Analysis
-
max time kernel
159s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 00:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe
-
Size
487KB
-
MD5
6794c69fac2e629b1c049a2255f1c7a8
-
SHA1
301d808a3649bfae585df814ffdb493f163873df
-
SHA256
8603713e196119e19b9b4381c4ba65024690c64d6003690076fac62f23f34e37
-
SHA512
949a43776f296ad932f9f03c2f3ff1c6055243d27398c115aebb10877a8766aabae5e7a5f546c7127c0c1230d5ba0a7547c6878eb9cf1990305fcb711d84c4fe
-
SSDEEP
12288:HU5rCOTeiJKFeRdIPBTJbx28/EMuB1mNZ:HUQOJJqeyP7L/OMN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4116 A74C.tmp 2784 A875.tmp 432 A940.tmp 4668 A9EC.tmp 4388 AA78.tmp 1232 AB05.tmp 2668 ABC1.tmp 3908 AC4D.tmp 4088 ACDA.tmp 4720 AD57.tmp 3420 AE22.tmp 3424 AEAF.tmp 2676 AF3B.tmp 1856 AFA9.tmp 2656 B074.tmp 2544 B12F.tmp 1968 B1FA.tmp 3728 B2A6.tmp 672 B323.tmp 4524 B3A0.tmp 4648 B46B.tmp 1564 B508.tmp 968 B5A4.tmp 1064 B602.tmp 1736 B6AD.tmp 1760 B769.tmp 1612 B7F6.tmp 4580 B892.tmp 2152 B91E.tmp 796 B9AB.tmp 2688 BA57.tmp 3036 BB12.tmp 1808 BBED.tmp 1048 BE00.tmp 2540 BE6E.tmp 4280 BEDB.tmp 1716 BF49.tmp 4624 BFD5.tmp 1232 C033.tmp 2668 C0A0.tmp 4112 D476.tmp 4772 EA12.tmp 2676 F750.tmp 4712 F82B.tmp 540 F879.tmp 900 F8D7.tmp 1660 25C.tmp 4308 2AB.tmp 2352 1112.tmp 496 120C.tmp 4844 1BD0.tmp 2548 1C4D.tmp 1576 220A.tmp 3036 2CE7.tmp 488 3A55.tmp 3596 4AEF.tmp 2540 4C94.tmp 4280 4D31.tmp 4024 530D.tmp 4452 625F.tmp 2284 6C42.tmp 3076 756A.tmp 4660 7700.tmp 3752 8642.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4116 3988 2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe 85 PID 3988 wrote to memory of 4116 3988 2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe 85 PID 3988 wrote to memory of 4116 3988 2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe 85 PID 4116 wrote to memory of 2784 4116 A74C.tmp 87 PID 4116 wrote to memory of 2784 4116 A74C.tmp 87 PID 4116 wrote to memory of 2784 4116 A74C.tmp 87 PID 2784 wrote to memory of 432 2784 A875.tmp 88 PID 2784 wrote to memory of 432 2784 A875.tmp 88 PID 2784 wrote to memory of 432 2784 A875.tmp 88 PID 432 wrote to memory of 4668 432 A940.tmp 89 PID 432 wrote to memory of 4668 432 A940.tmp 89 PID 432 wrote to memory of 4668 432 A940.tmp 89 PID 4668 wrote to memory of 4388 4668 A9EC.tmp 90 PID 4668 wrote to memory of 4388 4668 A9EC.tmp 90 PID 4668 wrote to memory of 4388 4668 A9EC.tmp 90 PID 4388 wrote to memory of 1232 4388 AA78.tmp 91 PID 4388 wrote to memory of 1232 4388 AA78.tmp 91 PID 4388 wrote to memory of 1232 4388 AA78.tmp 91 PID 1232 wrote to memory of 2668 1232 AB05.tmp 92 PID 1232 wrote to memory of 2668 1232 AB05.tmp 92 PID 1232 wrote to memory of 2668 1232 AB05.tmp 92 PID 2668 wrote to memory of 3908 2668 ABC1.tmp 93 PID 2668 wrote to memory of 3908 2668 ABC1.tmp 93 PID 2668 wrote to memory of 3908 2668 ABC1.tmp 93 PID 3908 wrote to memory of 4088 3908 AC4D.tmp 94 PID 3908 wrote to memory of 4088 3908 AC4D.tmp 94 PID 3908 wrote to memory of 4088 3908 AC4D.tmp 94 PID 4088 wrote to memory of 4720 4088 ACDA.tmp 95 PID 4088 wrote to memory of 4720 4088 ACDA.tmp 95 PID 4088 wrote to memory of 4720 4088 ACDA.tmp 95 PID 4720 wrote to memory of 3420 4720 AD57.tmp 96 PID 4720 wrote to memory of 3420 4720 AD57.tmp 96 PID 4720 wrote to memory of 3420 4720 AD57.tmp 96 PID 3420 wrote to memory of 3424 3420 AE22.tmp 97 PID 3420 wrote to memory of 3424 3420 AE22.tmp 97 PID 3420 wrote to memory of 3424 3420 AE22.tmp 97 PID 3424 wrote to memory of 2676 3424 AEAF.tmp 98 PID 3424 wrote to memory of 2676 3424 AEAF.tmp 98 PID 3424 wrote to memory of 2676 3424 AEAF.tmp 98 PID 2676 wrote to memory of 1856 2676 AF3B.tmp 99 PID 2676 wrote to memory of 1856 2676 AF3B.tmp 99 PID 2676 wrote to memory of 1856 2676 AF3B.tmp 99 PID 1856 wrote to memory of 2656 1856 AFA9.tmp 100 PID 1856 wrote to memory of 2656 1856 AFA9.tmp 100 PID 1856 wrote to memory of 2656 1856 AFA9.tmp 100 PID 2656 wrote to memory of 2544 2656 B074.tmp 101 PID 2656 wrote to memory of 2544 2656 B074.tmp 101 PID 2656 wrote to memory of 2544 2656 B074.tmp 101 PID 2544 wrote to memory of 1968 2544 B12F.tmp 103 PID 2544 wrote to memory of 1968 2544 B12F.tmp 103 PID 2544 wrote to memory of 1968 2544 B12F.tmp 103 PID 1968 wrote to memory of 3728 1968 B1FA.tmp 104 PID 1968 wrote to memory of 3728 1968 B1FA.tmp 104 PID 1968 wrote to memory of 3728 1968 B1FA.tmp 104 PID 3728 wrote to memory of 672 3728 B2A6.tmp 105 PID 3728 wrote to memory of 672 3728 B2A6.tmp 105 PID 3728 wrote to memory of 672 3728 B2A6.tmp 105 PID 672 wrote to memory of 4524 672 B323.tmp 106 PID 672 wrote to memory of 4524 672 B323.tmp 106 PID 672 wrote to memory of 4524 672 B323.tmp 106 PID 4524 wrote to memory of 4648 4524 B3A0.tmp 107 PID 4524 wrote to memory of 4648 4524 B3A0.tmp 107 PID 4524 wrote to memory of 4648 4524 B3A0.tmp 107 PID 4648 wrote to memory of 1564 4648 B46B.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_6794c69fac2e629b1c049a2255f1c7a8_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\AB05.tmp"C:\Users\Admin\AppData\Local\Temp\AB05.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\AD57.tmp"C:\Users\Admin\AppData\Local\Temp\AD57.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\B074.tmp"C:\Users\Admin\AppData\Local\Temp\B074.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\B12F.tmp"C:\Users\Admin\AppData\Local\Temp\B12F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\B323.tmp"C:\Users\Admin\AppData\Local\Temp\B323.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\B46B.tmp"C:\Users\Admin\AppData\Local\Temp\B46B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"23⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"24⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"25⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"26⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\B769.tmp"C:\Users\Admin\AppData\Local\Temp\B769.tmp"27⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"28⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\B892.tmp"C:\Users\Admin\AppData\Local\Temp\B892.tmp"29⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"30⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"31⤵
- Executes dropped EXE
PID:796 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"32⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\BB12.tmp"C:\Users\Admin\AppData\Local\Temp\BB12.tmp"33⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"34⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\BE00.tmp"C:\Users\Admin\AppData\Local\Temp\BE00.tmp"35⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"36⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"37⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"38⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"39⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\C033.tmp"C:\Users\Admin\AppData\Local\Temp\C033.tmp"40⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"41⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"42⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\EA12.tmp"C:\Users\Admin\AppData\Local\Temp\EA12.tmp"43⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"44⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\F82B.tmp"C:\Users\Admin\AppData\Local\Temp\F82B.tmp"45⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"46⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"47⤵
- Executes dropped EXE
PID:900 -
C:\Users\Admin\AppData\Local\Temp\25C.tmp"C:\Users\Admin\AppData\Local\Temp\25C.tmp"48⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"49⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\1112.tmp"C:\Users\Admin\AppData\Local\Temp\1112.tmp"50⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"51⤵
- Executes dropped EXE
PID:496 -
C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"52⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"53⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"54⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"55⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"56⤵
- Executes dropped EXE
PID:488 -
C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"57⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\4C94.tmp"C:\Users\Admin\AppData\Local\Temp\4C94.tmp"58⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"59⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\530D.tmp"C:\Users\Admin\AppData\Local\Temp\530D.tmp"60⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\625F.tmp"C:\Users\Admin\AppData\Local\Temp\625F.tmp"61⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\6C42.tmp"C:\Users\Admin\AppData\Local\Temp\6C42.tmp"62⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\756A.tmp"C:\Users\Admin\AppData\Local\Temp\756A.tmp"63⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\7700.tmp"C:\Users\Admin\AppData\Local\Temp\7700.tmp"64⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\8642.tmp"C:\Users\Admin\AppData\Local\Temp\8642.tmp"65⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\8C9B.tmp"C:\Users\Admin\AppData\Local\Temp\8C9B.tmp"66⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\8E22.tmp"C:\Users\Admin\AppData\Local\Temp\8E22.tmp"67⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\8FD7.tmp"C:\Users\Admin\AppData\Local\Temp\8FD7.tmp"68⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\9093.tmp"C:\Users\Admin\AppData\Local\Temp\9093.tmp"69⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\912F.tmp"C:\Users\Admin\AppData\Local\Temp\912F.tmp"70⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\9239.tmp"C:\Users\Admin\AppData\Local\Temp\9239.tmp"71⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\9313.tmp"C:\Users\Admin\AppData\Local\Temp\9313.tmp"72⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\93B0.tmp"C:\Users\Admin\AppData\Local\Temp\93B0.tmp"73⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\948A.tmp"C:\Users\Admin\AppData\Local\Temp\948A.tmp"74⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\9601.tmp"C:\Users\Admin\AppData\Local\Temp\9601.tmp"75⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\969E.tmp"C:\Users\Admin\AppData\Local\Temp\969E.tmp"76⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\97F5.tmp"C:\Users\Admin\AppData\Local\Temp\97F5.tmp"77⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\997C.tmp"C:\Users\Admin\AppData\Local\Temp\997C.tmp"78⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\9A95.tmp"C:\Users\Admin\AppData\Local\Temp\9A95.tmp"79⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"C:\Users\Admin\AppData\Local\Temp\9C2B.tmp"80⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\9D06.tmp"C:\Users\Admin\AppData\Local\Temp\9D06.tmp"81⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\9E5E.tmp"C:\Users\Admin\AppData\Local\Temp\9E5E.tmp"82⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\A013.tmp"C:\Users\Admin\AppData\Local\Temp\A013.tmp"83⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\A16B.tmp"C:\Users\Admin\AppData\Local\Temp\A16B.tmp"84⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\A36F.tmp"C:\Users\Admin\AppData\Local\Temp\A36F.tmp"85⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"86⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\A8DD.tmp"C:\Users\Admin\AppData\Local\Temp\A8DD.tmp"87⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\C60A.tmp"C:\Users\Admin\AppData\Local\Temp\C60A.tmp"88⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\D76F.tmp"C:\Users\Admin\AppData\Local\Temp\D76F.tmp"89⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\ECCC.tmp"C:\Users\Admin\AppData\Local\Temp\ECCC.tmp"90⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\FD08.tmp"C:\Users\Admin\AppData\Local\Temp\FD08.tmp"91⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\B12.tmp"C:\Users\Admin\AppData\Local\Temp\B12.tmp"92⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\DB2.tmp"C:\Users\Admin\AppData\Local\Temp\DB2.tmp"93⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\21D6.tmp"C:\Users\Admin\AppData\Local\Temp\21D6.tmp"94⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\330C.tmp"C:\Users\Admin\AppData\Local\Temp\330C.tmp"95⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\3FED.tmp"C:\Users\Admin\AppData\Local\Temp\3FED.tmp"96⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\4B57.tmp"C:\Users\Admin\AppData\Local\Temp\4B57.tmp"97⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\5D59.tmp"C:\Users\Admin\AppData\Local\Temp\5D59.tmp"98⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\679A.tmp"C:\Users\Admin\AppData\Local\Temp\679A.tmp"99⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\7565.tmp"C:\Users\Admin\AppData\Local\Temp\7565.tmp"100⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\7611.tmp"C:\Users\Admin\AppData\Local\Temp\7611.tmp"101⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\76BD.tmp"C:\Users\Admin\AppData\Local\Temp\76BD.tmp"102⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\77B7.tmp"C:\Users\Admin\AppData\Local\Temp\77B7.tmp"103⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\7872.tmp"C:\Users\Admin\AppData\Local\Temp\7872.tmp"104⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\78DF.tmp"C:\Users\Admin\AppData\Local\Temp\78DF.tmp"105⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\795C.tmp"C:\Users\Admin\AppData\Local\Temp\795C.tmp"106⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\79D9.tmp"C:\Users\Admin\AppData\Local\Temp\79D9.tmp"107⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\7AB4.tmp"C:\Users\Admin\AppData\Local\Temp\7AB4.tmp"108⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\7B41.tmp"C:\Users\Admin\AppData\Local\Temp\7B41.tmp"109⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\7BDD.tmp"C:\Users\Admin\AppData\Local\Temp\7BDD.tmp"110⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\7C79.tmp"C:\Users\Admin\AppData\Local\Temp\7C79.tmp"111⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\7CF6.tmp"C:\Users\Admin\AppData\Local\Temp\7CF6.tmp"112⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\7D64.tmp"C:\Users\Admin\AppData\Local\Temp\7D64.tmp"113⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\7E3E.tmp"C:\Users\Admin\AppData\Local\Temp\7E3E.tmp"114⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\7EBB.tmp"C:\Users\Admin\AppData\Local\Temp\7EBB.tmp"115⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\7F58.tmp"C:\Users\Admin\AppData\Local\Temp\7F58.tmp"116⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\8004.tmp"C:\Users\Admin\AppData\Local\Temp\8004.tmp"117⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\80A0.tmp"C:\Users\Admin\AppData\Local\Temp\80A0.tmp"118⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\811D.tmp"C:\Users\Admin\AppData\Local\Temp\811D.tmp"119⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\819A.tmp"C:\Users\Admin\AppData\Local\Temp\819A.tmp"120⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\8217.tmp"C:\Users\Admin\AppData\Local\Temp\8217.tmp"121⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\82E2.tmp"C:\Users\Admin\AppData\Local\Temp\82E2.tmp"122⤵PID:2384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-