Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 14:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe
-
Size
520KB
-
MD5
0ecc5f8f8512b6a91e53f64324e81e8a
-
SHA1
9cdd1784d6da38ccbe947f83089ac2cdae319027
-
SHA256
ece8b8b3a8681bbc3ef6cef24b9617e13aa112ee4ce90be42a62097b44cc7a6f
-
SHA512
0bbf6f5076549b7bc40684b52b86e611e0c85e7ca0f42506fce11a5453558529805c81b00be5d4e5b94572c68c6667ec264009274ac0e14ed7fc9850d2fec483
-
SSDEEP
12288:NDlpiJRz26qAAarZiO3q/E5GF+FGOONZ:NDSJA6qKrZiOaMyNZN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2896 D3F9.tmp 4668 D4C5.tmp 5064 D580.tmp 2388 D66A.tmp 3412 D736.tmp 2680 D820.tmp 4700 D91A.tmp 4520 D9E5.tmp 1412 DA72.tmp 916 DB2D.tmp 4352 DBBA.tmp 3028 DC66.tmp 2120 DCE3.tmp 1828 DDBD.tmp 880 DE4A.tmp 3440 DED7.tmp 3936 DFA2.tmp 4904 E05D.tmp 4628 E0FA.tmp 1768 E1C5.tmp 2616 E290.tmp 2656 E3B9.tmp 5092 E474.tmp 4220 E5EB.tmp 2552 E6A7.tmp 1876 E81E.tmp 1580 E8AA.tmp 3616 E937.tmp 3696 E9F2.tmp 4236 EABE.tmp 3476 EB4A.tmp 1272 EC35.tmp 3944 ED00.tmp 4548 ED9C.tmp 228 EE09.tmp 416 EE96.tmp 1148 EF03.tmp 2692 EFA0.tmp 1968 F01D.tmp 1112 F09A.tmp 396 F117.tmp 1456 F194.tmp 3088 F201.tmp 4444 F25F.tmp 4356 F2CC.tmp 3916 F368.tmp 368 F3D6.tmp 2744 F472.tmp 4700 F4FF.tmp 3104 F5AA.tmp 1020 F637.tmp 4148 F6F3.tmp 2764 F77F.tmp 3724 F7FC.tmp 1296 F879.tmp 2188 F906.tmp 4836 F9C1.tmp 3580 FA5E.tmp 2076 FAEA.tmp 2884 FB77.tmp 3836 FC13.tmp 2112 FCBF.tmp 2148 FD3C.tmp 3404 FDB9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2896 2224 2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe 83 PID 2224 wrote to memory of 2896 2224 2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe 83 PID 2224 wrote to memory of 2896 2224 2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe 83 PID 2896 wrote to memory of 4668 2896 D3F9.tmp 84 PID 2896 wrote to memory of 4668 2896 D3F9.tmp 84 PID 2896 wrote to memory of 4668 2896 D3F9.tmp 84 PID 4668 wrote to memory of 5064 4668 D4C5.tmp 85 PID 4668 wrote to memory of 5064 4668 D4C5.tmp 85 PID 4668 wrote to memory of 5064 4668 D4C5.tmp 85 PID 5064 wrote to memory of 2388 5064 D580.tmp 86 PID 5064 wrote to memory of 2388 5064 D580.tmp 86 PID 5064 wrote to memory of 2388 5064 D580.tmp 86 PID 2388 wrote to memory of 3412 2388 D66A.tmp 87 PID 2388 wrote to memory of 3412 2388 D66A.tmp 87 PID 2388 wrote to memory of 3412 2388 D66A.tmp 87 PID 3412 wrote to memory of 2680 3412 D736.tmp 88 PID 3412 wrote to memory of 2680 3412 D736.tmp 88 PID 3412 wrote to memory of 2680 3412 D736.tmp 88 PID 2680 wrote to memory of 4700 2680 D820.tmp 89 PID 2680 wrote to memory of 4700 2680 D820.tmp 89 PID 2680 wrote to memory of 4700 2680 D820.tmp 89 PID 4700 wrote to memory of 4520 4700 D91A.tmp 90 PID 4700 wrote to memory of 4520 4700 D91A.tmp 90 PID 4700 wrote to memory of 4520 4700 D91A.tmp 90 PID 4520 wrote to memory of 1412 4520 D9E5.tmp 92 PID 4520 wrote to memory of 1412 4520 D9E5.tmp 92 PID 4520 wrote to memory of 1412 4520 D9E5.tmp 92 PID 1412 wrote to memory of 916 1412 DA72.tmp 93 PID 1412 wrote to memory of 916 1412 DA72.tmp 93 PID 1412 wrote to memory of 916 1412 DA72.tmp 93 PID 916 wrote to memory of 4352 916 DB2D.tmp 94 PID 916 wrote to memory of 4352 916 DB2D.tmp 94 PID 916 wrote to memory of 4352 916 DB2D.tmp 94 PID 4352 wrote to memory of 3028 4352 DBBA.tmp 95 PID 4352 wrote to memory of 3028 4352 DBBA.tmp 95 PID 4352 wrote to memory of 3028 4352 DBBA.tmp 95 PID 3028 wrote to memory of 2120 3028 DC66.tmp 96 PID 3028 wrote to memory of 2120 3028 DC66.tmp 96 PID 3028 wrote to memory of 2120 3028 DC66.tmp 96 PID 2120 wrote to memory of 1828 2120 DCE3.tmp 97 PID 2120 wrote to memory of 1828 2120 DCE3.tmp 97 PID 2120 wrote to memory of 1828 2120 DCE3.tmp 97 PID 1828 wrote to memory of 880 1828 DDBD.tmp 98 PID 1828 wrote to memory of 880 1828 DDBD.tmp 98 PID 1828 wrote to memory of 880 1828 DDBD.tmp 98 PID 880 wrote to memory of 3440 880 DE4A.tmp 99 PID 880 wrote to memory of 3440 880 DE4A.tmp 99 PID 880 wrote to memory of 3440 880 DE4A.tmp 99 PID 3440 wrote to memory of 3936 3440 DED7.tmp 100 PID 3440 wrote to memory of 3936 3440 DED7.tmp 100 PID 3440 wrote to memory of 3936 3440 DED7.tmp 100 PID 3936 wrote to memory of 4904 3936 DFA2.tmp 103 PID 3936 wrote to memory of 4904 3936 DFA2.tmp 103 PID 3936 wrote to memory of 4904 3936 DFA2.tmp 103 PID 4904 wrote to memory of 4628 4904 E05D.tmp 104 PID 4904 wrote to memory of 4628 4904 E05D.tmp 104 PID 4904 wrote to memory of 4628 4904 E05D.tmp 104 PID 4628 wrote to memory of 1768 4628 E0FA.tmp 105 PID 4628 wrote to memory of 1768 4628 E0FA.tmp 105 PID 4628 wrote to memory of 1768 4628 E0FA.tmp 105 PID 1768 wrote to memory of 2616 1768 E1C5.tmp 106 PID 1768 wrote to memory of 2616 1768 E1C5.tmp 106 PID 1768 wrote to memory of 2616 1768 E1C5.tmp 106 PID 2616 wrote to memory of 2656 2616 E290.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_0ecc5f8f8512b6a91e53f64324e81e8a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\D66A.tmp"C:\Users\Admin\AppData\Local\Temp\D66A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"C:\Users\Admin\AppData\Local\Temp\DCE3.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"23⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\E474.tmp"C:\Users\Admin\AppData\Local\Temp\E474.tmp"24⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"25⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"26⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\E81E.tmp"C:\Users\Admin\AppData\Local\Temp\E81E.tmp"27⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"28⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\E937.tmp"C:\Users\Admin\AppData\Local\Temp\E937.tmp"29⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"30⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"31⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"32⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"33⤵
- Executes dropped EXE
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"34⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"35⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"36⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"37⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\EF03.tmp"C:\Users\Admin\AppData\Local\Temp\EF03.tmp"38⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"39⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"40⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"41⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\F117.tmp"C:\Users\Admin\AppData\Local\Temp\F117.tmp"42⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"43⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\F201.tmp"C:\Users\Admin\AppData\Local\Temp\F201.tmp"44⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\F25F.tmp"C:\Users\Admin\AppData\Local\Temp\F25F.tmp"45⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"46⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\F368.tmp"C:\Users\Admin\AppData\Local\Temp\F368.tmp"47⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"48⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"49⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"50⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"51⤵
- Executes dropped EXE
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"52⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"53⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"54⤵
- Executes dropped EXE
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"55⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"56⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"57⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"58⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"59⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"60⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\FB77.tmp"C:\Users\Admin\AppData\Local\Temp\FB77.tmp"61⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"62⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"63⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"64⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"65⤵
- Executes dropped EXE
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\FE36.tmp"C:\Users\Admin\AppData\Local\Temp\FE36.tmp"66⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"67⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"68⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"69⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"70⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"71⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\1EF.tmp"C:\Users\Admin\AppData\Local\Temp\1EF.tmp"72⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"73⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"74⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\395.tmp"C:\Users\Admin\AppData\Local\Temp\395.tmp"75⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\431.tmp"C:\Users\Admin\AppData\Local\Temp\431.tmp"76⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\4BE.tmp"C:\Users\Admin\AppData\Local\Temp\4BE.tmp"77⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"78⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"79⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\616.tmp"C:\Users\Admin\AppData\Local\Temp\616.tmp"80⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"81⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\71F.tmp"C:\Users\Admin\AppData\Local\Temp\71F.tmp"82⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\7CB.tmp"C:\Users\Admin\AppData\Local\Temp\7CB.tmp"83⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\838.tmp"C:\Users\Admin\AppData\Local\Temp\838.tmp"84⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\8C5.tmp"C:\Users\Admin\AppData\Local\Temp\8C5.tmp"85⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"86⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\9DE.tmp"C:\Users\Admin\AppData\Local\Temp\9DE.tmp"87⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"88⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"89⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"90⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"91⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\CFB.tmp"C:\Users\Admin\AppData\Local\Temp\CFB.tmp"92⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"93⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"94⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"95⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"96⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"97⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\1066.tmp"C:\Users\Admin\AppData\Local\Temp\1066.tmp"98⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"99⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"100⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\124B.tmp"C:\Users\Admin\AppData\Local\Temp\124B.tmp"101⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"102⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"103⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"104⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"105⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"106⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"107⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"108⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"109⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\17C9.tmp"C:\Users\Admin\AppData\Local\Temp\17C9.tmp"110⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"111⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"112⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\19BD.tmp"C:\Users\Admin\AppData\Local\Temp\19BD.tmp"113⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"114⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"115⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\1B92.tmp"C:\Users\Admin\AppData\Local\Temp\1B92.tmp"116⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"117⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"118⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\1D76.tmp"C:\Users\Admin\AppData\Local\Temp\1D76.tmp"119⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"120⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"121⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"122⤵PID:972
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-