Analysis
-
max time kernel
159s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe
-
Size
486KB
-
MD5
a311f7a5524ca15446620df0a20d46d0
-
SHA1
7fe8a7dc1b109b7036645c0b69295e3d9d36cfea
-
SHA256
31ebf52bc90471e1d07875e8727f0ec3d7f6c58f55f946fbd9925b3bc5e4e925
-
SHA512
cec15f0b7d3e5288277f198c49cb1957fa8e822ef191b3b37acdc456d5e8d5d306485af631c74853687f6a0b7714b65a76e2a4609991614dced38e17f7dba2d8
-
SSDEEP
6144:8orf3lPvovsgZnqG2C7mOTeiLfD7QSvvitmpVjL3/ybARouLgCyJMTVn6ODZX93r:5U5rCOTeiDWcV/v2jj1OTx/OxvdIZNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1200 AFA9.tmp 4340 B045.tmp 484 B0D1.tmp 3856 B2F4.tmp 4540 B3DF.tmp 4844 B4C9.tmp 4628 B546.tmp 2324 B5E2.tmp 2984 B66F.tmp 3160 BA57.tmp 2256 BB03.tmp 4648 BBBE.tmp 4584 BF49.tmp 1800 C023.tmp 4156 CE0E.tmp 1912 CF75.tmp 2908 D060.tmp 3524 D14A.tmp 2008 D263.tmp 4288 D34E.tmp 4180 D419.tmp 2808 D4B5.tmp 3116 D580.tmp 2792 D65B.tmp 1500 DA33.tmp 1284 DB1E.tmp 948 DBC9.tmp 4716 DDBD.tmp 3440 DE98.tmp 1896 DF63.tmp 4760 E03E.tmp 1288 E109.tmp 3556 E280.tmp 3512 E31C.tmp 396 E3B9.tmp 2604 E455.tmp 2696 E4D2.tmp 3728 E55F.tmp 3088 E5DC.tmp 3184 EDAC.tmp 544 EF13.tmp 3672 EFFD.tmp 844 F09A.tmp 4516 F136.tmp 3064 F1C2.tmp 1636 F24F.tmp 380 F2DC.tmp 376 F359.tmp 888 F3F5.tmp 3216 F58B.tmp 4680 F618.tmp 2204 F6A4.tmp 3844 F731.tmp 4872 F7CD.tmp 3236 F86A.tmp 3412 F906.tmp 1792 F983.tmp 1000 FCAF.tmp 1688 FD4C.tmp 3604 FDC9.tmp 4340 FE17.tmp 2432 FE94.tmp 2052 59.tmp 4564 105.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 1200 4408 2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe 83 PID 4408 wrote to memory of 1200 4408 2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe 83 PID 4408 wrote to memory of 1200 4408 2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe 83 PID 1200 wrote to memory of 4340 1200 AFA9.tmp 84 PID 1200 wrote to memory of 4340 1200 AFA9.tmp 84 PID 1200 wrote to memory of 4340 1200 AFA9.tmp 84 PID 4340 wrote to memory of 484 4340 B045.tmp 85 PID 4340 wrote to memory of 484 4340 B045.tmp 85 PID 4340 wrote to memory of 484 4340 B045.tmp 85 PID 484 wrote to memory of 3856 484 B0D1.tmp 86 PID 484 wrote to memory of 3856 484 B0D1.tmp 86 PID 484 wrote to memory of 3856 484 B0D1.tmp 86 PID 3856 wrote to memory of 4540 3856 B2F4.tmp 87 PID 3856 wrote to memory of 4540 3856 B2F4.tmp 87 PID 3856 wrote to memory of 4540 3856 B2F4.tmp 87 PID 4540 wrote to memory of 4844 4540 B3DF.tmp 88 PID 4540 wrote to memory of 4844 4540 B3DF.tmp 88 PID 4540 wrote to memory of 4844 4540 B3DF.tmp 88 PID 4844 wrote to memory of 4628 4844 B4C9.tmp 89 PID 4844 wrote to memory of 4628 4844 B4C9.tmp 89 PID 4844 wrote to memory of 4628 4844 B4C9.tmp 89 PID 4628 wrote to memory of 2324 4628 B546.tmp 90 PID 4628 wrote to memory of 2324 4628 B546.tmp 90 PID 4628 wrote to memory of 2324 4628 B546.tmp 90 PID 2324 wrote to memory of 2984 2324 B5E2.tmp 91 PID 2324 wrote to memory of 2984 2324 B5E2.tmp 91 PID 2324 wrote to memory of 2984 2324 B5E2.tmp 91 PID 2984 wrote to memory of 3160 2984 B66F.tmp 92 PID 2984 wrote to memory of 3160 2984 B66F.tmp 92 PID 2984 wrote to memory of 3160 2984 B66F.tmp 92 PID 3160 wrote to memory of 2256 3160 BA57.tmp 93 PID 3160 wrote to memory of 2256 3160 BA57.tmp 93 PID 3160 wrote to memory of 2256 3160 BA57.tmp 93 PID 2256 wrote to memory of 4648 2256 BB03.tmp 94 PID 2256 wrote to memory of 4648 2256 BB03.tmp 94 PID 2256 wrote to memory of 4648 2256 BB03.tmp 94 PID 4648 wrote to memory of 4584 4648 BBBE.tmp 95 PID 4648 wrote to memory of 4584 4648 BBBE.tmp 95 PID 4648 wrote to memory of 4584 4648 BBBE.tmp 95 PID 4584 wrote to memory of 1800 4584 BF49.tmp 96 PID 4584 wrote to memory of 1800 4584 BF49.tmp 96 PID 4584 wrote to memory of 1800 4584 BF49.tmp 96 PID 1800 wrote to memory of 4156 1800 C023.tmp 97 PID 1800 wrote to memory of 4156 1800 C023.tmp 97 PID 1800 wrote to memory of 4156 1800 C023.tmp 97 PID 4156 wrote to memory of 1912 4156 CE0E.tmp 98 PID 4156 wrote to memory of 1912 4156 CE0E.tmp 98 PID 4156 wrote to memory of 1912 4156 CE0E.tmp 98 PID 1912 wrote to memory of 2908 1912 CF75.tmp 99 PID 1912 wrote to memory of 2908 1912 CF75.tmp 99 PID 1912 wrote to memory of 2908 1912 CF75.tmp 99 PID 2908 wrote to memory of 3524 2908 D060.tmp 100 PID 2908 wrote to memory of 3524 2908 D060.tmp 100 PID 2908 wrote to memory of 3524 2908 D060.tmp 100 PID 3524 wrote to memory of 2008 3524 D14A.tmp 101 PID 3524 wrote to memory of 2008 3524 D14A.tmp 101 PID 3524 wrote to memory of 2008 3524 D14A.tmp 101 PID 2008 wrote to memory of 4288 2008 D263.tmp 102 PID 2008 wrote to memory of 4288 2008 D263.tmp 102 PID 2008 wrote to memory of 4288 2008 D263.tmp 102 PID 4288 wrote to memory of 4180 4288 D34E.tmp 103 PID 4288 wrote to memory of 4180 4288 D34E.tmp 103 PID 4288 wrote to memory of 4180 4288 D34E.tmp 103 PID 4180 wrote to memory of 2808 4180 D419.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_a311f7a5524ca15446620df0a20d46d0_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\B0D1.tmp"C:\Users\Admin\AppData\Local\Temp\B0D1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\CF75.tmp"C:\Users\Admin\AppData\Local\Temp\CF75.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\D14A.tmp"C:\Users\Admin\AppData\Local\Temp\D14A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\D263.tmp"C:\Users\Admin\AppData\Local\Temp\D263.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\D4B5.tmp"C:\Users\Admin\AppData\Local\Temp\D4B5.tmp"23⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"24⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"25⤵
- Executes dropped EXE
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"26⤵
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\DB1E.tmp"C:\Users\Admin\AppData\Local\Temp\DB1E.tmp"27⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"28⤵
- Executes dropped EXE
PID:948 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"29⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\DE98.tmp"C:\Users\Admin\AppData\Local\Temp\DE98.tmp"30⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"31⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"32⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"33⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"34⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"35⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"36⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"37⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"38⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\E55F.tmp"C:\Users\Admin\AppData\Local\Temp\E55F.tmp"39⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"40⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"41⤵
- Executes dropped EXE
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"42⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"43⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"44⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"45⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"46⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\F24F.tmp"C:\Users\Admin\AppData\Local\Temp\F24F.tmp"47⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"48⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\F359.tmp"C:\Users\Admin\AppData\Local\Temp\F359.tmp"49⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"50⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"51⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\F618.tmp"C:\Users\Admin\AppData\Local\Temp\F618.tmp"52⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"53⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"54⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"55⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"56⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"57⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"58⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"59⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"60⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"61⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\FE17.tmp"C:\Users\Admin\AppData\Local\Temp\FE17.tmp"62⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"63⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"64⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"65⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\182.tmp"C:\Users\Admin\AppData\Local\Temp\182.tmp"66⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"67⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\29B.tmp"C:\Users\Admin\AppData\Local\Temp\29B.tmp"68⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"69⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"70⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"71⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"72⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\923.tmp"C:\Users\Admin\AppData\Local\Temp\923.tmp"73⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\9A0.tmp"C:\Users\Admin\AppData\Local\Temp\9A0.tmp"74⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\BE2.tmp"C:\Users\Admin\AppData\Local\Temp\BE2.tmp"75⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"76⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"77⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"78⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"79⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"80⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\F4D.tmp"C:\Users\Admin\AppData\Local\Temp\F4D.tmp"81⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"82⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\12B8.tmp"C:\Users\Admin\AppData\Local\Temp\12B8.tmp"83⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"84⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"85⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"86⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"87⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"88⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\1642.tmp"C:\Users\Admin\AppData\Local\Temp\1642.tmp"89⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\16CF.tmp"C:\Users\Admin\AppData\Local\Temp\16CF.tmp"90⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"91⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"92⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"93⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"94⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\197E.tmp"C:\Users\Admin\AppData\Local\Temp\197E.tmp"95⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\1B82.tmp"C:\Users\Admin\AppData\Local\Temp\1B82.tmp"96⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"97⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\1C9B.tmp"C:\Users\Admin\AppData\Local\Temp\1C9B.tmp"98⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"99⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\1D95.tmp"C:\Users\Admin\AppData\Local\Temp\1D95.tmp"100⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"101⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"102⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"103⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"104⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\2054.tmp"C:\Users\Admin\AppData\Local\Temp\2054.tmp"105⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"106⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"107⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"108⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\2287.tmp"C:\Users\Admin\AppData\Local\Temp\2287.tmp"109⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\2304.tmp"C:\Users\Admin\AppData\Local\Temp\2304.tmp"110⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"111⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"112⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"113⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"114⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"115⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"116⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"117⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"118⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"119⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\28D0.tmp"C:\Users\Admin\AppData\Local\Temp\28D0.tmp"120⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"121⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\29BB.tmp"C:\Users\Admin\AppData\Local\Temp\29BB.tmp"122⤵PID:2152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-