Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 15:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe
-
Size
520KB
-
MD5
ac78b09dbc62a8b8abe6ccd296055aa5
-
SHA1
74bfaff05e48845bf2790b33a4792857a4e0a516
-
SHA256
76288a2ce941a05b2ec9b1dda489bbf0c49910e8a2148b11a2d8ebf3e800a62c
-
SHA512
40a01bd5513768f1d5a72ef7b8bcd13be7d11e6cd92cfba75d45b8458b6752dccc58098581829f79ead606e0af01ee3badf196975c834c9e01af3576920d080a
-
SSDEEP
6144:pXT6Oq8HBh4huuAOBdRFyh1T55i8fkb46GXvDdf7FyqM/90KfccuRd9HNfLFfTxu:gj8fuxR21t5i8fR6GXpf7lMlJgBbONZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1176 6968.tmp 3288 6A33.tmp 2244 6AEF.tmp 4988 6BBA.tmp 3688 7D8C.tmp 4960 7F90.tmp 4260 801D.tmp 3564 80B9.tmp 2004 8155.tmp 4216 8201.tmp 4528 82FB.tmp 920 8397.tmp 2988 8482.tmp 1328 855C.tmp 3612 8618.tmp 3800 86F3.tmp 2124 878F.tmp 3744 87FC.tmp 4976 8889.tmp 1144 9078.tmp 2188 9308.tmp 2616 93A5.tmp 5036 9470.tmp 4028 94DD.tmp 764 9579.tmp 4532 97DB.tmp 2276 9896.tmp 3576 9971.tmp 500 9A2D.tmp 3260 9AE8.tmp 1912 9F3D.tmp 1808 9FDA.tmp 1756 A0C4.tmp 3616 A21C.tmp 1672 A2C8.tmp 3384 A354.tmp 4996 A400.tmp 4472 A47D.tmp 2740 A519.tmp 2540 A5A6.tmp 220 A70D.tmp 2328 A79A.tmp 2204 A827.tmp 4332 A8A4.tmp 492 A930.tmp 4984 A99E.tmp 996 AB05.tmp 1260 B4F8.tmp 2560 BDD2.tmp 2720 C18B.tmp 4940 C1F8.tmp 3352 C285.tmp 3280 C321.tmp 2836 C3BD.tmp 4320 C459.tmp 3428 C4D6.tmp 2816 C573.tmp 1920 CC68.tmp 2208 CD52.tmp 1508 CDEF.tmp 4528 D040.tmp 920 D09E.tmp 4356 D12B.tmp 5004 D244.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 1176 3672 ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe 82 PID 3672 wrote to memory of 1176 3672 ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe 82 PID 3672 wrote to memory of 1176 3672 ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe 82 PID 1176 wrote to memory of 3288 1176 6968.tmp 83 PID 1176 wrote to memory of 3288 1176 6968.tmp 83 PID 1176 wrote to memory of 3288 1176 6968.tmp 83 PID 3288 wrote to memory of 2244 3288 6A33.tmp 84 PID 3288 wrote to memory of 2244 3288 6A33.tmp 84 PID 3288 wrote to memory of 2244 3288 6A33.tmp 84 PID 2244 wrote to memory of 4988 2244 6AEF.tmp 85 PID 2244 wrote to memory of 4988 2244 6AEF.tmp 85 PID 2244 wrote to memory of 4988 2244 6AEF.tmp 85 PID 4988 wrote to memory of 3688 4988 6BBA.tmp 86 PID 4988 wrote to memory of 3688 4988 6BBA.tmp 86 PID 4988 wrote to memory of 3688 4988 6BBA.tmp 86 PID 3688 wrote to memory of 4960 3688 7D8C.tmp 87 PID 3688 wrote to memory of 4960 3688 7D8C.tmp 87 PID 3688 wrote to memory of 4960 3688 7D8C.tmp 87 PID 4960 wrote to memory of 4260 4960 7F90.tmp 88 PID 4960 wrote to memory of 4260 4960 7F90.tmp 88 PID 4960 wrote to memory of 4260 4960 7F90.tmp 88 PID 4260 wrote to memory of 3564 4260 801D.tmp 89 PID 4260 wrote to memory of 3564 4260 801D.tmp 89 PID 4260 wrote to memory of 3564 4260 801D.tmp 89 PID 3564 wrote to memory of 2004 3564 80B9.tmp 90 PID 3564 wrote to memory of 2004 3564 80B9.tmp 90 PID 3564 wrote to memory of 2004 3564 80B9.tmp 90 PID 2004 wrote to memory of 4216 2004 8155.tmp 91 PID 2004 wrote to memory of 4216 2004 8155.tmp 91 PID 2004 wrote to memory of 4216 2004 8155.tmp 91 PID 4216 wrote to memory of 4528 4216 8201.tmp 92 PID 4216 wrote to memory of 4528 4216 8201.tmp 92 PID 4216 wrote to memory of 4528 4216 8201.tmp 92 PID 4528 wrote to memory of 920 4528 82FB.tmp 93 PID 4528 wrote to memory of 920 4528 82FB.tmp 93 PID 4528 wrote to memory of 920 4528 82FB.tmp 93 PID 920 wrote to memory of 2988 920 8397.tmp 94 PID 920 wrote to memory of 2988 920 8397.tmp 94 PID 920 wrote to memory of 2988 920 8397.tmp 94 PID 2988 wrote to memory of 1328 2988 8482.tmp 95 PID 2988 wrote to memory of 1328 2988 8482.tmp 95 PID 2988 wrote to memory of 1328 2988 8482.tmp 95 PID 1328 wrote to memory of 3612 1328 855C.tmp 96 PID 1328 wrote to memory of 3612 1328 855C.tmp 96 PID 1328 wrote to memory of 3612 1328 855C.tmp 96 PID 3612 wrote to memory of 3800 3612 8618.tmp 97 PID 3612 wrote to memory of 3800 3612 8618.tmp 97 PID 3612 wrote to memory of 3800 3612 8618.tmp 97 PID 3800 wrote to memory of 2124 3800 86F3.tmp 100 PID 3800 wrote to memory of 2124 3800 86F3.tmp 100 PID 3800 wrote to memory of 2124 3800 86F3.tmp 100 PID 2124 wrote to memory of 3744 2124 878F.tmp 101 PID 2124 wrote to memory of 3744 2124 878F.tmp 101 PID 2124 wrote to memory of 3744 2124 878F.tmp 101 PID 3744 wrote to memory of 4976 3744 87FC.tmp 102 PID 3744 wrote to memory of 4976 3744 87FC.tmp 102 PID 3744 wrote to memory of 4976 3744 87FC.tmp 102 PID 4976 wrote to memory of 1144 4976 8889.tmp 104 PID 4976 wrote to memory of 1144 4976 8889.tmp 104 PID 4976 wrote to memory of 1144 4976 8889.tmp 104 PID 1144 wrote to memory of 2188 1144 9078.tmp 105 PID 1144 wrote to memory of 2188 1144 9078.tmp 105 PID 1144 wrote to memory of 2188 1144 9078.tmp 105 PID 2188 wrote to memory of 2616 2188 9308.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\ac78b09dbc62a8b8abe6ccd296055aa5_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\6968.tmp"C:\Users\Admin\AppData\Local\Temp\6968.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\6A33.tmp"C:\Users\Admin\AppData\Local\Temp\6A33.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"C:\Users\Admin\AppData\Local\Temp\6AEF.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\7F90.tmp"C:\Users\Admin\AppData\Local\Temp\7F90.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\801D.tmp"C:\Users\Admin\AppData\Local\Temp\801D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\8201.tmp"C:\Users\Admin\AppData\Local\Temp\8201.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\82FB.tmp"C:\Users\Admin\AppData\Local\Temp\82FB.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\8397.tmp"C:\Users\Admin\AppData\Local\Temp\8397.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\855C.tmp"C:\Users\Admin\AppData\Local\Temp\855C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\8618.tmp"C:\Users\Admin\AppData\Local\Temp\8618.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\87FC.tmp"C:\Users\Admin\AppData\Local\Temp\87FC.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\9308.tmp"C:\Users\Admin\AppData\Local\Temp\9308.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\93A5.tmp"C:\Users\Admin\AppData\Local\Temp\93A5.tmp"23⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\9470.tmp"C:\Users\Admin\AppData\Local\Temp\9470.tmp"24⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"25⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\9579.tmp"C:\Users\Admin\AppData\Local\Temp\9579.tmp"26⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\97DB.tmp"C:\Users\Admin\AppData\Local\Temp\97DB.tmp"27⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\9896.tmp"C:\Users\Admin\AppData\Local\Temp\9896.tmp"28⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\9971.tmp"C:\Users\Admin\AppData\Local\Temp\9971.tmp"29⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"30⤵
- Executes dropped EXE
PID:500 -
C:\Users\Admin\AppData\Local\Temp\9AE8.tmp"C:\Users\Admin\AppData\Local\Temp\9AE8.tmp"31⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"32⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"33⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"34⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"35⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"36⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\A354.tmp"C:\Users\Admin\AppData\Local\Temp\A354.tmp"37⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\A400.tmp"C:\Users\Admin\AppData\Local\Temp\A400.tmp"38⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\A47D.tmp"C:\Users\Admin\AppData\Local\Temp\A47D.tmp"39⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\A519.tmp"C:\Users\Admin\AppData\Local\Temp\A519.tmp"40⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"41⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\A70D.tmp"C:\Users\Admin\AppData\Local\Temp\A70D.tmp"42⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"43⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"44⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"45⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\A930.tmp"C:\Users\Admin\AppData\Local\Temp\A930.tmp"46⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\A99E.tmp"C:\Users\Admin\AppData\Local\Temp\A99E.tmp"47⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\AB05.tmp"C:\Users\Admin\AppData\Local\Temp\AB05.tmp"48⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"49⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"50⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"51⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"52⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"53⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\C321.tmp"C:\Users\Admin\AppData\Local\Temp\C321.tmp"54⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"55⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\C459.tmp"C:\Users\Admin\AppData\Local\Temp\C459.tmp"56⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"57⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\C573.tmp"C:\Users\Admin\AppData\Local\Temp\C573.tmp"58⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"59⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"60⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"61⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"62⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\D09E.tmp"C:\Users\Admin\AppData\Local\Temp\D09E.tmp"63⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\D12B.tmp"C:\Users\Admin\AppData\Local\Temp\D12B.tmp"64⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"65⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"66⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\D6A9.tmp"C:\Users\Admin\AppData\Local\Temp\D6A9.tmp"67⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"68⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"69⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"70⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"71⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\EB89.tmp"C:\Users\Admin\AppData\Local\Temp\EB89.tmp"72⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\EC25.tmp"C:\Users\Admin\AppData\Local\Temp\EC25.tmp"73⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"74⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"75⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"76⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\402.tmp"C:\Users\Admin\AppData\Local\Temp\402.tmp"77⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\80A.tmp"C:\Users\Admin\AppData\Local\Temp\80A.tmp"78⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"79⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\AD8.tmp"C:\Users\Admin\AppData\Local\Temp\AD8.tmp"80⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"81⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"82⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\15D5.tmp"C:\Users\Admin\AppData\Local\Temp\15D5.tmp"83⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\1865.tmp"C:\Users\Admin\AppData\Local\Temp\1865.tmp"84⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"85⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"86⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\27E6.tmp"C:\Users\Admin\AppData\Local\Temp\27E6.tmp"87⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\2882.tmp"C:\Users\Admin\AppData\Local\Temp\2882.tmp"88⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2A76.tmp"C:\Users\Admin\AppData\Local\Temp\2A76.tmp"89⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\2CB8.tmp"C:\Users\Admin\AppData\Local\Temp\2CB8.tmp"90⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"91⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"92⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"93⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"94⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"95⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\37E4.tmp"C:\Users\Admin\AppData\Local\Temp\37E4.tmp"96⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"97⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"98⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"99⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\4282.tmp"C:\Users\Admin\AppData\Local\Temp\4282.tmp"100⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"101⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\43BB.tmp"C:\Users\Admin\AppData\Local\Temp\43BB.tmp"102⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"103⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"104⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"105⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\45AF.tmp"C:\Users\Admin\AppData\Local\Temp\45AF.tmp"106⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"107⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\46B8.tmp"C:\Users\Admin\AppData\Local\Temp\46B8.tmp"108⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\4735.tmp"C:\Users\Admin\AppData\Local\Temp\4735.tmp"109⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"110⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"111⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"112⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\4997.tmp"C:\Users\Admin\AppData\Local\Temp\4997.tmp"113⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\4A14.tmp"C:\Users\Admin\AppData\Local\Temp\4A14.tmp"114⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"115⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"116⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"117⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"118⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"119⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\4D60.tmp"C:\Users\Admin\AppData\Local\Temp\4D60.tmp"120⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"121⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\4E88.tmp"C:\Users\Admin\AppData\Local\Temp\4E88.tmp"122⤵PID:4044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-