Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe
-
Size
486KB
-
MD5
1467d1876464c88c636ba2a52cee21b2
-
SHA1
45b4fff8a7222b86e9d3cb3ee286e10ad136f32e
-
SHA256
c9374d95083fb25ac6ab9c31874ccaa2248fc9c434621af58ca1f3e4bb199388
-
SHA512
a69280af01000a8e58b98c2a87085e694f8a1a96a6027ba2fc6177c840db5884253472c6f3cac79b0ac21657b3d9a3bf0ee4ef3ef4d9e5dd980f271fe2b9be51
-
SSDEEP
6144:Borf3lPvovsgZnqG2C7mOTeiLfD7RnbKCdAuX7VgyWfwN5hfVgeLQvAYT2QMpGr/:oU5rCOTeiDICdHL6fgpDCAYTrvbNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1144 B297.tmp 64 B342.tmp 2232 B3DF.tmp 4268 B49A.tmp 2080 B594.tmp 4004 B65F.tmp 1280 B74A.tmp 1160 B805.tmp 4828 B8C1.tmp 1356 B98C.tmp 928 BA57.tmp 1040 BB12.tmp 3800 BBCE.tmp 4780 BC99.tmp 4736 BE2F.tmp 4568 BF39.tmp 4324 BFE5.tmp 1708 C0CF.tmp 2300 C16B.tmp 4456 C237.tmp 4496 C2E2.tmp 2904 C38E.tmp 3048 C43A.tmp 5080 C4F6.tmp 1664 C582.tmp 2992 C66D.tmp 2988 C728.tmp 5084 C7F3.tmp 3584 C890.tmp 3248 C97A.tmp 4956 CA35.tmp 2980 CB01.tmp 3768 CBCC.tmp 1268 CC68.tmp 3892 CD04.tmp 60 CD91.tmp 4700 CDFE.tmp 64 CEBA.tmp 4400 CF56.tmp 208 CFE3.tmp 3692 D06F.tmp 1700 D215.tmp 1824 D292.tmp 3928 D31F.tmp 4004 D39C.tmp 3060 D409.tmp 3872 D4A5.tmp 3360 D522.tmp 1356 D5AF.tmp 4548 D63C.tmp 3784 D6C8.tmp 3948 D774.tmp 224 D801.tmp 1196 D89D.tmp 4376 D90A.tmp 4624 D9C6.tmp 3496 DA62.tmp 1220 DAEF.tmp 2640 DC85.tmp 3236 DD12.tmp 4992 DDEC.tmp 4088 DE79.tmp 712 DF25.tmp 4948 DFD1.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1144 1688 2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe 82 PID 1688 wrote to memory of 1144 1688 2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe 82 PID 1688 wrote to memory of 1144 1688 2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe 82 PID 1144 wrote to memory of 64 1144 B297.tmp 84 PID 1144 wrote to memory of 64 1144 B297.tmp 84 PID 1144 wrote to memory of 64 1144 B297.tmp 84 PID 64 wrote to memory of 2232 64 B342.tmp 85 PID 64 wrote to memory of 2232 64 B342.tmp 85 PID 64 wrote to memory of 2232 64 B342.tmp 85 PID 2232 wrote to memory of 4268 2232 B3DF.tmp 86 PID 2232 wrote to memory of 4268 2232 B3DF.tmp 86 PID 2232 wrote to memory of 4268 2232 B3DF.tmp 86 PID 4268 wrote to memory of 2080 4268 B49A.tmp 87 PID 4268 wrote to memory of 2080 4268 B49A.tmp 87 PID 4268 wrote to memory of 2080 4268 B49A.tmp 87 PID 2080 wrote to memory of 4004 2080 B594.tmp 88 PID 2080 wrote to memory of 4004 2080 B594.tmp 88 PID 2080 wrote to memory of 4004 2080 B594.tmp 88 PID 4004 wrote to memory of 1280 4004 B65F.tmp 89 PID 4004 wrote to memory of 1280 4004 B65F.tmp 89 PID 4004 wrote to memory of 1280 4004 B65F.tmp 89 PID 1280 wrote to memory of 1160 1280 B74A.tmp 90 PID 1280 wrote to memory of 1160 1280 B74A.tmp 90 PID 1280 wrote to memory of 1160 1280 B74A.tmp 90 PID 1160 wrote to memory of 4828 1160 B805.tmp 91 PID 1160 wrote to memory of 4828 1160 B805.tmp 91 PID 1160 wrote to memory of 4828 1160 B805.tmp 91 PID 4828 wrote to memory of 1356 4828 B8C1.tmp 93 PID 4828 wrote to memory of 1356 4828 B8C1.tmp 93 PID 4828 wrote to memory of 1356 4828 B8C1.tmp 93 PID 1356 wrote to memory of 928 1356 B98C.tmp 94 PID 1356 wrote to memory of 928 1356 B98C.tmp 94 PID 1356 wrote to memory of 928 1356 B98C.tmp 94 PID 928 wrote to memory of 1040 928 BA57.tmp 95 PID 928 wrote to memory of 1040 928 BA57.tmp 95 PID 928 wrote to memory of 1040 928 BA57.tmp 95 PID 1040 wrote to memory of 3800 1040 BB12.tmp 96 PID 1040 wrote to memory of 3800 1040 BB12.tmp 96 PID 1040 wrote to memory of 3800 1040 BB12.tmp 96 PID 3800 wrote to memory of 4780 3800 BBCE.tmp 97 PID 3800 wrote to memory of 4780 3800 BBCE.tmp 97 PID 3800 wrote to memory of 4780 3800 BBCE.tmp 97 PID 4780 wrote to memory of 4736 4780 BC99.tmp 98 PID 4780 wrote to memory of 4736 4780 BC99.tmp 98 PID 4780 wrote to memory of 4736 4780 BC99.tmp 98 PID 4736 wrote to memory of 4568 4736 BE2F.tmp 100 PID 4736 wrote to memory of 4568 4736 BE2F.tmp 100 PID 4736 wrote to memory of 4568 4736 BE2F.tmp 100 PID 4568 wrote to memory of 4324 4568 BF39.tmp 101 PID 4568 wrote to memory of 4324 4568 BF39.tmp 101 PID 4568 wrote to memory of 4324 4568 BF39.tmp 101 PID 4324 wrote to memory of 1708 4324 BFE5.tmp 102 PID 4324 wrote to memory of 1708 4324 BFE5.tmp 102 PID 4324 wrote to memory of 1708 4324 BFE5.tmp 102 PID 1708 wrote to memory of 2300 1708 C0CF.tmp 103 PID 1708 wrote to memory of 2300 1708 C0CF.tmp 103 PID 1708 wrote to memory of 2300 1708 C0CF.tmp 103 PID 2300 wrote to memory of 4456 2300 C16B.tmp 104 PID 2300 wrote to memory of 4456 2300 C16B.tmp 104 PID 2300 wrote to memory of 4456 2300 C16B.tmp 104 PID 4456 wrote to memory of 4496 4456 C237.tmp 105 PID 4456 wrote to memory of 4496 4456 C237.tmp 105 PID 4456 wrote to memory of 4496 4456 C237.tmp 105 PID 4496 wrote to memory of 2904 4496 C2E2.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_1467d1876464c88c636ba2a52cee21b2_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\B342.tmp"C:\Users\Admin\AppData\Local\Temp\B342.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\B49A.tmp"C:\Users\Admin\AppData\Local\Temp\B49A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\B594.tmp"C:\Users\Admin\AppData\Local\Temp\B594.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\B65F.tmp"C:\Users\Admin\AppData\Local\Temp\B65F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\B805.tmp"C:\Users\Admin\AppData\Local\Temp\B805.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\B98C.tmp"C:\Users\Admin\AppData\Local\Temp\B98C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\BB12.tmp"C:\Users\Admin\AppData\Local\Temp\BB12.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\BC99.tmp"C:\Users\Admin\AppData\Local\Temp\BC99.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\C16B.tmp"C:\Users\Admin\AppData\Local\Temp\C16B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\C38E.tmp"C:\Users\Admin\AppData\Local\Temp\C38E.tmp"23⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\C43A.tmp"C:\Users\Admin\AppData\Local\Temp\C43A.tmp"24⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"25⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\C582.tmp"C:\Users\Admin\AppData\Local\Temp\C582.tmp"26⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\C66D.tmp"C:\Users\Admin\AppData\Local\Temp\C66D.tmp"27⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\C728.tmp"C:\Users\Admin\AppData\Local\Temp\C728.tmp"28⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"29⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\C890.tmp"C:\Users\Admin\AppData\Local\Temp\C890.tmp"30⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\C97A.tmp"C:\Users\Admin\AppData\Local\Temp\C97A.tmp"31⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"32⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\CB01.tmp"C:\Users\Admin\AppData\Local\Temp\CB01.tmp"33⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"34⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"35⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\CD04.tmp"C:\Users\Admin\AppData\Local\Temp\CD04.tmp"36⤵
- Executes dropped EXE
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\CD91.tmp"C:\Users\Admin\AppData\Local\Temp\CD91.tmp"37⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"38⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"39⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\CF56.tmp"C:\Users\Admin\AppData\Local\Temp\CF56.tmp"40⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"41⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"42⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\D215.tmp"C:\Users\Admin\AppData\Local\Temp\D215.tmp"43⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"44⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"45⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"46⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\D409.tmp"C:\Users\Admin\AppData\Local\Temp\D409.tmp"47⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"48⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"49⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"50⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"51⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"52⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"53⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\D801.tmp"C:\Users\Admin\AppData\Local\Temp\D801.tmp"54⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\D89D.tmp"C:\Users\Admin\AppData\Local\Temp\D89D.tmp"55⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"56⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"57⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"58⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"59⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"60⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"61⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"62⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"63⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"64⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"65⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\E06D.tmp"C:\Users\Admin\AppData\Local\Temp\E06D.tmp"66⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"67⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"68⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"69⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\E271.tmp"C:\Users\Admin\AppData\Local\Temp\E271.tmp"70⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"71⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"72⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"73⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"74⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"75⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\E54F.tmp"C:\Users\Admin\AppData\Local\Temp\E54F.tmp"76⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"77⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\E678.tmp"C:\Users\Admin\AppData\Local\Temp\E678.tmp"78⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\E704.tmp"C:\Users\Admin\AppData\Local\Temp\E704.tmp"79⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\E772.tmp"C:\Users\Admin\AppData\Local\Temp\E772.tmp"80⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"81⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\E89B.tmp"C:\Users\Admin\AppData\Local\Temp\E89B.tmp"82⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\E937.tmp"C:\Users\Admin\AppData\Local\Temp\E937.tmp"83⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"84⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"85⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"86⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\EB69.tmp"C:\Users\Admin\AppData\Local\Temp\EB69.tmp"87⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"88⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"89⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"90⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"91⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"92⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"93⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"94⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"95⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\F05B.tmp"C:\Users\Admin\AppData\Local\Temp\F05B.tmp"96⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"97⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"98⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"99⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\F29D.tmp"C:\Users\Admin\AppData\Local\Temp\F29D.tmp"100⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\F349.tmp"C:\Users\Admin\AppData\Local\Temp\F349.tmp"101⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"102⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"103⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\F52D.tmp"C:\Users\Admin\AppData\Local\Temp\F52D.tmp"104⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"105⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"106⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\F741.tmp"C:\Users\Admin\AppData\Local\Temp\F741.tmp"107⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"108⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\F889.tmp"C:\Users\Admin\AppData\Local\Temp\F889.tmp"109⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"110⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\F9E1.tmp"C:\Users\Admin\AppData\Local\Temp\F9E1.tmp"111⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"112⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"113⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"114⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"115⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"116⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"117⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"118⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"119⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"120⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"121⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\68.tmp"C:\Users\Admin\AppData\Local\Temp\68.tmp"122⤵PID:2992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-