Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe
-
Size
486KB
-
MD5
da4c492ac2b9faf44adf0a4829e7c866
-
SHA1
1ba27ee15d1b24d6eb86165bb6a7e3bd58467601
-
SHA256
35686524e62a9b86be0a57a46f14c0f04bb9d261c2a152d9a707c94f18797748
-
SHA512
a0165b8a06dac921b449e23f0f3a2816fe29dfa2e6abccba5fa6bb432b5ef2dead53348b49fe2eb578110b67de3723489a4e4ac6d79bfb6c70b9c2f37534215e
-
SSDEEP
12288:UU5rCOTeiD3p5/2+6XL1QBgHb41ywXNZ:UUQOJDa3b41ywN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4656 EAEC.tmp 376 EBC7.tmp 4092 ECA2.tmp 232 ED7D.tmp 4484 EE86.tmp 2288 EF71.tmp 4260 F02C.tmp 4828 F0C8.tmp 4284 F1B3.tmp 4412 F29D.tmp 4144 F378.tmp 2656 F472.tmp 2832 F53D.tmp 4452 F608.tmp 4304 F6A4.tmp 1996 F77F.tmp 1788 F80C.tmp 3516 F906.tmp 3304 FA4E.tmp 4124 FB48.tmp 1756 FC13.tmp 1100 FCAF.tmp 4844 FD8A.tmp 2716 FE74.tmp 3780 FF4F.tmp 1724 1A.tmp 4816 D6.tmp 3404 21E.tmp 4636 2F9.tmp 4468 3C4.tmp 1900 4AE.tmp 4220 56A.tmp 1448 635.tmp 3272 6C1.tmp 2896 74E.tmp 3916 7EA.tmp 3768 896.tmp 4476 961.tmp 3620 A1D.tmp 3352 AC9.tmp 4944 B84.tmp 4684 C11.tmp 4644 CAD.tmp 4640 D59.tmp 4400 E05.tmp 2904 ED0.tmp 2240 F7C.tmp 1860 1047.tmp 3904 1102.tmp 2292 123B.tmp 4276 12E7.tmp 4912 13B2.tmp 3808 143F.tmp 492 14BC.tmp 2332 1529.tmp 4480 15A6.tmp 4532 1652.tmp 3600 16DE.tmp 3652 175B.tmp 4416 17F8.tmp 2776 1884.tmp 2856 1911.tmp 4664 198E.tmp 4284 1A1B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4656 5060 da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe 81 PID 5060 wrote to memory of 4656 5060 da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe 81 PID 5060 wrote to memory of 4656 5060 da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe 81 PID 4656 wrote to memory of 376 4656 EAEC.tmp 82 PID 4656 wrote to memory of 376 4656 EAEC.tmp 82 PID 4656 wrote to memory of 376 4656 EAEC.tmp 82 PID 376 wrote to memory of 4092 376 EBC7.tmp 83 PID 376 wrote to memory of 4092 376 EBC7.tmp 83 PID 376 wrote to memory of 4092 376 EBC7.tmp 83 PID 4092 wrote to memory of 232 4092 ECA2.tmp 84 PID 4092 wrote to memory of 232 4092 ECA2.tmp 84 PID 4092 wrote to memory of 232 4092 ECA2.tmp 84 PID 232 wrote to memory of 4484 232 ED7D.tmp 85 PID 232 wrote to memory of 4484 232 ED7D.tmp 85 PID 232 wrote to memory of 4484 232 ED7D.tmp 85 PID 4484 wrote to memory of 2288 4484 EE86.tmp 86 PID 4484 wrote to memory of 2288 4484 EE86.tmp 86 PID 4484 wrote to memory of 2288 4484 EE86.tmp 86 PID 2288 wrote to memory of 4260 2288 EF71.tmp 87 PID 2288 wrote to memory of 4260 2288 EF71.tmp 87 PID 2288 wrote to memory of 4260 2288 EF71.tmp 87 PID 4260 wrote to memory of 4828 4260 F02C.tmp 88 PID 4260 wrote to memory of 4828 4260 F02C.tmp 88 PID 4260 wrote to memory of 4828 4260 F02C.tmp 88 PID 4828 wrote to memory of 4284 4828 F0C8.tmp 90 PID 4828 wrote to memory of 4284 4828 F0C8.tmp 90 PID 4828 wrote to memory of 4284 4828 F0C8.tmp 90 PID 4284 wrote to memory of 4412 4284 F1B3.tmp 91 PID 4284 wrote to memory of 4412 4284 F1B3.tmp 91 PID 4284 wrote to memory of 4412 4284 F1B3.tmp 91 PID 4412 wrote to memory of 4144 4412 F29D.tmp 92 PID 4412 wrote to memory of 4144 4412 F29D.tmp 92 PID 4412 wrote to memory of 4144 4412 F29D.tmp 92 PID 4144 wrote to memory of 2656 4144 F378.tmp 93 PID 4144 wrote to memory of 2656 4144 F378.tmp 93 PID 4144 wrote to memory of 2656 4144 F378.tmp 93 PID 2656 wrote to memory of 2832 2656 F472.tmp 94 PID 2656 wrote to memory of 2832 2656 F472.tmp 94 PID 2656 wrote to memory of 2832 2656 F472.tmp 94 PID 2832 wrote to memory of 4452 2832 F53D.tmp 95 PID 2832 wrote to memory of 4452 2832 F53D.tmp 95 PID 2832 wrote to memory of 4452 2832 F53D.tmp 95 PID 4452 wrote to memory of 4304 4452 F608.tmp 96 PID 4452 wrote to memory of 4304 4452 F608.tmp 96 PID 4452 wrote to memory of 4304 4452 F608.tmp 96 PID 4304 wrote to memory of 1996 4304 F6A4.tmp 97 PID 4304 wrote to memory of 1996 4304 F6A4.tmp 97 PID 4304 wrote to memory of 1996 4304 F6A4.tmp 97 PID 1996 wrote to memory of 1788 1996 F77F.tmp 98 PID 1996 wrote to memory of 1788 1996 F77F.tmp 98 PID 1996 wrote to memory of 1788 1996 F77F.tmp 98 PID 1788 wrote to memory of 3516 1788 F80C.tmp 101 PID 1788 wrote to memory of 3516 1788 F80C.tmp 101 PID 1788 wrote to memory of 3516 1788 F80C.tmp 101 PID 3516 wrote to memory of 3304 3516 F906.tmp 102 PID 3516 wrote to memory of 3304 3516 F906.tmp 102 PID 3516 wrote to memory of 3304 3516 F906.tmp 102 PID 3304 wrote to memory of 4124 3304 FA4E.tmp 103 PID 3304 wrote to memory of 4124 3304 FA4E.tmp 103 PID 3304 wrote to memory of 4124 3304 FA4E.tmp 103 PID 4124 wrote to memory of 1756 4124 FB48.tmp 104 PID 4124 wrote to memory of 1756 4124 FB48.tmp 104 PID 4124 wrote to memory of 1756 4124 FB48.tmp 104 PID 1756 wrote to memory of 1100 1756 FC13.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\da4c492ac2b9faf44adf0a4829e7c866_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\F02C.tmp"C:\Users\Admin\AppData\Local\Temp\F02C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\F29D.tmp"C:\Users\Admin\AppData\Local\Temp\F29D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\F378.tmp"C:\Users\Admin\AppData\Local\Temp\F378.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"23⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"24⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"25⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"26⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"27⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\D6.tmp"C:\Users\Admin\AppData\Local\Temp\D6.tmp"28⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"29⤵
- Executes dropped EXE
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\2F9.tmp"C:\Users\Admin\AppData\Local\Temp\2F9.tmp"30⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"31⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\4AE.tmp"C:\Users\Admin\AppData\Local\Temp\4AE.tmp"32⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"33⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\635.tmp"C:\Users\Admin\AppData\Local\Temp\635.tmp"34⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\6C1.tmp"C:\Users\Admin\AppData\Local\Temp\6C1.tmp"35⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"36⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"37⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"38⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"39⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"40⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\AC9.tmp"C:\Users\Admin\AppData\Local\Temp\AC9.tmp"41⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"42⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\C11.tmp"C:\Users\Admin\AppData\Local\Temp\C11.tmp"43⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\CAD.tmp"C:\Users\Admin\AppData\Local\Temp\CAD.tmp"44⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"45⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"46⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp"47⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"48⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\1047.tmp"C:\Users\Admin\AppData\Local\Temp\1047.tmp"49⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"50⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"51⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\12E7.tmp"C:\Users\Admin\AppData\Local\Temp\12E7.tmp"52⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\13B2.tmp"C:\Users\Admin\AppData\Local\Temp\13B2.tmp"53⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\143F.tmp"C:\Users\Admin\AppData\Local\Temp\143F.tmp"54⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\14BC.tmp"C:\Users\Admin\AppData\Local\Temp\14BC.tmp"55⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\1529.tmp"C:\Users\Admin\AppData\Local\Temp\1529.tmp"56⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"57⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\1652.tmp"C:\Users\Admin\AppData\Local\Temp\1652.tmp"58⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"59⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"60⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\17F8.tmp"C:\Users\Admin\AppData\Local\Temp\17F8.tmp"61⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"62⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\1911.tmp"C:\Users\Admin\AppData\Local\Temp\1911.tmp"63⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\198E.tmp"C:\Users\Admin\AppData\Local\Temp\198E.tmp"64⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"65⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"C:\Users\Admin\AppData\Local\Temp\1AB7.tmp"66⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\1B34.tmp"C:\Users\Admin\AppData\Local\Temp\1B34.tmp"67⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"68⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"69⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"70⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"71⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"72⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\1E22.tmp"C:\Users\Admin\AppData\Local\Temp\1E22.tmp"73⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"74⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"75⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\2074.tmp"C:\Users\Admin\AppData\Local\Temp\2074.tmp"76⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"77⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\21BC.tmp"C:\Users\Admin\AppData\Local\Temp\21BC.tmp"78⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2239.tmp"C:\Users\Admin\AppData\Local\Temp\2239.tmp"79⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"80⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\2352.tmp"C:\Users\Admin\AppData\Local\Temp\2352.tmp"81⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"82⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"83⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"84⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"85⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"86⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"87⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\26DC.tmp"C:\Users\Admin\AppData\Local\Temp\26DC.tmp"88⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"89⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"90⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"91⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"92⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"93⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"94⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"95⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"96⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"97⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"98⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"99⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"100⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"101⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"102⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"103⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"104⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\31AA.tmp"C:\Users\Admin\AppData\Local\Temp\31AA.tmp"105⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"106⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"107⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\335F.tmp"C:\Users\Admin\AppData\Local\Temp\335F.tmp"108⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"109⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"110⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"111⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"112⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"113⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\3738.tmp"C:\Users\Admin\AppData\Local\Temp\3738.tmp"114⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"115⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"116⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"117⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"118⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"119⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"120⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"121⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"122⤵PID:3452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-