Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 18:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe
-
Size
486KB
-
MD5
666060f959bd3c9c431689d7157d8b2a
-
SHA1
4e18528904ba2e3bdfbe0ddaa3ff5583fc53b187
-
SHA256
4d47de3629c4728ab78abe148507ba740adfd81e541ee675d1eae92b15d2e8bd
-
SHA512
4af8eeb84e743e516669905fe9f28fc8f5300affc7945d1fa52f3e0e989153cbff27d2e545c8826fcedb86b6d7bb28d757f57614897efc2499b90a0e931536ad
-
SSDEEP
12288:/U5rCOTeiDzJ9lZXrae8ki56SnnRUC5zGIWNZ:/UQOJDzP+Oi56SnRUuzGIWN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1360 2759.tmp 4472 28A1.tmp 3364 299B.tmp 5028 2A57.tmp 764 2B22.tmp 4300 2C0C.tmp 2684 2CC8.tmp 1124 2DC2.tmp 3604 2E8D.tmp 1956 2F58.tmp 400 2FF4.tmp 1484 30EE.tmp 4024 31C9.tmp 3424 3294.tmp 4732 336F.tmp 2900 3469.tmp 1180 35FF.tmp 1656 36DA.tmp 3564 3832.tmp 1220 38BE.tmp 4796 39B8.tmp 4924 3AA3.tmp 388 3B5E.tmp 4564 3C49.tmp 2460 3CE5.tmp 3744 3DC0.tmp 4640 3E4C.tmp 4344 3F46.tmp 4828 4031.tmp 1744 40EC.tmp 4944 41D6.tmp 1980 42B1.tmp 2988 438C.tmp 4644 4428.tmp 3768 44B5.tmp 772 4532.tmp 3392 462C.tmp 912 46D8.tmp 2860 4793.tmp 4856 4820.tmp 812 48DB.tmp 1680 4968.tmp 4884 4A04.tmp 4396 4A91.tmp 4748 4B1D.tmp 4716 4C08.tmp 1332 4C85.tmp 4544 4D21.tmp 5112 4DAE.tmp 3560 4E5A.tmp 4332 4EC7.tmp 4688 4F54.tmp 1628 4FD1.tmp 4276 506D.tmp 2952 50EA.tmp 4952 5186.tmp 3928 5222.tmp 2604 52BF.tmp 2152 534B.tmp 876 53D8.tmp 2424 5474.tmp 808 5501.tmp 3676 558D.tmp 2116 562A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1360 1620 666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe 80 PID 1620 wrote to memory of 1360 1620 666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe 80 PID 1620 wrote to memory of 1360 1620 666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe 80 PID 1360 wrote to memory of 4472 1360 2759.tmp 81 PID 1360 wrote to memory of 4472 1360 2759.tmp 81 PID 1360 wrote to memory of 4472 1360 2759.tmp 81 PID 4472 wrote to memory of 3364 4472 28A1.tmp 82 PID 4472 wrote to memory of 3364 4472 28A1.tmp 82 PID 4472 wrote to memory of 3364 4472 28A1.tmp 82 PID 3364 wrote to memory of 5028 3364 299B.tmp 83 PID 3364 wrote to memory of 5028 3364 299B.tmp 83 PID 3364 wrote to memory of 5028 3364 299B.tmp 83 PID 5028 wrote to memory of 764 5028 2A57.tmp 84 PID 5028 wrote to memory of 764 5028 2A57.tmp 84 PID 5028 wrote to memory of 764 5028 2A57.tmp 84 PID 764 wrote to memory of 4300 764 2B22.tmp 85 PID 764 wrote to memory of 4300 764 2B22.tmp 85 PID 764 wrote to memory of 4300 764 2B22.tmp 85 PID 4300 wrote to memory of 2684 4300 2C0C.tmp 86 PID 4300 wrote to memory of 2684 4300 2C0C.tmp 86 PID 4300 wrote to memory of 2684 4300 2C0C.tmp 86 PID 2684 wrote to memory of 1124 2684 2CC8.tmp 87 PID 2684 wrote to memory of 1124 2684 2CC8.tmp 87 PID 2684 wrote to memory of 1124 2684 2CC8.tmp 87 PID 1124 wrote to memory of 3604 1124 2DC2.tmp 88 PID 1124 wrote to memory of 3604 1124 2DC2.tmp 88 PID 1124 wrote to memory of 3604 1124 2DC2.tmp 88 PID 3604 wrote to memory of 1956 3604 2E8D.tmp 89 PID 3604 wrote to memory of 1956 3604 2E8D.tmp 89 PID 3604 wrote to memory of 1956 3604 2E8D.tmp 89 PID 1956 wrote to memory of 400 1956 2F58.tmp 90 PID 1956 wrote to memory of 400 1956 2F58.tmp 90 PID 1956 wrote to memory of 400 1956 2F58.tmp 90 PID 400 wrote to memory of 1484 400 2FF4.tmp 91 PID 400 wrote to memory of 1484 400 2FF4.tmp 91 PID 400 wrote to memory of 1484 400 2FF4.tmp 91 PID 1484 wrote to memory of 4024 1484 30EE.tmp 92 PID 1484 wrote to memory of 4024 1484 30EE.tmp 92 PID 1484 wrote to memory of 4024 1484 30EE.tmp 92 PID 4024 wrote to memory of 3424 4024 31C9.tmp 93 PID 4024 wrote to memory of 3424 4024 31C9.tmp 93 PID 4024 wrote to memory of 3424 4024 31C9.tmp 93 PID 3424 wrote to memory of 4732 3424 3294.tmp 94 PID 3424 wrote to memory of 4732 3424 3294.tmp 94 PID 3424 wrote to memory of 4732 3424 3294.tmp 94 PID 4732 wrote to memory of 2900 4732 336F.tmp 95 PID 4732 wrote to memory of 2900 4732 336F.tmp 95 PID 4732 wrote to memory of 2900 4732 336F.tmp 95 PID 2900 wrote to memory of 1180 2900 3469.tmp 96 PID 2900 wrote to memory of 1180 2900 3469.tmp 96 PID 2900 wrote to memory of 1180 2900 3469.tmp 96 PID 1180 wrote to memory of 1656 1180 35FF.tmp 98 PID 1180 wrote to memory of 1656 1180 35FF.tmp 98 PID 1180 wrote to memory of 1656 1180 35FF.tmp 98 PID 1656 wrote to memory of 3564 1656 36DA.tmp 99 PID 1656 wrote to memory of 3564 1656 36DA.tmp 99 PID 1656 wrote to memory of 3564 1656 36DA.tmp 99 PID 3564 wrote to memory of 1220 3564 3832.tmp 100 PID 3564 wrote to memory of 1220 3564 3832.tmp 100 PID 3564 wrote to memory of 1220 3564 3832.tmp 100 PID 1220 wrote to memory of 4796 1220 38BE.tmp 101 PID 1220 wrote to memory of 4796 1220 38BE.tmp 101 PID 1220 wrote to memory of 4796 1220 38BE.tmp 101 PID 4796 wrote to memory of 4924 4796 39B8.tmp 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\666060f959bd3c9c431689d7157d8b2a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\28A1.tmp"C:\Users\Admin\AppData\Local\Temp\28A1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\299B.tmp"C:\Users\Admin\AppData\Local\Temp\299B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\2CC8.tmp"C:\Users\Admin\AppData\Local\Temp\2CC8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\2F58.tmp"C:\Users\Admin\AppData\Local\Temp\2F58.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\30EE.tmp"C:\Users\Admin\AppData\Local\Temp\30EE.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3294.tmp"C:\Users\Admin\AppData\Local\Temp\3294.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3832.tmp"C:\Users\Admin\AppData\Local\Temp\3832.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\38BE.tmp"C:\Users\Admin\AppData\Local\Temp\38BE.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"23⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"24⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\3C49.tmp"C:\Users\Admin\AppData\Local\Temp\3C49.tmp"25⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"26⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"27⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"28⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"29⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"30⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"31⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\41D6.tmp"C:\Users\Admin\AppData\Local\Temp\41D6.tmp"32⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"33⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\438C.tmp"C:\Users\Admin\AppData\Local\Temp\438C.tmp"34⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"35⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"36⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"37⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"38⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"39⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"40⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\4820.tmp"C:\Users\Admin\AppData\Local\Temp\4820.tmp"41⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\48DB.tmp"C:\Users\Admin\AppData\Local\Temp\48DB.tmp"42⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\4968.tmp"C:\Users\Admin\AppData\Local\Temp\4968.tmp"43⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"44⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"45⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"46⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\4C08.tmp"C:\Users\Admin\AppData\Local\Temp\4C08.tmp"47⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\4C85.tmp"C:\Users\Admin\AppData\Local\Temp\4C85.tmp"48⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\4D21.tmp"C:\Users\Admin\AppData\Local\Temp\4D21.tmp"49⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"50⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"51⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"52⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"53⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"54⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\506D.tmp"C:\Users\Admin\AppData\Local\Temp\506D.tmp"55⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\50EA.tmp"C:\Users\Admin\AppData\Local\Temp\50EA.tmp"56⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\5186.tmp"C:\Users\Admin\AppData\Local\Temp\5186.tmp"57⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"58⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"59⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"60⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"61⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\5474.tmp"C:\Users\Admin\AppData\Local\Temp\5474.tmp"62⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\5501.tmp"C:\Users\Admin\AppData\Local\Temp\5501.tmp"63⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\558D.tmp"C:\Users\Admin\AppData\Local\Temp\558D.tmp"64⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\562A.tmp"C:\Users\Admin\AppData\Local\Temp\562A.tmp"65⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\5697.tmp"C:\Users\Admin\AppData\Local\Temp\5697.tmp"66⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\5714.tmp"C:\Users\Admin\AppData\Local\Temp\5714.tmp"67⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"68⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\580E.tmp"C:\Users\Admin\AppData\Local\Temp\580E.tmp"69⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"70⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\5908.tmp"C:\Users\Admin\AppData\Local\Temp\5908.tmp"71⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"72⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"73⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\5A60.tmp"C:\Users\Admin\AppData\Local\Temp\5A60.tmp"74⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"75⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"76⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"77⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\5C63.tmp"C:\Users\Admin\AppData\Local\Temp\5C63.tmp"78⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\5CD1.tmp"C:\Users\Admin\AppData\Local\Temp\5CD1.tmp"79⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"80⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"81⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\5E38.tmp"C:\Users\Admin\AppData\Local\Temp\5E38.tmp"82⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"83⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\5F32.tmp"C:\Users\Admin\AppData\Local\Temp\5F32.tmp"84⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"85⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\602C.tmp"C:\Users\Admin\AppData\Local\Temp\602C.tmp"86⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\60A9.tmp"C:\Users\Admin\AppData\Local\Temp\60A9.tmp"87⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"88⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\61A3.tmp"C:\Users\Admin\AppData\Local\Temp\61A3.tmp"89⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"90⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"91⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"92⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"93⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\6424.tmp"C:\Users\Admin\AppData\Local\Temp\6424.tmp"94⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"95⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\654D.tmp"C:\Users\Admin\AppData\Local\Temp\654D.tmp"96⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"97⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"98⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\66D3.tmp"C:\Users\Admin\AppData\Local\Temp\66D3.tmp"99⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\678F.tmp"C:\Users\Admin\AppData\Local\Temp\678F.tmp"100⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\681B.tmp"C:\Users\Admin\AppData\Local\Temp\681B.tmp"101⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\68A8.tmp"C:\Users\Admin\AppData\Local\Temp\68A8.tmp"102⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\6925.tmp"C:\Users\Admin\AppData\Local\Temp\6925.tmp"103⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\69B2.tmp"C:\Users\Admin\AppData\Local\Temp\69B2.tmp"104⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\6A1F.tmp"C:\Users\Admin\AppData\Local\Temp\6A1F.tmp"105⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"106⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"107⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"108⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\6C71.tmp"C:\Users\Admin\AppData\Local\Temp\6C71.tmp"109⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"110⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"111⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"112⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"113⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\7059.tmp"C:\Users\Admin\AppData\Local\Temp\7059.tmp"114⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\70C6.tmp"C:\Users\Admin\AppData\Local\Temp\70C6.tmp"115⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"116⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\71D0.tmp"C:\Users\Admin\AppData\Local\Temp\71D0.tmp"117⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\729B.tmp"C:\Users\Admin\AppData\Local\Temp\729B.tmp"118⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\7318.tmp"C:\Users\Admin\AppData\Local\Temp\7318.tmp"119⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"120⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"121⤵PID:260
-
C:\Users\Admin\AppData\Local\Temp\74BE.tmp"C:\Users\Admin\AppData\Local\Temp\74BE.tmp"122⤵PID:5028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-