Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 13:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe
Resource
win7-20230824-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe
-
Size
486KB
-
MD5
a171bec231fe412f2dfc6a7aecbbebda
-
SHA1
ea895ee135a33431c8c111aa833d4265610e53be
-
SHA256
02f04100ff7a103daa1f91ae8628b0aa99c0daef1f9cfe0ee2356e06472fa7fb
-
SHA512
a101995c738f31954900c1416f0b75b91ed029b5cd6ba587fdbea80fe4c831eb103fca1bb8083e128bc394a7f9dfba54a3e5012bf9c25733007b97a9c1154a59
-
SSDEEP
12288:/U5rCOTeiDyhjv0G/3y1681koQ4FIgQENZ:/UQOJDy5vVq16yN2gbN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4688 B602.tmp 5040 B6FC.tmp 3800 B7A7.tmp 3008 B8A1.tmp 876 B95D.tmp 1836 BA57.tmp 3300 BB51.tmp 4036 BC0C.tmp 2376 BCD8.tmp 1440 BDF1.tmp 1988 BE9D.tmp 4488 BF49.tmp 3408 C043.tmp 2028 C265.tmp 1992 C331.tmp 2020 C40B.tmp 2016 C4B7.tmp 2796 C592.tmp 616 C69C.tmp 3952 C747.tmp 1156 C851.tmp 4948 C95B.tmp 5048 CA16.tmp 2440 CAD2.tmp 3988 CB8D.tmp 5012 CCC6.tmp 1864 CD91.tmp 4552 CE5C.tmp 4216 CF94.tmp 3416 D0AE.tmp 3616 D198.tmp 4936 D273.tmp 4152 D36D.tmp 220 D409.tmp 3308 D580.tmp 3420 D61C.tmp 3476 D699.tmp 2564 D707.tmp 3076 D7A3.tmp 2276 D830.tmp 1312 D8FB.tmp 4032 D9A7.tmp 4576 DA43.tmp 2384 DAEF.tmp 4456 DBAA.tmp 4380 DC56.tmp 3400 DD12.tmp 1096 DDAE.tmp 1252 DE5A.tmp 2884 DF25.tmp 3760 DFE0.tmp 3932 E08C.tmp 400 E148.tmp 4212 E203.tmp 1780 E2CE.tmp 4688 E35B.tmp 4644 E3D8.tmp 1480 E455.tmp 2452 E4C2.tmp 1144 E530.tmp 264 E5BC.tmp 432 E649.tmp 2984 E6C6.tmp 4252 E743.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4688 4144 a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe 80 PID 4144 wrote to memory of 4688 4144 a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe 80 PID 4144 wrote to memory of 4688 4144 a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe 80 PID 4688 wrote to memory of 5040 4688 B602.tmp 81 PID 4688 wrote to memory of 5040 4688 B602.tmp 81 PID 4688 wrote to memory of 5040 4688 B602.tmp 81 PID 5040 wrote to memory of 3800 5040 B6FC.tmp 82 PID 5040 wrote to memory of 3800 5040 B6FC.tmp 82 PID 5040 wrote to memory of 3800 5040 B6FC.tmp 82 PID 3800 wrote to memory of 3008 3800 B7A7.tmp 83 PID 3800 wrote to memory of 3008 3800 B7A7.tmp 83 PID 3800 wrote to memory of 3008 3800 B7A7.tmp 83 PID 3008 wrote to memory of 876 3008 B8A1.tmp 84 PID 3008 wrote to memory of 876 3008 B8A1.tmp 84 PID 3008 wrote to memory of 876 3008 B8A1.tmp 84 PID 876 wrote to memory of 1836 876 B95D.tmp 85 PID 876 wrote to memory of 1836 876 B95D.tmp 85 PID 876 wrote to memory of 1836 876 B95D.tmp 85 PID 1836 wrote to memory of 3300 1836 BA57.tmp 86 PID 1836 wrote to memory of 3300 1836 BA57.tmp 86 PID 1836 wrote to memory of 3300 1836 BA57.tmp 86 PID 3300 wrote to memory of 4036 3300 BB51.tmp 87 PID 3300 wrote to memory of 4036 3300 BB51.tmp 87 PID 3300 wrote to memory of 4036 3300 BB51.tmp 87 PID 4036 wrote to memory of 2376 4036 BC0C.tmp 88 PID 4036 wrote to memory of 2376 4036 BC0C.tmp 88 PID 4036 wrote to memory of 2376 4036 BC0C.tmp 88 PID 2376 wrote to memory of 1440 2376 BCD8.tmp 90 PID 2376 wrote to memory of 1440 2376 BCD8.tmp 90 PID 2376 wrote to memory of 1440 2376 BCD8.tmp 90 PID 1440 wrote to memory of 1988 1440 BDF1.tmp 91 PID 1440 wrote to memory of 1988 1440 BDF1.tmp 91 PID 1440 wrote to memory of 1988 1440 BDF1.tmp 91 PID 1988 wrote to memory of 4488 1988 BE9D.tmp 92 PID 1988 wrote to memory of 4488 1988 BE9D.tmp 92 PID 1988 wrote to memory of 4488 1988 BE9D.tmp 92 PID 4488 wrote to memory of 3408 4488 BF49.tmp 93 PID 4488 wrote to memory of 3408 4488 BF49.tmp 93 PID 4488 wrote to memory of 3408 4488 BF49.tmp 93 PID 3408 wrote to memory of 2028 3408 C043.tmp 94 PID 3408 wrote to memory of 2028 3408 C043.tmp 94 PID 3408 wrote to memory of 2028 3408 C043.tmp 94 PID 2028 wrote to memory of 1992 2028 C265.tmp 95 PID 2028 wrote to memory of 1992 2028 C265.tmp 95 PID 2028 wrote to memory of 1992 2028 C265.tmp 95 PID 1992 wrote to memory of 2020 1992 C331.tmp 96 PID 1992 wrote to memory of 2020 1992 C331.tmp 96 PID 1992 wrote to memory of 2020 1992 C331.tmp 96 PID 2020 wrote to memory of 2016 2020 C40B.tmp 97 PID 2020 wrote to memory of 2016 2020 C40B.tmp 97 PID 2020 wrote to memory of 2016 2020 C40B.tmp 97 PID 2016 wrote to memory of 2796 2016 C4B7.tmp 100 PID 2016 wrote to memory of 2796 2016 C4B7.tmp 100 PID 2016 wrote to memory of 2796 2016 C4B7.tmp 100 PID 2796 wrote to memory of 616 2796 C592.tmp 101 PID 2796 wrote to memory of 616 2796 C592.tmp 101 PID 2796 wrote to memory of 616 2796 C592.tmp 101 PID 616 wrote to memory of 3952 616 C69C.tmp 102 PID 616 wrote to memory of 3952 616 C69C.tmp 102 PID 616 wrote to memory of 3952 616 C69C.tmp 102 PID 3952 wrote to memory of 1156 3952 C747.tmp 103 PID 3952 wrote to memory of 1156 3952 C747.tmp 103 PID 3952 wrote to memory of 1156 3952 C747.tmp 103 PID 1156 wrote to memory of 4948 1156 C851.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\a171bec231fe412f2dfc6a7aecbbebda_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\B95D.tmp"C:\Users\Admin\AppData\Local\Temp\B95D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\BC0C.tmp"C:\Users\Admin\AppData\Local\Temp\BC0C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\BDF1.tmp"C:\Users\Admin\AppData\Local\Temp\BDF1.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\C043.tmp"C:\Users\Admin\AppData\Local\Temp\C043.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\C40B.tmp"C:\Users\Admin\AppData\Local\Temp\C40B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\C69C.tmp"C:\Users\Admin\AppData\Local\Temp\C69C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\C747.tmp"C:\Users\Admin\AppData\Local\Temp\C747.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\C851.tmp"C:\Users\Admin\AppData\Local\Temp\C851.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"23⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\CA16.tmp"C:\Users\Admin\AppData\Local\Temp\CA16.tmp"24⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\CAD2.tmp"C:\Users\Admin\AppData\Local\Temp\CAD2.tmp"25⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\CB8D.tmp"C:\Users\Admin\AppData\Local\Temp\CB8D.tmp"26⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"27⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\CD91.tmp"C:\Users\Admin\AppData\Local\Temp\CD91.tmp"28⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"29⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\CF94.tmp"C:\Users\Admin\AppData\Local\Temp\CF94.tmp"30⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"31⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\D198.tmp"C:\Users\Admin\AppData\Local\Temp\D198.tmp"32⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"33⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\D36D.tmp"C:\Users\Admin\AppData\Local\Temp\D36D.tmp"34⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\D409.tmp"C:\Users\Admin\AppData\Local\Temp\D409.tmp"35⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"36⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"37⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"38⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\D707.tmp"C:\Users\Admin\AppData\Local\Temp\D707.tmp"39⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"40⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\D830.tmp"C:\Users\Admin\AppData\Local\Temp\D830.tmp"41⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"42⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"43⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\DA43.tmp"C:\Users\Admin\AppData\Local\Temp\DA43.tmp"44⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"45⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"46⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\DC56.tmp"C:\Users\Admin\AppData\Local\Temp\DC56.tmp"47⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"48⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"49⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"50⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"51⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"52⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"53⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"54⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"55⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"56⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"57⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"58⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"59⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"60⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"61⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"62⤵
- Executes dropped EXE
PID:264 -
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"63⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"64⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"65⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"66⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"67⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"68⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\E937.tmp"C:\Users\Admin\AppData\Local\Temp\E937.tmp"69⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"70⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\EA60.tmp"C:\Users\Admin\AppData\Local\Temp\EA60.tmp"71⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\EADD.tmp"C:\Users\Admin\AppData\Local\Temp\EADD.tmp"72⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"73⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"74⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\EC83.tmp"C:\Users\Admin\AppData\Local\Temp\EC83.tmp"75⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\ED0F.tmp"C:\Users\Admin\AppData\Local\Temp\ED0F.tmp"76⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"77⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"78⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"79⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"80⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"81⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\F03C.tmp"C:\Users\Admin\AppData\Local\Temp\F03C.tmp"82⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"83⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\F117.tmp"C:\Users\Admin\AppData\Local\Temp\F117.tmp"84⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"85⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\F23F.tmp"C:\Users\Admin\AppData\Local\Temp\F23F.tmp"86⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"87⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"88⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\F424.tmp"C:\Users\Admin\AppData\Local\Temp\F424.tmp"89⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"90⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"91⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\F618.tmp"C:\Users\Admin\AppData\Local\Temp\F618.tmp"92⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"93⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"94⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"95⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\F84A.tmp"C:\Users\Admin\AppData\Local\Temp\F84A.tmp"96⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"97⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"98⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"99⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\FACB.tmp"C:\Users\Admin\AppData\Local\Temp\FACB.tmp"100⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\FB67.tmp"C:\Users\Admin\AppData\Local\Temp\FB67.tmp"101⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"102⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"103⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"104⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"105⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"106⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"107⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"108⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\97.tmp"C:\Users\Admin\AppData\Local\Temp\97.tmp"109⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"110⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"111⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\24D.tmp"C:\Users\Admin\AppData\Local\Temp\24D.tmp"112⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2D9.tmp"C:\Users\Admin\AppData\Local\Temp\2D9.tmp"113⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\376.tmp"C:\Users\Admin\AppData\Local\Temp\376.tmp"114⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"115⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"116⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"117⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\5F6.tmp"C:\Users\Admin\AppData\Local\Temp\5F6.tmp"118⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"119⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"120⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\7DB.tmp"C:\Users\Admin\AppData\Local\Temp\7DB.tmp"121⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"122⤵PID:1984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-