Analysis
-
max time kernel
167s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 00:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe
-
Size
520KB
-
MD5
758b04d7f7fd3a6f2d447ab21c286f20
-
SHA1
b583b891c9b0a6d0a4324a758b8309e9c71f56e6
-
SHA256
8d04a4ef339d767a9820a6daf7650812c22e7ca20728a392f356649f4425ddf2
-
SHA512
0dab7828dfda801fe31e815f992673684bdaf71b50d77bc540b96202a1d35a8e29f54cbdd33ee58726a4e86885b480d6dcac33e9d0b257c6129cd83ce40dab76
-
SSDEEP
12288:roRXOQjmOyjKMfixIad5xLIJrAzPnksxvRNZ:rogQ9yjqZdv0J08o5N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3952 45AF.tmp 4880 4C46.tmp 4680 4D9E.tmp 4524 4E4A.tmp 2084 4F05.tmp 1572 502E.tmp 3384 50F9.tmp 3232 51B5.tmp 432 53B9.tmp 1948 5484.tmp 708 560A.tmp 1848 56D5.tmp 920 5B2B.tmp 3400 5BF6.tmp 4848 5C92.tmp 4588 5D2E.tmp 1000 5DDA.tmp 3396 5E48.tmp 4456 5F22.tmp 4560 5FAF.tmp 4532 6116.tmp 1904 61B3.tmp 800 62FB.tmp 5116 6387.tmp 4640 6481.tmp 4584 652D.tmp 1908 65E9.tmp 5032 676F.tmp 4268 6879.tmp 4084 6915.tmp 2132 69C1.tmp 4256 6B09.tmp 1020 6D0D.tmp 4864 6D9A.tmp 4668 6E26.tmp 4372 6F3F.tmp 4916 7088.tmp 3788 7153.tmp 556 71DF.tmp 4420 728B.tmp 4816 7337.tmp 1436 754A.tmp 3912 75D7.tmp 4880 7664.tmp 3596 770F.tmp 3492 78A6.tmp 4320 7B84.tmp 2492 7C20.tmp 2380 7C8E.tmp 3568 7D1A.tmp 4160 7F0E.tmp 3172 8122.tmp 1668 81AE.tmp 2108 823B.tmp 4800 82D7.tmp 1676 8383.tmp 2100 8548.tmp 3232 85D5.tmp 3916 8642.tmp 4732 86BF.tmp 4504 8855.tmp 4300 88E2.tmp 1176 8A78.tmp 4304 8B63.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 3952 1964 2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe 88 PID 1964 wrote to memory of 3952 1964 2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe 88 PID 1964 wrote to memory of 3952 1964 2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe 88 PID 3952 wrote to memory of 4880 3952 45AF.tmp 89 PID 3952 wrote to memory of 4880 3952 45AF.tmp 89 PID 3952 wrote to memory of 4880 3952 45AF.tmp 89 PID 4880 wrote to memory of 4680 4880 4C46.tmp 90 PID 4880 wrote to memory of 4680 4880 4C46.tmp 90 PID 4880 wrote to memory of 4680 4880 4C46.tmp 90 PID 4680 wrote to memory of 4524 4680 4D9E.tmp 91 PID 4680 wrote to memory of 4524 4680 4D9E.tmp 91 PID 4680 wrote to memory of 4524 4680 4D9E.tmp 91 PID 4524 wrote to memory of 2084 4524 4E4A.tmp 92 PID 4524 wrote to memory of 2084 4524 4E4A.tmp 92 PID 4524 wrote to memory of 2084 4524 4E4A.tmp 92 PID 2084 wrote to memory of 1572 2084 4F05.tmp 93 PID 2084 wrote to memory of 1572 2084 4F05.tmp 93 PID 2084 wrote to memory of 1572 2084 4F05.tmp 93 PID 1572 wrote to memory of 3384 1572 502E.tmp 94 PID 1572 wrote to memory of 3384 1572 502E.tmp 94 PID 1572 wrote to memory of 3384 1572 502E.tmp 94 PID 3384 wrote to memory of 3232 3384 50F9.tmp 95 PID 3384 wrote to memory of 3232 3384 50F9.tmp 95 PID 3384 wrote to memory of 3232 3384 50F9.tmp 95 PID 3232 wrote to memory of 432 3232 51B5.tmp 96 PID 3232 wrote to memory of 432 3232 51B5.tmp 96 PID 3232 wrote to memory of 432 3232 51B5.tmp 96 PID 432 wrote to memory of 1948 432 53B9.tmp 97 PID 432 wrote to memory of 1948 432 53B9.tmp 97 PID 432 wrote to memory of 1948 432 53B9.tmp 97 PID 1948 wrote to memory of 708 1948 5484.tmp 98 PID 1948 wrote to memory of 708 1948 5484.tmp 98 PID 1948 wrote to memory of 708 1948 5484.tmp 98 PID 708 wrote to memory of 1848 708 560A.tmp 99 PID 708 wrote to memory of 1848 708 560A.tmp 99 PID 708 wrote to memory of 1848 708 560A.tmp 99 PID 1848 wrote to memory of 920 1848 56D5.tmp 100 PID 1848 wrote to memory of 920 1848 56D5.tmp 100 PID 1848 wrote to memory of 920 1848 56D5.tmp 100 PID 920 wrote to memory of 3400 920 5B2B.tmp 101 PID 920 wrote to memory of 3400 920 5B2B.tmp 101 PID 920 wrote to memory of 3400 920 5B2B.tmp 101 PID 3400 wrote to memory of 4848 3400 5BF6.tmp 102 PID 3400 wrote to memory of 4848 3400 5BF6.tmp 102 PID 3400 wrote to memory of 4848 3400 5BF6.tmp 102 PID 4848 wrote to memory of 4588 4848 5C92.tmp 103 PID 4848 wrote to memory of 4588 4848 5C92.tmp 103 PID 4848 wrote to memory of 4588 4848 5C92.tmp 103 PID 4588 wrote to memory of 1000 4588 5D2E.tmp 104 PID 4588 wrote to memory of 1000 4588 5D2E.tmp 104 PID 4588 wrote to memory of 1000 4588 5D2E.tmp 104 PID 1000 wrote to memory of 3396 1000 5DDA.tmp 105 PID 1000 wrote to memory of 3396 1000 5DDA.tmp 105 PID 1000 wrote to memory of 3396 1000 5DDA.tmp 105 PID 3396 wrote to memory of 4456 3396 5E48.tmp 106 PID 3396 wrote to memory of 4456 3396 5E48.tmp 106 PID 3396 wrote to memory of 4456 3396 5E48.tmp 106 PID 4456 wrote to memory of 4560 4456 5F22.tmp 107 PID 4456 wrote to memory of 4560 4456 5F22.tmp 107 PID 4456 wrote to memory of 4560 4456 5F22.tmp 107 PID 4560 wrote to memory of 4532 4560 5FAF.tmp 108 PID 4560 wrote to memory of 4532 4560 5FAF.tmp 108 PID 4560 wrote to memory of 4532 4560 5FAF.tmp 108 PID 4532 wrote to memory of 1904 4532 6116.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_758b04d7f7fd3a6f2d447ab21c286f20_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\45AF.tmp"C:\Users\Admin\AppData\Local\Temp\45AF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\4E4A.tmp"C:\Users\Admin\AppData\Local\Temp\4E4A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\4F05.tmp"C:\Users\Admin\AppData\Local\Temp\4F05.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\51B5.tmp"C:\Users\Admin\AppData\Local\Temp\51B5.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\560A.tmp"C:\Users\Admin\AppData\Local\Temp\560A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\5D2E.tmp"C:\Users\Admin\AppData\Local\Temp\5D2E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\5F22.tmp"C:\Users\Admin\AppData\Local\Temp\5F22.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"23⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"24⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"25⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\6481.tmp"C:\Users\Admin\AppData\Local\Temp\6481.tmp"26⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\652D.tmp"C:\Users\Admin\AppData\Local\Temp\652D.tmp"27⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"28⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\676F.tmp"C:\Users\Admin\AppData\Local\Temp\676F.tmp"29⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"30⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\6915.tmp"C:\Users\Admin\AppData\Local\Temp\6915.tmp"31⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\69C1.tmp"C:\Users\Admin\AppData\Local\Temp\69C1.tmp"32⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"33⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\6D0D.tmp"C:\Users\Admin\AppData\Local\Temp\6D0D.tmp"34⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"35⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\6E26.tmp"C:\Users\Admin\AppData\Local\Temp\6E26.tmp"36⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\6F3F.tmp"C:\Users\Admin\AppData\Local\Temp\6F3F.tmp"37⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"38⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\7153.tmp"C:\Users\Admin\AppData\Local\Temp\7153.tmp"39⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\71DF.tmp"C:\Users\Admin\AppData\Local\Temp\71DF.tmp"40⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\728B.tmp"C:\Users\Admin\AppData\Local\Temp\728B.tmp"41⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\7337.tmp"C:\Users\Admin\AppData\Local\Temp\7337.tmp"42⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\754A.tmp"C:\Users\Admin\AppData\Local\Temp\754A.tmp"43⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\75D7.tmp"C:\Users\Admin\AppData\Local\Temp\75D7.tmp"44⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\7664.tmp"C:\Users\Admin\AppData\Local\Temp\7664.tmp"45⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\770F.tmp"C:\Users\Admin\AppData\Local\Temp\770F.tmp"46⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"47⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\7B84.tmp"C:\Users\Admin\AppData\Local\Temp\7B84.tmp"48⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\7C20.tmp"C:\Users\Admin\AppData\Local\Temp\7C20.tmp"49⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"50⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\7D1A.tmp"C:\Users\Admin\AppData\Local\Temp\7D1A.tmp"51⤵
- Executes dropped EXE
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"52⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\8122.tmp"C:\Users\Admin\AppData\Local\Temp\8122.tmp"53⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\81AE.tmp"C:\Users\Admin\AppData\Local\Temp\81AE.tmp"54⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\823B.tmp"C:\Users\Admin\AppData\Local\Temp\823B.tmp"55⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\82D7.tmp"C:\Users\Admin\AppData\Local\Temp\82D7.tmp"56⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\8383.tmp"C:\Users\Admin\AppData\Local\Temp\8383.tmp"57⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\8548.tmp"C:\Users\Admin\AppData\Local\Temp\8548.tmp"58⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\85D5.tmp"C:\Users\Admin\AppData\Local\Temp\85D5.tmp"59⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\8642.tmp"C:\Users\Admin\AppData\Local\Temp\8642.tmp"60⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\86BF.tmp"C:\Users\Admin\AppData\Local\Temp\86BF.tmp"61⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\8855.tmp"C:\Users\Admin\AppData\Local\Temp\8855.tmp"62⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\88E2.tmp"C:\Users\Admin\AppData\Local\Temp\88E2.tmp"63⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\8A78.tmp"C:\Users\Admin\AppData\Local\Temp\8A78.tmp"64⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\8B63.tmp"C:\Users\Admin\AppData\Local\Temp\8B63.tmp"65⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\8BD0.tmp"C:\Users\Admin\AppData\Local\Temp\8BD0.tmp"66⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\8C3D.tmp"C:\Users\Admin\AppData\Local\Temp\8C3D.tmp"67⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"68⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\8D85.tmp"C:\Users\Admin\AppData\Local\Temp\8D85.tmp"69⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\8EED.tmp"C:\Users\Admin\AppData\Local\Temp\8EED.tmp"70⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\8FC8.tmp"C:\Users\Admin\AppData\Local\Temp\8FC8.tmp"71⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\90F0.tmp"C:\Users\Admin\AppData\Local\Temp\90F0.tmp"72⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\918D.tmp"C:\Users\Admin\AppData\Local\Temp\918D.tmp"73⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\920A.tmp"C:\Users\Admin\AppData\Local\Temp\920A.tmp"74⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\9342.tmp"C:\Users\Admin\AppData\Local\Temp\9342.tmp"75⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\9546.tmp"C:\Users\Admin\AppData\Local\Temp\9546.tmp"76⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\95D2.tmp"C:\Users\Admin\AppData\Local\Temp\95D2.tmp"77⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\964F.tmp"C:\Users\Admin\AppData\Local\Temp\964F.tmp"78⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\972A.tmp"C:\Users\Admin\AppData\Local\Temp\972A.tmp"79⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\9798.tmp"C:\Users\Admin\AppData\Local\Temp\9798.tmp"80⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\9815.tmp"C:\Users\Admin\AppData\Local\Temp\9815.tmp"81⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\9A95.tmp"C:\Users\Admin\AppData\Local\Temp\9A95.tmp"82⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\9B03.tmp"C:\Users\Admin\AppData\Local\Temp\9B03.tmp"83⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\9C1C.tmp"C:\Users\Admin\AppData\Local\Temp\9C1C.tmp"84⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\9E4E.tmp"C:\Users\Admin\AppData\Local\Temp\9E4E.tmp"85⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\9F58.tmp"C:\Users\Admin\AppData\Local\Temp\9F58.tmp"86⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\9FD5.tmp"C:\Users\Admin\AppData\Local\Temp\9FD5.tmp"87⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\A052.tmp"C:\Users\Admin\AppData\Local\Temp\A052.tmp"88⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\A0DF.tmp"C:\Users\Admin\AppData\Local\Temp\A0DF.tmp"89⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"90⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\A236.tmp"C:\Users\Admin\AppData\Local\Temp\A236.tmp"91⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\A498.tmp"C:\Users\Admin\AppData\Local\Temp\A498.tmp"92⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\A592.tmp"C:\Users\Admin\AppData\Local\Temp\A592.tmp"93⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\AA06.tmp"C:\Users\Admin\AppData\Local\Temp\AA06.tmp"94⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\AA74.tmp"C:\Users\Admin\AppData\Local\Temp\AA74.tmp"95⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\AAF1.tmp"C:\Users\Admin\AppData\Local\Temp\AAF1.tmp"96⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\AC58.tmp"C:\Users\Admin\AppData\Local\Temp\AC58.tmp"97⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"98⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\AEB9.tmp"C:\Users\Admin\AppData\Local\Temp\AEB9.tmp"99⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\AF46.tmp"C:\Users\Admin\AppData\Local\Temp\AF46.tmp"100⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"101⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\B06F.tmp"C:\Users\Admin\AppData\Local\Temp\B06F.tmp"102⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\B0EC.tmp"C:\Users\Admin\AppData\Local\Temp\B0EC.tmp"103⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\B159.tmp"C:\Users\Admin\AppData\Local\Temp\B159.tmp"104⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"C:\Users\Admin\AppData\Local\Temp\B1D6.tmp"105⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\B31E.tmp"C:\Users\Admin\AppData\Local\Temp\B31E.tmp"106⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\B38C.tmp"C:\Users\Admin\AppData\Local\Temp\B38C.tmp"107⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\B3F9.tmp"C:\Users\Admin\AppData\Local\Temp\B3F9.tmp"108⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\B467.tmp"C:\Users\Admin\AppData\Local\Temp\B467.tmp"109⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\B522.tmp"C:\Users\Admin\AppData\Local\Temp\B522.tmp"110⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\B58F.tmp"C:\Users\Admin\AppData\Local\Temp\B58F.tmp"111⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\B5FD.tmp"C:\Users\Admin\AppData\Local\Temp\B5FD.tmp"112⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\B7B2.tmp"C:\Users\Admin\AppData\Local\Temp\B7B2.tmp"113⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\B820.tmp"C:\Users\Admin\AppData\Local\Temp\B820.tmp"114⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\B939.tmp"C:\Users\Admin\AppData\Local\Temp\B939.tmp"115⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\B9B6.tmp"C:\Users\Admin\AppData\Local\Temp\B9B6.tmp"116⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\BA62.tmp"C:\Users\Admin\AppData\Local\Temp\BA62.tmp"117⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"118⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\BBC9.tmp"C:\Users\Admin\AppData\Local\Temp\BBC9.tmp"119⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\BC56.tmp"C:\Users\Admin\AppData\Local\Temp\BC56.tmp"120⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\BDFC.tmp"C:\Users\Admin\AppData\Local\Temp\BDFC.tmp"121⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\BE69.tmp"C:\Users\Admin\AppData\Local\Temp\BE69.tmp"122⤵PID:3968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-