Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 15:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe
Resource
win10v2004-20230824-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe
-
Size
488KB
-
MD5
bcdc70ab64b63829990d44d2b3be8436
-
SHA1
102c4c3dc4c955e2ced5b645bd29260a51a4f2ea
-
SHA256
86b7cdd9badf9447bcf90174b4f196a0c1d57bab06131cb72c6300f22b21c555
-
SHA512
b70f2bd1910528355486d3a377cfe780c7b23c3b4808fcb40ca04e5e87e20557b6429ac2a7d84bd0aee9ad7c5a20404b8f263f86dd4418f650efbc7f6a2d637f
-
SSDEEP
12288:/U5rCOTeiDX/QV11q0eroTIltEbi43NZ:/UQOJDvqDqx0clsicN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4588 126A.tmp 1532 143F.tmp 2404 2074.tmp 1140 215E.tmp 4484 2258.tmp 1860 22F4.tmp 1032 23BF.tmp 3836 24C9.tmp 4144 2575.tmp 5112 2640.tmp 1624 273A.tmp 4880 27F5.tmp 4704 2892.tmp 2444 295D.tmp 4864 2A28.tmp 2060 2AF3.tmp 4600 2BAF.tmp 3860 2C3B.tmp 4352 2CE7.tmp 4284 2DC2.tmp 2100 2E6E.tmp 2852 2FB6.tmp 1792 3062.tmp 1504 314C.tmp 700 3236.tmp 1976 32F2.tmp 3088 33FC.tmp 2804 3505.tmp 1072 35C1.tmp 1180 369B.tmp 1120 3747.tmp 4552 3851.tmp 1684 38FD.tmp 2604 3999.tmp 1960 3A26.tmp 440 3AB2.tmp 2472 3B2F.tmp 688 3BEB.tmp 860 3CA6.tmp 2288 3D23.tmp 2296 3DB0.tmp 552 3E2D.tmp 1656 3EBA.tmp 3884 3F37.tmp 4680 3FC3.tmp 4780 4050.tmp 2132 4215.tmp 1052 42A2.tmp 4756 434D.tmp 4304 43DA.tmp 4944 4496.tmp 4964 4532.tmp 4436 460D.tmp 3136 46F7.tmp 756 4784.tmp 2084 483F.tmp 3712 48AC.tmp 4608 4958.tmp 4568 4A33.tmp 2284 4AFE.tmp 4292 4D11.tmp 3772 4E88.tmp 952 4F05.tmp 1148 50EA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4588 4536 bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe 84 PID 4536 wrote to memory of 4588 4536 bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe 84 PID 4536 wrote to memory of 4588 4536 bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe 84 PID 4588 wrote to memory of 1532 4588 126A.tmp 85 PID 4588 wrote to memory of 1532 4588 126A.tmp 85 PID 4588 wrote to memory of 1532 4588 126A.tmp 85 PID 1532 wrote to memory of 2404 1532 143F.tmp 86 PID 1532 wrote to memory of 2404 1532 143F.tmp 86 PID 1532 wrote to memory of 2404 1532 143F.tmp 86 PID 2404 wrote to memory of 1140 2404 2074.tmp 87 PID 2404 wrote to memory of 1140 2404 2074.tmp 87 PID 2404 wrote to memory of 1140 2404 2074.tmp 87 PID 1140 wrote to memory of 4484 1140 215E.tmp 88 PID 1140 wrote to memory of 4484 1140 215E.tmp 88 PID 1140 wrote to memory of 4484 1140 215E.tmp 88 PID 4484 wrote to memory of 1860 4484 2258.tmp 89 PID 4484 wrote to memory of 1860 4484 2258.tmp 89 PID 4484 wrote to memory of 1860 4484 2258.tmp 89 PID 1860 wrote to memory of 1032 1860 22F4.tmp 90 PID 1860 wrote to memory of 1032 1860 22F4.tmp 90 PID 1860 wrote to memory of 1032 1860 22F4.tmp 90 PID 1032 wrote to memory of 3836 1032 23BF.tmp 91 PID 1032 wrote to memory of 3836 1032 23BF.tmp 91 PID 1032 wrote to memory of 3836 1032 23BF.tmp 91 PID 3836 wrote to memory of 4144 3836 24C9.tmp 92 PID 3836 wrote to memory of 4144 3836 24C9.tmp 92 PID 3836 wrote to memory of 4144 3836 24C9.tmp 92 PID 4144 wrote to memory of 5112 4144 2575.tmp 93 PID 4144 wrote to memory of 5112 4144 2575.tmp 93 PID 4144 wrote to memory of 5112 4144 2575.tmp 93 PID 5112 wrote to memory of 1624 5112 2640.tmp 94 PID 5112 wrote to memory of 1624 5112 2640.tmp 94 PID 5112 wrote to memory of 1624 5112 2640.tmp 94 PID 1624 wrote to memory of 4880 1624 273A.tmp 95 PID 1624 wrote to memory of 4880 1624 273A.tmp 95 PID 1624 wrote to memory of 4880 1624 273A.tmp 95 PID 4880 wrote to memory of 4704 4880 27F5.tmp 96 PID 4880 wrote to memory of 4704 4880 27F5.tmp 96 PID 4880 wrote to memory of 4704 4880 27F5.tmp 96 PID 4704 wrote to memory of 2444 4704 2892.tmp 97 PID 4704 wrote to memory of 2444 4704 2892.tmp 97 PID 4704 wrote to memory of 2444 4704 2892.tmp 97 PID 2444 wrote to memory of 4864 2444 295D.tmp 98 PID 2444 wrote to memory of 4864 2444 295D.tmp 98 PID 2444 wrote to memory of 4864 2444 295D.tmp 98 PID 4864 wrote to memory of 2060 4864 2A28.tmp 99 PID 4864 wrote to memory of 2060 4864 2A28.tmp 99 PID 4864 wrote to memory of 2060 4864 2A28.tmp 99 PID 2060 wrote to memory of 4600 2060 2AF3.tmp 100 PID 2060 wrote to memory of 4600 2060 2AF3.tmp 100 PID 2060 wrote to memory of 4600 2060 2AF3.tmp 100 PID 4600 wrote to memory of 3860 4600 2BAF.tmp 101 PID 4600 wrote to memory of 3860 4600 2BAF.tmp 101 PID 4600 wrote to memory of 3860 4600 2BAF.tmp 101 PID 3860 wrote to memory of 4352 3860 2C3B.tmp 102 PID 3860 wrote to memory of 4352 3860 2C3B.tmp 102 PID 3860 wrote to memory of 4352 3860 2C3B.tmp 102 PID 4352 wrote to memory of 4284 4352 2CE7.tmp 103 PID 4352 wrote to memory of 4284 4352 2CE7.tmp 103 PID 4352 wrote to memory of 4284 4352 2CE7.tmp 103 PID 4284 wrote to memory of 2100 4284 2DC2.tmp 104 PID 4284 wrote to memory of 2100 4284 2DC2.tmp 104 PID 4284 wrote to memory of 2100 4284 2DC2.tmp 104 PID 2100 wrote to memory of 2852 2100 2E6E.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\bcdc70ab64b63829990d44d2b3be8436_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\126A.tmp"C:\Users\Admin\AppData\Local\Temp\126A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\143F.tmp"C:\Users\Admin\AppData\Local\Temp\143F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\2074.tmp"C:\Users\Admin\AppData\Local\Temp\2074.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\215E.tmp"C:\Users\Admin\AppData\Local\Temp\215E.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\2258.tmp"C:\Users\Admin\AppData\Local\Temp\2258.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\22F4.tmp"C:\Users\Admin\AppData\Local\Temp\22F4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\24C9.tmp"C:\Users\Admin\AppData\Local\Temp\24C9.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\2575.tmp"C:\Users\Admin\AppData\Local\Temp\2575.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"23⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"24⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\314C.tmp"C:\Users\Admin\AppData\Local\Temp\314C.tmp"25⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"26⤵
- Executes dropped EXE
PID:700 -
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"27⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"28⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"29⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"30⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"31⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"32⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"33⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"34⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"35⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"36⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"37⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"38⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"39⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"40⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"41⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"42⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"43⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"44⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3F37.tmp"C:\Users\Admin\AppData\Local\Temp\3F37.tmp"45⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"46⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"47⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\4215.tmp"C:\Users\Admin\AppData\Local\Temp\4215.tmp"48⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"49⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"50⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"51⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\4496.tmp"C:\Users\Admin\AppData\Local\Temp\4496.tmp"52⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"53⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\460D.tmp"C:\Users\Admin\AppData\Local\Temp\460D.tmp"54⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"55⤵
- Executes dropped EXE
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"56⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"57⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\48AC.tmp"C:\Users\Admin\AppData\Local\Temp\48AC.tmp"58⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"59⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\4A33.tmp"C:\Users\Admin\AppData\Local\Temp\4A33.tmp"60⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"61⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"62⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\4E88.tmp"C:\Users\Admin\AppData\Local\Temp\4E88.tmp"63⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\4F05.tmp"C:\Users\Admin\AppData\Local\Temp\4F05.tmp"64⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\50EA.tmp"C:\Users\Admin\AppData\Local\Temp\50EA.tmp"65⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"66⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\5530.tmp"C:\Users\Admin\AppData\Local\Temp\5530.tmp"67⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\5687.tmp"C:\Users\Admin\AppData\Local\Temp\5687.tmp"68⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\5762.tmp"C:\Users\Admin\AppData\Local\Temp\5762.tmp"69⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"70⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\5A60.tmp"C:\Users\Admin\AppData\Local\Temp\5A60.tmp"71⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\5D8C.tmp"C:\Users\Admin\AppData\Local\Temp\5D8C.tmp"72⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\5E38.tmp"C:\Users\Admin\AppData\Local\Temp\5E38.tmp"73⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"74⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\5F80.tmp"C:\Users\Admin\AppData\Local\Temp\5F80.tmp"75⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\6099.tmp"C:\Users\Admin\AppData\Local\Temp\6099.tmp"76⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\629D.tmp"C:\Users\Admin\AppData\Local\Temp\629D.tmp"77⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\631A.tmp"C:\Users\Admin\AppData\Local\Temp\631A.tmp"78⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\64D0.tmp"C:\Users\Admin\AppData\Local\Temp\64D0.tmp"79⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\657B.tmp"C:\Users\Admin\AppData\Local\Temp\657B.tmp"80⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\66F2.tmp"C:\Users\Admin\AppData\Local\Temp\66F2.tmp"81⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\6760.tmp"C:\Users\Admin\AppData\Local\Temp\6760.tmp"82⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\68F6.tmp"C:\Users\Admin\AppData\Local\Temp\68F6.tmp"83⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\6992.tmp"C:\Users\Admin\AppData\Local\Temp\6992.tmp"84⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\6B19.tmp"C:\Users\Admin\AppData\Local\Temp\6B19.tmp"85⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\6C03.tmp"C:\Users\Admin\AppData\Local\Temp\6C03.tmp"86⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"87⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"88⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"89⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\6FAD.tmp"C:\Users\Admin\AppData\Local\Temp\6FAD.tmp"90⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"91⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\7133.tmp"C:\Users\Admin\AppData\Local\Temp\7133.tmp"92⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\7615.tmp"C:\Users\Admin\AppData\Local\Temp\7615.tmp"93⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\7692.tmp"C:\Users\Admin\AppData\Local\Temp\7692.tmp"94⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\773E.tmp"C:\Users\Admin\AppData\Local\Temp\773E.tmp"95⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\77CB.tmp"C:\Users\Admin\AppData\Local\Temp\77CB.tmp"96⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\7A4C.tmp"C:\Users\Admin\AppData\Local\Temp\7A4C.tmp"97⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\7B17.tmp"C:\Users\Admin\AppData\Local\Temp\7B17.tmp"98⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"99⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\7C40.tmp"C:\Users\Admin\AppData\Local\Temp\7C40.tmp"100⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\7D49.tmp"C:\Users\Admin\AppData\Local\Temp\7D49.tmp"101⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\7DC6.tmp"C:\Users\Admin\AppData\Local\Temp\7DC6.tmp"102⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\7E62.tmp"C:\Users\Admin\AppData\Local\Temp\7E62.tmp"103⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\7ED0.tmp"C:\Users\Admin\AppData\Local\Temp\7ED0.tmp"104⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\8028.tmp"C:\Users\Admin\AppData\Local\Temp\8028.tmp"105⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\8095.tmp"C:\Users\Admin\AppData\Local\Temp\8095.tmp"106⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\8122.tmp"C:\Users\Admin\AppData\Local\Temp\8122.tmp"107⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\819F.tmp"C:\Users\Admin\AppData\Local\Temp\819F.tmp"108⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\82D7.tmp"C:\Users\Admin\AppData\Local\Temp\82D7.tmp"109⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\8354.tmp"C:\Users\Admin\AppData\Local\Temp\8354.tmp"110⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"111⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\84AC.tmp"C:\Users\Admin\AppData\Local\Temp\84AC.tmp"112⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\8567.tmp"C:\Users\Admin\AppData\Local\Temp\8567.tmp"113⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\8613.tmp"C:\Users\Admin\AppData\Local\Temp\8613.tmp"114⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\8681.tmp"C:\Users\Admin\AppData\Local\Temp\8681.tmp"115⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\871D.tmp"C:\Users\Admin\AppData\Local\Temp\871D.tmp"116⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\8817.tmp"C:\Users\Admin\AppData\Local\Temp\8817.tmp"117⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\8901.tmp"C:\Users\Admin\AppData\Local\Temp\8901.tmp"118⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\897E.tmp"C:\Users\Admin\AppData\Local\Temp\897E.tmp"119⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\8A1A.tmp"C:\Users\Admin\AppData\Local\Temp\8A1A.tmp"120⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\8B34.tmp"C:\Users\Admin\AppData\Local\Temp\8B34.tmp"121⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\8C1E.tmp"C:\Users\Admin\AppData\Local\Temp\8C1E.tmp"122⤵PID:3136
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-