Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 16:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe
Resource
win10v2004-20230824-en
2 signatures
150 seconds
General
-
Target
c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe
-
Size
486KB
-
MD5
c06bf5429679bed69e1da9b412e65f23
-
SHA1
01bbf2f282e06323cfca111855227aca308212e1
-
SHA256
bce7b2f7f22537b4dda1b3e4a14d741ce6fc3136285744230a1ea77f4a20d5ed
-
SHA512
5518f81618631f41592a88a578b3d39790a08969d662290fefd99934e86685f2b5eb111f44591655ab980038e8a451e0e86463b5c7692916d888952e0f9dd681
-
SSDEEP
12288:UU5rCOTeiDNU8EPBxVhYfxuEZmlFuproIo0NZ:UUQOJDS8GxVhYfxuxzYrpo0N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3432 F954.tmp 4492 59.tmp 3384 20E.tmp 2136 2E9.tmp 220 3A5.tmp 4680 4CD.tmp 3672 5A8.tmp 3708 683.tmp 2268 76D.tmp 4460 848.tmp 2372 8F4.tmp 4600 9A0.tmp 3752 A7B.tmp 1256 B07.tmp 1836 BC3.tmp 2096 CBD.tmp 3632 DA7.tmp 2140 EC0.tmp 4176 FAB.tmp 416 1085.tmp 1976 119F.tmp 3932 126A.tmp 1628 1325.tmp 1048 141F.tmp 4748 14EA.tmp 1148 15B6.tmp 3092 1671.tmp 3044 172D.tmp 4136 1807.tmp 3312 196F.tmp 4464 1AB7.tmp 3264 1BD0.tmp 4316 1CBA.tmp 4212 1D47.tmp 2828 1E12.tmp 3208 1EBE.tmp 3976 1F3B.tmp 4744 1FF7.tmp 4124 21FA.tmp 1008 22A6.tmp 4004 2333.tmp 1584 23BF.tmp 2148 24C9.tmp 2672 2575.tmp 3396 2621.tmp 5116 269E.tmp 4164 2788.tmp 4492 2824.tmp 4200 28B1.tmp 936 293E.tmp 1028 29BB.tmp 2280 2A57.tmp 3972 2AF3.tmp 4984 2B8F.tmp 4188 2C2C.tmp 4736 2D06.tmp 2936 2DD1.tmp 2384 2E6E.tmp 3320 2EFA.tmp 1432 2FB6.tmp 1420 30BF.tmp 2392 317B.tmp 4600 3208.tmp 1296 3285.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 3432 1016 c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe 86 PID 1016 wrote to memory of 3432 1016 c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe 86 PID 1016 wrote to memory of 3432 1016 c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe 86 PID 3432 wrote to memory of 4492 3432 F954.tmp 87 PID 3432 wrote to memory of 4492 3432 F954.tmp 87 PID 3432 wrote to memory of 4492 3432 F954.tmp 87 PID 4492 wrote to memory of 3384 4492 59.tmp 88 PID 4492 wrote to memory of 3384 4492 59.tmp 88 PID 4492 wrote to memory of 3384 4492 59.tmp 88 PID 3384 wrote to memory of 2136 3384 20E.tmp 90 PID 3384 wrote to memory of 2136 3384 20E.tmp 90 PID 3384 wrote to memory of 2136 3384 20E.tmp 90 PID 2136 wrote to memory of 220 2136 2E9.tmp 91 PID 2136 wrote to memory of 220 2136 2E9.tmp 91 PID 2136 wrote to memory of 220 2136 2E9.tmp 91 PID 220 wrote to memory of 4680 220 3A5.tmp 92 PID 220 wrote to memory of 4680 220 3A5.tmp 92 PID 220 wrote to memory of 4680 220 3A5.tmp 92 PID 4680 wrote to memory of 3672 4680 4CD.tmp 93 PID 4680 wrote to memory of 3672 4680 4CD.tmp 93 PID 4680 wrote to memory of 3672 4680 4CD.tmp 93 PID 3672 wrote to memory of 3708 3672 5A8.tmp 94 PID 3672 wrote to memory of 3708 3672 5A8.tmp 94 PID 3672 wrote to memory of 3708 3672 5A8.tmp 94 PID 3708 wrote to memory of 2268 3708 683.tmp 95 PID 3708 wrote to memory of 2268 3708 683.tmp 95 PID 3708 wrote to memory of 2268 3708 683.tmp 95 PID 2268 wrote to memory of 4460 2268 76D.tmp 96 PID 2268 wrote to memory of 4460 2268 76D.tmp 96 PID 2268 wrote to memory of 4460 2268 76D.tmp 96 PID 4460 wrote to memory of 2372 4460 848.tmp 97 PID 4460 wrote to memory of 2372 4460 848.tmp 97 PID 4460 wrote to memory of 2372 4460 848.tmp 97 PID 2372 wrote to memory of 4600 2372 8F4.tmp 98 PID 2372 wrote to memory of 4600 2372 8F4.tmp 98 PID 2372 wrote to memory of 4600 2372 8F4.tmp 98 PID 4600 wrote to memory of 3752 4600 9A0.tmp 99 PID 4600 wrote to memory of 3752 4600 9A0.tmp 99 PID 4600 wrote to memory of 3752 4600 9A0.tmp 99 PID 3752 wrote to memory of 1256 3752 A7B.tmp 100 PID 3752 wrote to memory of 1256 3752 A7B.tmp 100 PID 3752 wrote to memory of 1256 3752 A7B.tmp 100 PID 1256 wrote to memory of 1836 1256 B07.tmp 101 PID 1256 wrote to memory of 1836 1256 B07.tmp 101 PID 1256 wrote to memory of 1836 1256 B07.tmp 101 PID 1836 wrote to memory of 2096 1836 BC3.tmp 102 PID 1836 wrote to memory of 2096 1836 BC3.tmp 102 PID 1836 wrote to memory of 2096 1836 BC3.tmp 102 PID 2096 wrote to memory of 3632 2096 CBD.tmp 103 PID 2096 wrote to memory of 3632 2096 CBD.tmp 103 PID 2096 wrote to memory of 3632 2096 CBD.tmp 103 PID 3632 wrote to memory of 2140 3632 DA7.tmp 104 PID 3632 wrote to memory of 2140 3632 DA7.tmp 104 PID 3632 wrote to memory of 2140 3632 DA7.tmp 104 PID 2140 wrote to memory of 4176 2140 EC0.tmp 105 PID 2140 wrote to memory of 4176 2140 EC0.tmp 105 PID 2140 wrote to memory of 4176 2140 EC0.tmp 105 PID 4176 wrote to memory of 416 4176 FAB.tmp 106 PID 4176 wrote to memory of 416 4176 FAB.tmp 106 PID 4176 wrote to memory of 416 4176 FAB.tmp 106 PID 416 wrote to memory of 1976 416 1085.tmp 107 PID 416 wrote to memory of 1976 416 1085.tmp 107 PID 416 wrote to memory of 1976 416 1085.tmp 107 PID 1976 wrote to memory of 3932 1976 119F.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\c06bf5429679bed69e1da9b412e65f23_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\2E9.tmp"C:\Users\Admin\AppData\Local\Temp\2E9.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\683.tmp"C:\Users\Admin\AppData\Local\Temp\683.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\9A0.tmp"C:\Users\Admin\AppData\Local\Temp\9A0.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\B07.tmp"C:\Users\Admin\AppData\Local\Temp\B07.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\DA7.tmp"C:\Users\Admin\AppData\Local\Temp\DA7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\FAB.tmp"C:\Users\Admin\AppData\Local\Temp\FAB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\1085.tmp"C:\Users\Admin\AppData\Local\Temp\1085.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\126A.tmp"C:\Users\Admin\AppData\Local\Temp\126A.tmp"23⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\1325.tmp"C:\Users\Admin\AppData\Local\Temp\1325.tmp"24⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\141F.tmp"C:\Users\Admin\AppData\Local\Temp\141F.tmp"25⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\14EA.tmp"C:\Users\Admin\AppData\Local\Temp\14EA.tmp"26⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\15B6.tmp"C:\Users\Admin\AppData\Local\Temp\15B6.tmp"27⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"28⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\172D.tmp"C:\Users\Admin\AppData\Local\Temp\172D.tmp"29⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"30⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"31⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"32⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"33⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"34⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"35⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\1E12.tmp"C:\Users\Admin\AppData\Local\Temp\1E12.tmp"36⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"37⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\1F3B.tmp"C:\Users\Admin\AppData\Local\Temp\1F3B.tmp"38⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"39⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\21FA.tmp"C:\Users\Admin\AppData\Local\Temp\21FA.tmp"40⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"41⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\2333.tmp"C:\Users\Admin\AppData\Local\Temp\2333.tmp"42⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"43⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"44⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\24C9.tmp"C:\Users\Admin\AppData\Local\Temp\24C9.tmp"45⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\2575.tmp"C:\Users\Admin\AppData\Local\Temp\2575.tmp"46⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"47⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\269E.tmp"C:\Users\Admin\AppData\Local\Temp\269E.tmp"48⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"49⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"50⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"51⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"52⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\29BB.tmp"C:\Users\Admin\AppData\Local\Temp\29BB.tmp"53⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"54⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"55⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"56⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"57⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\2D06.tmp"C:\Users\Admin\AppData\Local\Temp\2D06.tmp"58⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"59⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"60⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"61⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"62⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\30BF.tmp"C:\Users\Admin\AppData\Local\Temp\30BF.tmp"63⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"64⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"65⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"66⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"67⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"68⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"69⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\3563.tmp"C:\Users\Admin\AppData\Local\Temp\3563.tmp"70⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"71⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"72⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"73⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"74⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\3861.tmp"C:\Users\Admin\AppData\Local\Temp\3861.tmp"75⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"76⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"77⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"78⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"79⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"80⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3C68.tmp"C:\Users\Admin\AppData\Local\Temp\3C68.tmp"81⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"82⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"83⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"84⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"85⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\3F37.tmp"C:\Users\Admin\AppData\Local\Temp\3F37.tmp"86⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"87⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"88⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"89⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"90⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\4215.tmp"C:\Users\Admin\AppData\Local\Temp\4215.tmp"91⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\42D0.tmp"C:\Users\Admin\AppData\Local\Temp\42D0.tmp"92⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"93⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\43EA.tmp"C:\Users\Admin\AppData\Local\Temp\43EA.tmp"94⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"95⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"96⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"97⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"98⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"99⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"100⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\4820.tmp"C:\Users\Admin\AppData\Local\Temp\4820.tmp"101⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"102⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\4939.tmp"C:\Users\Admin\AppData\Local\Temp\4939.tmp"103⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"104⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\4A72.tmp"C:\Users\Admin\AppData\Local\Temp\4A72.tmp"105⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"106⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\4BBA.tmp"C:\Users\Admin\AppData\Local\Temp\4BBA.tmp"107⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"108⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\4D02.tmp"C:\Users\Admin\AppData\Local\Temp\4D02.tmp"109⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\4D7F.tmp"C:\Users\Admin\AppData\Local\Temp\4D7F.tmp"110⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"111⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"112⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"113⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"114⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\50EA.tmp"C:\Users\Admin\AppData\Local\Temp\50EA.tmp"115⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"116⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\5280.tmp"C:\Users\Admin\AppData\Local\Temp\5280.tmp"117⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"118⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"119⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\54F1.tmp"C:\Users\Admin\AppData\Local\Temp\54F1.tmp"120⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\557E.tmp"C:\Users\Admin\AppData\Local\Temp\557E.tmp"121⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"122⤵PID:4736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-