Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 18:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe
Resource
win10v2004-20230824-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe
-
Size
486KB
-
MD5
b94fb5b804adb5a7ae73b04e528da870
-
SHA1
c48a8ce06e92fd9f3d78f6fb2a4bad7916e7c6ae
-
SHA256
8d5ac6e6bab9bab66c50475ea76ef56523886a11ecb430343f00a2d88d07d707
-
SHA512
8116b3eb5f8273d0f5e0412bea3332cbed6354f0755e9beac6cb21d3685048bea303cc63f742d041fd72786df5b0c4955f77cac9eabe7967d7b1531aebb6a800
-
SSDEEP
12288:UU5rCOTeiDL6t7SxSSuU2d7MsTz0CfNZ:UUQOJDk7SxSSqdr9N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5088 FDA9.tmp 4060 1C0.tmp 4148 1DB4.tmp 4360 1F99.tmp 4656 2035.tmp 372 20E1.tmp 4928 21AC.tmp 4444 2239.tmp 3416 2313.tmp 1708 23FE.tmp 2924 24D9.tmp 3732 25D3.tmp 2552 26AD.tmp 3836 27B7.tmp 4672 28D0.tmp 4740 2A18.tmp 2548 2B9F.tmp 1160 2CA9.tmp 2236 2ECB.tmp 3928 3042.tmp 2136 315C.tmp 1556 3275.tmp 2192 336F.tmp 216 3459.tmp 4916 35F0.tmp 4568 369B.tmp 1016 3786.tmp 5040 3880.tmp 3448 396A.tmp 3712 3A06.tmp 2156 3B10.tmp 4124 3C39.tmp 4068 3D04.tmp 4684 3E4C.tmp 4268 3F27.tmp 4680 414A.tmp 4476 41E6.tmp 2180 42A2.tmp 1552 434D.tmp 3648 4467.tmp 1092 4551.tmp 2816 467A.tmp 2952 4784.tmp 2336 489D.tmp 4284 49A6.tmp 4688 4A81.tmp 1072 4B0E.tmp 5088 4C27.tmp 5056 4CA4.tmp 2304 4F25.tmp 4908 503E.tmp 404 5119.tmp 4148 5213.tmp 4988 5407.tmp 1884 54C2.tmp 436 55CC.tmp 372 56D5.tmp 2100 57C0.tmp 1876 5927.tmp 3048 5ACD.tmp 3416 5BC7.tmp 1460 5C63.tmp 3528 5D00.tmp 1312 5D7D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 5088 1072 b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe 85 PID 1072 wrote to memory of 5088 1072 b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe 85 PID 1072 wrote to memory of 5088 1072 b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe 85 PID 5088 wrote to memory of 4060 5088 FDA9.tmp 87 PID 5088 wrote to memory of 4060 5088 FDA9.tmp 87 PID 5088 wrote to memory of 4060 5088 FDA9.tmp 87 PID 4060 wrote to memory of 4148 4060 1C0.tmp 88 PID 4060 wrote to memory of 4148 4060 1C0.tmp 88 PID 4060 wrote to memory of 4148 4060 1C0.tmp 88 PID 4148 wrote to memory of 4360 4148 1DB4.tmp 89 PID 4148 wrote to memory of 4360 4148 1DB4.tmp 89 PID 4148 wrote to memory of 4360 4148 1DB4.tmp 89 PID 4360 wrote to memory of 4656 4360 1F99.tmp 90 PID 4360 wrote to memory of 4656 4360 1F99.tmp 90 PID 4360 wrote to memory of 4656 4360 1F99.tmp 90 PID 4656 wrote to memory of 372 4656 2035.tmp 91 PID 4656 wrote to memory of 372 4656 2035.tmp 91 PID 4656 wrote to memory of 372 4656 2035.tmp 91 PID 372 wrote to memory of 4928 372 20E1.tmp 92 PID 372 wrote to memory of 4928 372 20E1.tmp 92 PID 372 wrote to memory of 4928 372 20E1.tmp 92 PID 4928 wrote to memory of 4444 4928 21AC.tmp 93 PID 4928 wrote to memory of 4444 4928 21AC.tmp 93 PID 4928 wrote to memory of 4444 4928 21AC.tmp 93 PID 4444 wrote to memory of 3416 4444 2239.tmp 94 PID 4444 wrote to memory of 3416 4444 2239.tmp 94 PID 4444 wrote to memory of 3416 4444 2239.tmp 94 PID 3416 wrote to memory of 1708 3416 2313.tmp 95 PID 3416 wrote to memory of 1708 3416 2313.tmp 95 PID 3416 wrote to memory of 1708 3416 2313.tmp 95 PID 1708 wrote to memory of 2924 1708 23FE.tmp 96 PID 1708 wrote to memory of 2924 1708 23FE.tmp 96 PID 1708 wrote to memory of 2924 1708 23FE.tmp 96 PID 2924 wrote to memory of 3732 2924 24D9.tmp 97 PID 2924 wrote to memory of 3732 2924 24D9.tmp 97 PID 2924 wrote to memory of 3732 2924 24D9.tmp 97 PID 3732 wrote to memory of 2552 3732 25D3.tmp 99 PID 3732 wrote to memory of 2552 3732 25D3.tmp 99 PID 3732 wrote to memory of 2552 3732 25D3.tmp 99 PID 2552 wrote to memory of 3836 2552 26AD.tmp 100 PID 2552 wrote to memory of 3836 2552 26AD.tmp 100 PID 2552 wrote to memory of 3836 2552 26AD.tmp 100 PID 3836 wrote to memory of 4672 3836 27B7.tmp 101 PID 3836 wrote to memory of 4672 3836 27B7.tmp 101 PID 3836 wrote to memory of 4672 3836 27B7.tmp 101 PID 4672 wrote to memory of 4740 4672 28D0.tmp 102 PID 4672 wrote to memory of 4740 4672 28D0.tmp 102 PID 4672 wrote to memory of 4740 4672 28D0.tmp 102 PID 4740 wrote to memory of 2548 4740 2A18.tmp 103 PID 4740 wrote to memory of 2548 4740 2A18.tmp 103 PID 4740 wrote to memory of 2548 4740 2A18.tmp 103 PID 2548 wrote to memory of 1160 2548 2B9F.tmp 104 PID 2548 wrote to memory of 1160 2548 2B9F.tmp 104 PID 2548 wrote to memory of 1160 2548 2B9F.tmp 104 PID 1160 wrote to memory of 2236 1160 2CA9.tmp 105 PID 1160 wrote to memory of 2236 1160 2CA9.tmp 105 PID 1160 wrote to memory of 2236 1160 2CA9.tmp 105 PID 2236 wrote to memory of 3928 2236 2ECB.tmp 106 PID 2236 wrote to memory of 3928 2236 2ECB.tmp 106 PID 2236 wrote to memory of 3928 2236 2ECB.tmp 106 PID 3928 wrote to memory of 2136 3928 3042.tmp 107 PID 3928 wrote to memory of 2136 3928 3042.tmp 107 PID 3928 wrote to memory of 2136 3928 3042.tmp 107 PID 2136 wrote to memory of 1556 2136 315C.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\b94fb5b804adb5a7ae73b04e528da870_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"C:\Users\Admin\AppData\Local\Temp\FDA9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\1C0.tmp"C:\Users\Admin\AppData\Local\Temp\1C0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\21AC.tmp"C:\Users\Admin\AppData\Local\Temp\21AC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\2239.tmp"C:\Users\Admin\AppData\Local\Temp\2239.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\2313.tmp"C:\Users\Admin\AppData\Local\Temp\2313.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\25D3.tmp"C:\Users\Admin\AppData\Local\Temp\25D3.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\28D0.tmp"C:\Users\Admin\AppData\Local\Temp\28D0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\2A18.tmp"C:\Users\Admin\AppData\Local\Temp\2A18.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\315C.tmp"C:\Users\Admin\AppData\Local\Temp\315C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\3275.tmp"C:\Users\Admin\AppData\Local\Temp\3275.tmp"23⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"24⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"25⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"26⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"27⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"28⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"29⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\396A.tmp"C:\Users\Admin\AppData\Local\Temp\396A.tmp"30⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"31⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3B10.tmp"C:\Users\Admin\AppData\Local\Temp\3B10.tmp"32⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3C39.tmp"C:\Users\Admin\AppData\Local\Temp\3C39.tmp"33⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\3D04.tmp"C:\Users\Admin\AppData\Local\Temp\3D04.tmp"34⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"35⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3F27.tmp"C:\Users\Admin\AppData\Local\Temp\3F27.tmp"36⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"37⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\41E6.tmp"C:\Users\Admin\AppData\Local\Temp\41E6.tmp"38⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"39⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"40⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\4467.tmp"C:\Users\Admin\AppData\Local\Temp\4467.tmp"41⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"42⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"43⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"44⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\489D.tmp"C:\Users\Admin\AppData\Local\Temp\489D.tmp"45⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"46⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"47⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"48⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\4C27.tmp"C:\Users\Admin\AppData\Local\Temp\4C27.tmp"49⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"50⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\4F25.tmp"C:\Users\Admin\AppData\Local\Temp\4F25.tmp"51⤵
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\503E.tmp"C:\Users\Admin\AppData\Local\Temp\503E.tmp"52⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\5119.tmp"C:\Users\Admin\AppData\Local\Temp\5119.tmp"53⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"54⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"55⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\54C2.tmp"C:\Users\Admin\AppData\Local\Temp\54C2.tmp"56⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"57⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"58⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\57C0.tmp"C:\Users\Admin\AppData\Local\Temp\57C0.tmp"59⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\5927.tmp"C:\Users\Admin\AppData\Local\Temp\5927.tmp"60⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"61⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"62⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\5C63.tmp"C:\Users\Admin\AppData\Local\Temp\5C63.tmp"63⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\5D00.tmp"C:\Users\Admin\AppData\Local\Temp\5D00.tmp"64⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"65⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\5E19.tmp"C:\Users\Admin\AppData\Local\Temp\5E19.tmp"66⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\5F90.tmp"C:\Users\Admin\AppData\Local\Temp\5F90.tmp"67⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\606B.tmp"C:\Users\Admin\AppData\Local\Temp\606B.tmp"68⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"69⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"70⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\62EB.tmp"C:\Users\Admin\AppData\Local\Temp\62EB.tmp"71⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\63A7.tmp"C:\Users\Admin\AppData\Local\Temp\63A7.tmp"72⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\6424.tmp"C:\Users\Admin\AppData\Local\Temp\6424.tmp"73⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"74⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\6647.tmp"C:\Users\Admin\AppData\Local\Temp\6647.tmp"75⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\66B4.tmp"C:\Users\Admin\AppData\Local\Temp\66B4.tmp"76⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\6741.tmp"C:\Users\Admin\AppData\Local\Temp\6741.tmp"77⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\67EC.tmp"C:\Users\Admin\AppData\Local\Temp\67EC.tmp"78⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\6869.tmp"C:\Users\Admin\AppData\Local\Temp\6869.tmp"79⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\68E6.tmp"C:\Users\Admin\AppData\Local\Temp\68E6.tmp"80⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\6973.tmp"C:\Users\Admin\AppData\Local\Temp\6973.tmp"81⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"82⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"83⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\6B48.tmp"C:\Users\Admin\AppData\Local\Temp\6B48.tmp"84⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"85⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\6C23.tmp"C:\Users\Admin\AppData\Local\Temp\6C23.tmp"86⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"87⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"88⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"89⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\6E45.tmp"C:\Users\Admin\AppData\Local\Temp\6E45.tmp"90⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"91⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\6FEB.tmp"C:\Users\Admin\AppData\Local\Temp\6FEB.tmp"92⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"93⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\7105.tmp"C:\Users\Admin\AppData\Local\Temp\7105.tmp"94⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\7172.tmp"C:\Users\Admin\AppData\Local\Temp\7172.tmp"95⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"96⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\72AA.tmp"C:\Users\Admin\AppData\Local\Temp\72AA.tmp"97⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\7318.tmp"C:\Users\Admin\AppData\Local\Temp\7318.tmp"98⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"99⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\7441.tmp"C:\Users\Admin\AppData\Local\Temp\7441.tmp"100⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\74DD.tmp"C:\Users\Admin\AppData\Local\Temp\74DD.tmp"101⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\755A.tmp"C:\Users\Admin\AppData\Local\Temp\755A.tmp"102⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\75E7.tmp"C:\Users\Admin\AppData\Local\Temp\75E7.tmp"103⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\7692.tmp"C:\Users\Admin\AppData\Local\Temp\7692.tmp"104⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\7700.tmp"C:\Users\Admin\AppData\Local\Temp\7700.tmp"105⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\777D.tmp"C:\Users\Admin\AppData\Local\Temp\777D.tmp"106⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\77FA.tmp"C:\Users\Admin\AppData\Local\Temp\77FA.tmp"107⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\7877.tmp"C:\Users\Admin\AppData\Local\Temp\7877.tmp"108⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\7903.tmp"C:\Users\Admin\AppData\Local\Temp\7903.tmp"109⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\79AF.tmp"C:\Users\Admin\AppData\Local\Temp\79AF.tmp"110⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"111⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"112⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\7B26.tmp"C:\Users\Admin\AppData\Local\Temp\7B26.tmp"113⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"114⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\7C20.tmp"C:\Users\Admin\AppData\Local\Temp\7C20.tmp"115⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"116⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\7CFB.tmp"C:\Users\Admin\AppData\Local\Temp\7CFB.tmp"117⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"118⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\7E34.tmp"C:\Users\Admin\AppData\Local\Temp\7E34.tmp"119⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\7EC0.tmp"C:\Users\Admin\AppData\Local\Temp\7EC0.tmp"120⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\7F2E.tmp"C:\Users\Admin\AppData\Local\Temp\7F2E.tmp"121⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"122⤵PID:488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-