 101 PID 2556 wrote to memory of 2660 2556 D14A.tmp 102 PID 2556 wrote to memory of 2660 2556 D14A.tmp 102 PID 2556 wrote to memory of 2660 2556 D14A.tmp 102 PID 2660 wrote to memory of 4880 2660 D205.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_523f7ad8612f494cfd7e1c97201ec3cc_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\C469.tmp"C:\Users\Admin\AppData\Local\Temp\C469.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\C747.tmp"C:\Users\Admin\AppData\Local\Temp\C747.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\C803.tmp"C:\Users\Admin\AppData\Local\Temp\C803.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\CBFB.tmp"C:\Users\Admin\AppData\Local\Temp\CBFB.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\CDB0.tmp"C:\Users\Admin\AppData\Local\Temp\CDB0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\CED9.tmp"C:\Users\Admin\AppData\Local\Temp\CED9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\D14A.tmp"C:\Users\Admin\AppData\Local\Temp\D14A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\D205.tmp"C:\Users\Admin\AppData\Local\Temp\D205.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"23⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"24⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\D428.tmp"C:\Users\Admin\AppData\Local\Temp\D428.tmp"25⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"26⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"27⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"28⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"29⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"30⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"31⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"32⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"33⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"34⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\DC37.tmp"C:\Users\Admin\AppData\Local\Temp\DC37.tmp"35⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"36⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"37⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"38⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"39⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"40⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"41⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"42⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"43⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"44⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\E29F.tmp"C:\Users\Admin\AppData\Local\Temp\E29F.tmp"45⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"46⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"47⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"48⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"49⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\E58D.tmp"C:\Users\Admin\AppData\Local\Temp\E58D.tmp"50⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\E668.tmp"C:\Users\Admin\AppData\Local\Temp\E668.tmp"51⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\E714.tmp"C:\Users\Admin\AppData\Local\Temp\E714.tmp"52⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"53⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\E86C.tmp"C:\Users\Admin\AppData\Local\Temp\E86C.tmp"54⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\E918.tmp"C:\Users\Admin\AppData\Local\Temp\E918.tmp"55⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"56⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp"57⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"58⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"59⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"60⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"61⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"62⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\EE48.tmp"C:\Users\Admin\AppData\Local\Temp\EE48.tmp"63⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"64⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\EF80.tmp"C:\Users\Admin\AppData\Local\Temp\EF80.tmp"65⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"66⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"67⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"68⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\F24F.tmp"C:\Users\Admin\AppData\Local\Temp\F24F.tmp"69⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\F30B.tmp"C:\Users\Admin\AppData\Local\Temp\F30B.tmp"70⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"71⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"72⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"73⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"74⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"75⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"76⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\F79E.tmp"C:\Users\Admin\AppData\Local\Temp\F79E.tmp"77⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\F83B.tmp"C:\Users\Admin\AppData\Local\Temp\F83B.tmp"78⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"79⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\F992.tmp"C:\Users\Admin\AppData\Local\Temp\F992.tmp"80⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"81⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"82⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"83⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"84⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"85⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"86⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\FE17.tmp"C:\Users\Admin\AppData\Local\Temp\FE17.tmp"87⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"88⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"89⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"90⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"91⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"92⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"93⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\25C.tmp"C:\Users\Admin\AppData\Local\Temp\25C.tmp"94⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\308.tmp"C:\Users\Admin\AppData\Local\Temp\308.tmp"95⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"96⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\441.tmp"C:\Users\Admin\AppData\Local\Temp\441.tmp"97⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"98⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"99⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"100⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"101⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\78D.tmp"C:\Users\Admin\AppData\Local\Temp\78D.tmp"102⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\838.tmp"C:\Users\Admin\AppData\Local\Temp\838.tmp"103⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"104⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\971.tmp"C:\Users\Admin\AppData\Local\Temp\971.tmp"105⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"106⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"107⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"108⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\BE2.tmp"C:\Users\Admin\AppData\Local\Temp\BE2.tmp"109⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"110⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\D3A.tmp"C:\Users\Admin\AppData\Local\Temp\D3A.tmp"111⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"112⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp"113⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"114⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\FE9.tmp"C:\Users\Admin\AppData\Local\Temp\FE9.tmp"115⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"116⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\10E3.tmp"C:\Users\Admin\AppData\Local\Temp\10E3.tmp"117⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\117F.tmp"C:\Users\Admin\AppData\Local\Temp\117F.tmp"118⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\124B.tmp"C:\Users\Admin\AppData\Local\Temp\124B.tmp"119⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"120⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\1373.tmp"C:\Users\Admin\AppData\Local\Temp\1373.tmp"121⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"122⤵PID:396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-