Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 14:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2b70c039bcdded13a8368308454db9d8_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b70c039bcdded13a8368308454db9d8_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
2b70c039bcdded13a8368308454db9d8_mafia_JC.exe
-
Size
488KB
-
MD5
2b70c039bcdded13a8368308454db9d8
-
SHA1
ae008ffa51591ee28c0f7df2da0cb0265041d89e
-
SHA256
a94635a74135c899e66d2093f315f25b5a2c5597420b5a78961588ca3c0b2db2
-
SHA512
92fff9ba9595cb89b852940880b63245b0e07bec2238658b921b6c94fc133bb17f1f1afe69fce0925f2faa575f453065443d58952de5a520cfd0cfab7491a4a4
-
SSDEEP
12288:/U5rCOTeiDKYvYIwtTKLehBy+aroUpNZ:/UQOJDlt6KLehBy8uN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3680 22A6.tmp 4472 2507.tmp 4172 25F2.tmp 3764 2798.tmp 2112 2892.tmp 3324 2A47.tmp 780 2B22.tmp 744 2BFD.tmp 4480 2D26.tmp 1436 2E10.tmp 4916 2EDB.tmp 4324 2FF4.tmp 628 30EE.tmp 4028 31C9.tmp 4164 3294.tmp 4044 335F.tmp 4896 341B.tmp 3064 3515.tmp 440 35FF.tmp 4880 36DA.tmp 5096 37F3.tmp 1524 38DE.tmp 3248 39A9.tmp 1816 3A55.tmp 1152 3B3F.tmp 1128 3C29.tmp 1380 3CD5.tmp 5052 3DA0.tmp 4796 3E5C.tmp 4976 3F17.tmp 3028 3FE2.tmp 228 408E.tmp 2356 4159.tmp 3960 41D6.tmp 4680 4253.tmp 5056 42F0.tmp 892 43AB.tmp 4568 4428.tmp 4268 4532.tmp 1992 45BE.tmp 3628 464B.tmp 1500 46D8.tmp 2520 4745.tmp 4804 47B2.tmp 1044 485E.tmp 3380 4968.tmp 2608 49E5.tmp 3264 4A91.tmp 4488 4B1D.tmp 2988 4BAA.tmp 2888 4C46.tmp 4112 4CB4.tmp 4844 4D31.tmp 4496 4DFC.tmp 3524 4E88.tmp 4424 4F25.tmp 4428 4FC1.tmp 3584 505D.tmp 1964 50DA.tmp 1836 5157.tmp 568 51F3.tmp 2980 5290.tmp 2636 531C.tmp 4228 5399.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 3680 3936 2b70c039bcdded13a8368308454db9d8_mafia_JC.exe 82 PID 3936 wrote to memory of 3680 3936 2b70c039bcdded13a8368308454db9d8_mafia_JC.exe 82 PID 3936 wrote to memory of 3680 3936 2b70c039bcdded13a8368308454db9d8_mafia_JC.exe 82 PID 3680 wrote to memory of 4472 3680 22A6.tmp 83 PID 3680 wrote to memory of 4472 3680 22A6.tmp 83 PID 3680 wrote to memory of 4472 3680 22A6.tmp 83 PID 4472 wrote to memory of 4172 4472 2507.tmp 84 PID 4472 wrote to memory of 4172 4472 2507.tmp 84 PID 4472 wrote to memory of 4172 4472 2507.tmp 84 PID 4172 wrote to memory of 3764 4172 25F2.tmp 85 PID 4172 wrote to memory of 3764 4172 25F2.tmp 85 PID 4172 wrote to memory of 3764 4172 25F2.tmp 85 PID 3764 wrote to memory of 2112 3764 2798.tmp 86 PID 3764 wrote to memory of 2112 3764 2798.tmp 86 PID 3764 wrote to memory of 2112 3764 2798.tmp 86 PID 2112 wrote to memory of 3324 2112 2892.tmp 87 PID 2112 wrote to memory of 3324 2112 2892.tmp 87 PID 2112 wrote to memory of 3324 2112 2892.tmp 87 PID 3324 wrote to memory of 780 3324 2A47.tmp 88 PID 3324 wrote to memory of 780 3324 2A47.tmp 88 PID 3324 wrote to memory of 780 3324 2A47.tmp 88 PID 780 wrote to memory of 744 780 2B22.tmp 89 PID 780 wrote to memory of 744 780 2B22.tmp 89 PID 780 wrote to memory of 744 780 2B22.tmp 89 PID 744 wrote to memory of 4480 744 2BFD.tmp 90 PID 744 wrote to memory of 4480 744 2BFD.tmp 90 PID 744 wrote to memory of 4480 744 2BFD.tmp 90 PID 4480 wrote to memory of 1436 4480 2D26.tmp 91 PID 4480 wrote to memory of 1436 4480 2D26.tmp 91 PID 4480 wrote to memory of 1436 4480 2D26.tmp 91 PID 1436 wrote to memory of 4916 1436 2E10.tmp 92 PID 1436 wrote to memory of 4916 1436 2E10.tmp 92 PID 1436 wrote to memory of 4916 1436 2E10.tmp 92 PID 4916 wrote to memory of 4324 4916 2EDB.tmp 93 PID 4916 wrote to memory of 4324 4916 2EDB.tmp 93 PID 4916 wrote to memory of 4324 4916 2EDB.tmp 93 PID 4324 wrote to memory of 628 4324 2FF4.tmp 94 PID 4324 wrote to memory of 628 4324 2FF4.tmp 94 PID 4324 wrote to memory of 628 4324 2FF4.tmp 94 PID 628 wrote to memory of 4028 628 30EE.tmp 95 PID 628 wrote to memory of 4028 628 30EE.tmp 95 PID 628 wrote to memory of 4028 628 30EE.tmp 95 PID 4028 wrote to memory of 4164 4028 31C9.tmp 96 PID 4028 wrote to memory of 4164 4028 31C9.tmp 96 PID 4028 wrote to memory of 4164 4028 31C9.tmp 96 PID 4164 wrote to memory of 4044 4164 3294.tmp 97 PID 4164 wrote to memory of 4044 4164 3294.tmp 97 PID 4164 wrote to memory of 4044 4164 3294.tmp 97 PID 4044 wrote to memory of 4896 4044 335F.tmp 98 PID 4044 wrote to memory of 4896 4044 335F.tmp 98 PID 4044 wrote to memory of 4896 4044 335F.tmp 98 PID 4896 wrote to memory of 3064 4896 341B.tmp 99 PID 4896 wrote to memory of 3064 4896 341B.tmp 99 PID 4896 wrote to memory of 3064 4896 341B.tmp 99 PID 3064 wrote to memory of 440 3064 3515.tmp 100 PID 3064 wrote to memory of 440 3064 3515.tmp 100 PID 3064 wrote to memory of 440 3064 3515.tmp 100 PID 440 wrote to memory of 4880 440 35FF.tmp 101 PID 440 wrote to memory of 4880 440 35FF.tmp 101 PID 440 wrote to memory of 4880 440 35FF.tmp 101 PID 4880 wrote to memory of 5096 4880 36DA.tmp 102 PID 4880 wrote to memory of 5096 4880 36DA.tmp 102 PID 4880 wrote to memory of 5096 4880 36DA.tmp 102 PID 5096 wrote to memory of 1524 5096 37F3.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b70c039bcdded13a8368308454db9d8_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2b70c039bcdded13a8368308454db9d8_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\2798.tmp"C:\Users\Admin\AppData\Local\Temp\2798.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\2A47.tmp"C:\Users\Admin\AppData\Local\Temp\2A47.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\30EE.tmp"C:\Users\Admin\AppData\Local\Temp\30EE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3294.tmp"C:\Users\Admin\AppData\Local\Temp\3294.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3515.tmp"C:\Users\Admin\AppData\Local\Temp\3515.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"23⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"24⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"25⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"26⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"27⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"28⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"C:\Users\Admin\AppData\Local\Temp\3DA0.tmp"29⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"30⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"31⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"32⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"33⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\4159.tmp"C:\Users\Admin\AppData\Local\Temp\4159.tmp"34⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\41D6.tmp"C:\Users\Admin\AppData\Local\Temp\41D6.tmp"35⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"36⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\42F0.tmp"C:\Users\Admin\AppData\Local\Temp\42F0.tmp"37⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"38⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"39⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"40⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"41⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\464B.tmp"C:\Users\Admin\AppData\Local\Temp\464B.tmp"42⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"43⤵
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\4745.tmp"C:\Users\Admin\AppData\Local\Temp\4745.tmp"44⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"45⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"46⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\4968.tmp"C:\Users\Admin\AppData\Local\Temp\4968.tmp"47⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"48⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"49⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"50⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"51⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"52⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"53⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"54⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"55⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\4E88.tmp"C:\Users\Admin\AppData\Local\Temp\4E88.tmp"56⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\4F25.tmp"C:\Users\Admin\AppData\Local\Temp\4F25.tmp"57⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"58⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\505D.tmp"C:\Users\Admin\AppData\Local\Temp\505D.tmp"59⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\50DA.tmp"C:\Users\Admin\AppData\Local\Temp\50DA.tmp"60⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"61⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\51F3.tmp"C:\Users\Admin\AppData\Local\Temp\51F3.tmp"62⤵
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"63⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\531C.tmp"C:\Users\Admin\AppData\Local\Temp\531C.tmp"64⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\5399.tmp"C:\Users\Admin\AppData\Local\Temp\5399.tmp"65⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"66⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"67⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"68⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"69⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\56C6.tmp"C:\Users\Admin\AppData\Local\Temp\56C6.tmp"70⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"71⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\57EF.tmp"C:\Users\Admin\AppData\Local\Temp\57EF.tmp"72⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\585C.tmp"C:\Users\Admin\AppData\Local\Temp\585C.tmp"73⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\5918.tmp"C:\Users\Admin\AppData\Local\Temp\5918.tmp"74⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp"75⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"76⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"77⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"78⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"79⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"80⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"81⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\5E77.tmp"C:\Users\Admin\AppData\Local\Temp\5E77.tmp"82⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\5EF4.tmp"C:\Users\Admin\AppData\Local\Temp\5EF4.tmp"83⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\5F71.tmp"C:\Users\Admin\AppData\Local\Temp\5F71.tmp"84⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\5FFD.tmp"C:\Users\Admin\AppData\Local\Temp\5FFD.tmp"85⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\60A9.tmp"C:\Users\Admin\AppData\Local\Temp\60A9.tmp"86⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"87⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"88⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\6220.tmp"C:\Users\Admin\AppData\Local\Temp\6220.tmp"89⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\62BC.tmp"C:\Users\Admin\AppData\Local\Temp\62BC.tmp"90⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\6339.tmp"C:\Users\Admin\AppData\Local\Temp\6339.tmp"91⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\63C6.tmp"C:\Users\Admin\AppData\Local\Temp\63C6.tmp"92⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\6453.tmp"C:\Users\Admin\AppData\Local\Temp\6453.tmp"93⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"94⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\656C.tmp"C:\Users\Admin\AppData\Local\Temp\656C.tmp"95⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\65F8.tmp"C:\Users\Admin\AppData\Local\Temp\65F8.tmp"96⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\6695.tmp"C:\Users\Admin\AppData\Local\Temp\6695.tmp"97⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"98⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"99⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"100⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\68B8.tmp"C:\Users\Admin\AppData\Local\Temp\68B8.tmp"101⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"102⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\69C1.tmp"C:\Users\Admin\AppData\Local\Temp\69C1.tmp"103⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"104⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"105⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"106⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\6C03.tmp"C:\Users\Admin\AppData\Local\Temp\6C03.tmp"107⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"108⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"109⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"110⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"111⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\6E65.tmp"C:\Users\Admin\AppData\Local\Temp\6E65.tmp"112⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"113⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\6F8E.tmp"C:\Users\Admin\AppData\Local\Temp\6F8E.tmp"114⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\700B.tmp"C:\Users\Admin\AppData\Local\Temp\700B.tmp"115⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"116⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\70F5.tmp"C:\Users\Admin\AppData\Local\Temp\70F5.tmp"117⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\7172.tmp"C:\Users\Admin\AppData\Local\Temp\7172.tmp"118⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\727C.tmp"C:\Users\Admin\AppData\Local\Temp\727C.tmp"119⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\7308.tmp"C:\Users\Admin\AppData\Local\Temp\7308.tmp"120⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"121⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\748F.tmp"C:\Users\Admin\AppData\Local\Temp\748F.tmp"122⤵PID:4056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-