Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe
-
Size
527KB
-
MD5
d231965b395f31b6fc3b4cee9245df36
-
SHA1
75bea346c08a25a929ce9c6fe767770562c4df3c
-
SHA256
82460d12badd63319ace76db52fe56267bcdd5f76738fa5cdd7866a5755fce4d
-
SHA512
0bef128841efdd078dfe2b17bceed58b56fbf59e92a6faca72f97784232b1fe44dbafbd8c6744b81cc83215f0d34e6d73f3f79586ff3e53d2cabc2c729922f4b
-
SSDEEP
12288:fU5rCOTeidOitMr+2TpMK5UaQ+qHclDZu:fUQOJdnJIiaQ+kSDo
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3980 6CC4.tmp 820 6D6F.tmp 5040 6E1B.tmp 3376 6E98.tmp 2488 6F73.tmp 708 700F.tmp 4120 70EA.tmp 2200 7186.tmp 5068 7251.tmp 4708 732C.tmp 928 73D8.tmp 1564 7465.tmp 2880 7511.tmp 2768 759D.tmp 3584 76C6.tmp 392 7772.tmp 340 780E.tmp 4904 78AA.tmp 3452 7966.tmp 3300 7A12.tmp 3480 7A8F.tmp 1904 7BC7.tmp 3692 84FF.tmp 668 9182.tmp 3876 977D.tmp 1596 9E92.tmp 224 A2E7.tmp 4320 A3D1.tmp 1388 A596.tmp 2124 A652.tmp 4560 A79A.tmp 4412 A836.tmp 1128 A911.tmp 4648 AD09.tmp 708 B21A.tmp 4120 B556.tmp 4480 BD26.tmp 320 BF49.tmp 3744 BFD5.tmp 4068 C023.tmp 4348 C071.tmp 3584 C0CF.tmp 4504 C12D.tmp 844 C227.tmp 4984 C285.tmp 1676 C37F.tmp 1028 C3EC.tmp 4596 C479.tmp 3120 C592.tmp 4032 C5FF.tmp 2744 C66D.tmp 3824 C6CA.tmp 4436 C7B5.tmp 3052 C841.tmp 1080 C90D.tmp 5092 C9B8.tmp 3080 CA93.tmp 1132 CB5E.tmp 1916 CC0A.tmp 1512 CC78.tmp 4320 CD04.tmp 1048 CDA0.tmp 4844 CE3D.tmp 4500 CF17.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3980 2036 2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe 86 PID 2036 wrote to memory of 3980 2036 2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe 86 PID 2036 wrote to memory of 3980 2036 2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe 86 PID 3980 wrote to memory of 820 3980 6CC4.tmp 87 PID 3980 wrote to memory of 820 3980 6CC4.tmp 87 PID 3980 wrote to memory of 820 3980 6CC4.tmp 87 PID 820 wrote to memory of 5040 820 6D6F.tmp 88 PID 820 wrote to memory of 5040 820 6D6F.tmp 88 PID 820 wrote to memory of 5040 820 6D6F.tmp 88 PID 5040 wrote to memory of 3376 5040 6E1B.tmp 89 PID 5040 wrote to memory of 3376 5040 6E1B.tmp 89 PID 5040 wrote to memory of 3376 5040 6E1B.tmp 89 PID 3376 wrote to memory of 2488 3376 6E98.tmp 90 PID 3376 wrote to memory of 2488 3376 6E98.tmp 90 PID 3376 wrote to memory of 2488 3376 6E98.tmp 90 PID 2488 wrote to memory of 708 2488 6F73.tmp 91 PID 2488 wrote to memory of 708 2488 6F73.tmp 91 PID 2488 wrote to memory of 708 2488 6F73.tmp 91 PID 708 wrote to memory of 4120 708 700F.tmp 92 PID 708 wrote to memory of 4120 708 700F.tmp 92 PID 708 wrote to memory of 4120 708 700F.tmp 92 PID 4120 wrote to memory of 2200 4120 70EA.tmp 93 PID 4120 wrote to memory of 2200 4120 70EA.tmp 93 PID 4120 wrote to memory of 2200 4120 70EA.tmp 93 PID 2200 wrote to memory of 5068 2200 7186.tmp 94 PID 2200 wrote to memory of 5068 2200 7186.tmp 94 PID 2200 wrote to memory of 5068 2200 7186.tmp 94 PID 5068 wrote to memory of 4708 5068 7251.tmp 95 PID 5068 wrote to memory of 4708 5068 7251.tmp 95 PID 5068 wrote to memory of 4708 5068 7251.tmp 95 PID 4708 wrote to memory of 928 4708 732C.tmp 96 PID 4708 wrote to memory of 928 4708 732C.tmp 96 PID 4708 wrote to memory of 928 4708 732C.tmp 96 PID 928 wrote to memory of 1564 928 73D8.tmp 97 PID 928 wrote to memory of 1564 928 73D8.tmp 97 PID 928 wrote to memory of 1564 928 73D8.tmp 97 PID 1564 wrote to memory of 2880 1564 7465.tmp 98 PID 1564 wrote to memory of 2880 1564 7465.tmp 98 PID 1564 wrote to memory of 2880 1564 7465.tmp 98 PID 2880 wrote to memory of 2768 2880 7511.tmp 99 PID 2880 wrote to memory of 2768 2880 7511.tmp 99 PID 2880 wrote to memory of 2768 2880 7511.tmp 99 PID 2768 wrote to memory of 3584 2768 759D.tmp 100 PID 2768 wrote to memory of 3584 2768 759D.tmp 100 PID 2768 wrote to memory of 3584 2768 759D.tmp 100 PID 3584 wrote to memory of 392 3584 76C6.tmp 101 PID 3584 wrote to memory of 392 3584 76C6.tmp 101 PID 3584 wrote to memory of 392 3584 76C6.tmp 101 PID 392 wrote to memory of 340 392 7772.tmp 102 PID 392 wrote to memory of 340 392 7772.tmp 102 PID 392 wrote to memory of 340 392 7772.tmp 102 PID 340 wrote to memory of 4904 340 780E.tmp 105 PID 340 wrote to memory of 4904 340 780E.tmp 105 PID 340 wrote to memory of 4904 340 780E.tmp 105 PID 4904 wrote to memory of 3452 4904 78AA.tmp 106 PID 4904 wrote to memory of 3452 4904 78AA.tmp 106 PID 4904 wrote to memory of 3452 4904 78AA.tmp 106 PID 3452 wrote to memory of 3300 3452 7966.tmp 107 PID 3452 wrote to memory of 3300 3452 7966.tmp 107 PID 3452 wrote to memory of 3300 3452 7966.tmp 107 PID 3300 wrote to memory of 3480 3300 7A12.tmp 109 PID 3300 wrote to memory of 3480 3300 7A12.tmp 109 PID 3300 wrote to memory of 3480 3300 7A12.tmp 109 PID 3480 wrote to memory of 1904 3480 7A8F.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_d231965b395f31b6fc3b4cee9245df36_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\6E98.tmp"C:\Users\Admin\AppData\Local\Temp\6E98.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\700F.tmp"C:\Users\Admin\AppData\Local\Temp\700F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\70EA.tmp"C:\Users\Admin\AppData\Local\Temp\70EA.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\7186.tmp"C:\Users\Admin\AppData\Local\Temp\7186.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\7251.tmp"C:\Users\Admin\AppData\Local\Temp\7251.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\732C.tmp"C:\Users\Admin\AppData\Local\Temp\732C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\73D8.tmp"C:\Users\Admin\AppData\Local\Temp\73D8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\7465.tmp"C:\Users\Admin\AppData\Local\Temp\7465.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\7511.tmp"C:\Users\Admin\AppData\Local\Temp\7511.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\7772.tmp"C:\Users\Admin\AppData\Local\Temp\7772.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\780E.tmp"C:\Users\Admin\AppData\Local\Temp\780E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\78AA.tmp"C:\Users\Admin\AppData\Local\Temp\78AA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7966.tmp"C:\Users\Admin\AppData\Local\Temp\7966.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\7A12.tmp"C:\Users\Admin\AppData\Local\Temp\7A12.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"23⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"24⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\9182.tmp"C:\Users\Admin\AppData\Local\Temp\9182.tmp"25⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\977D.tmp"C:\Users\Admin\AppData\Local\Temp\977D.tmp"26⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"27⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"28⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"29⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\A596.tmp"C:\Users\Admin\AppData\Local\Temp\A596.tmp"30⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\A652.tmp"C:\Users\Admin\AppData\Local\Temp\A652.tmp"31⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"32⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"33⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\A911.tmp"C:\Users\Admin\AppData\Local\Temp\A911.tmp"34⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"35⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"36⤵
- Executes dropped EXE
PID:708 -
C:\Users\Admin\AppData\Local\Temp\B556.tmp"C:\Users\Admin\AppData\Local\Temp\B556.tmp"37⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"38⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"39⤵
- Executes dropped EXE
PID:320 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"40⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"41⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"42⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"43⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\C12D.tmp"C:\Users\Admin\AppData\Local\Temp\C12D.tmp"44⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\C227.tmp"C:\Users\Admin\AppData\Local\Temp\C227.tmp"45⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"46⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"47⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"48⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\C479.tmp"C:\Users\Admin\AppData\Local\Temp\C479.tmp"49⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"50⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"51⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\C66D.tmp"C:\Users\Admin\AppData\Local\Temp\C66D.tmp"52⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"53⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"54⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"55⤵
- Executes dropped EXE
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\C90D.tmp"C:\Users\Admin\AppData\Local\Temp\C90D.tmp"56⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"57⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\CA93.tmp"C:\Users\Admin\AppData\Local\Temp\CA93.tmp"58⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"59⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"60⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"61⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\CD04.tmp"C:\Users\Admin\AppData\Local\Temp\CD04.tmp"62⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"63⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\CE3D.tmp"C:\Users\Admin\AppData\Local\Temp\CE3D.tmp"64⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\CF17.tmp"C:\Users\Admin\AppData\Local\Temp\CF17.tmp"65⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"66⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"67⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"68⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\D179.tmp"C:\Users\Admin\AppData\Local\Temp\D179.tmp"69⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"70⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\D254.tmp"C:\Users\Admin\AppData\Local\Temp\D254.tmp"71⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"72⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"73⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"74⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"75⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"76⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"77⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"78⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"79⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"80⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"81⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"82⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"83⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\DB7B.tmp"C:\Users\Admin\AppData\Local\Temp\DB7B.tmp"84⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"85⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"86⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"87⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"88⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"89⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"90⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\DF06.tmp"C:\Users\Admin\AppData\Local\Temp\DF06.tmp"91⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"92⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"93⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"94⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"95⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\E196.tmp"C:\Users\Admin\AppData\Local\Temp\E196.tmp"96⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"97⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"98⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"99⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"100⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\E436.tmp"C:\Users\Admin\AppData\Local\Temp\E436.tmp"101⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"102⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\E53F.tmp"C:\Users\Admin\AppData\Local\Temp\E53F.tmp"103⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"104⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\E639.tmp"C:\Users\Admin\AppData\Local\Temp\E639.tmp"105⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"106⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"107⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"108⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"109⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"110⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"111⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"112⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\EA31.tmp"C:\Users\Admin\AppData\Local\Temp\EA31.tmp"113⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"114⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"115⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"116⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\EC25.tmp"C:\Users\Admin\AppData\Local\Temp\EC25.tmp"117⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"118⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"119⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"120⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"121⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"122⤵PID:4384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-