Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2023, 10:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8196873212130232d5b50758335a0cd3_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8196873212130232d5b50758335a0cd3_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
8196873212130232d5b50758335a0cd3_mafia_JC.exe
-
Size
486KB
-
MD5
8196873212130232d5b50758335a0cd3
-
SHA1
73a8016263d46dfddf65b7923dec1f51aad490a3
-
SHA256
516b675c9521201cad7ef23979efa22e684c6c2e2bdcbf58041863f195212024
-
SHA512
f7e0148a5d0958d89c99ea233b1a422ee51ae743b7a9dbbf4cea06101e76238037974a868818fc30f94fa99774dd8e19607e43ed52b2f604715df1f599700110
-
SSDEEP
12288:/U5rCOTeiDw1vDstTrBaoK+k3Ptl7o5NZ:/UQOJDGLkButl7oN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2248 B9EA.tmp 3372 BAC4.tmp 4148 BB8F.tmp 4820 BC89.tmp 3168 BD74.tmp 4168 BE2F.tmp 3040 BECC.tmp 4492 BF87.tmp 5112 C023.tmp 832 C0CF.tmp 1792 C18B.tmp 436 C217.tmp 3420 C2C3.tmp 408 C563.tmp 2068 C5FF.tmp 4080 C719.tmp 4792 C7E4.tmp 4936 C8ED.tmp 2844 C999.tmp 444 CA64.tmp 3788 CB4F.tmp 2936 CC49.tmp 892 CD43.tmp 456 CE0E.tmp 2216 CED9.tmp 5096 CFF2.tmp 4512 D09E.tmp 4248 D13A.tmp 4592 D1E6.tmp 3712 D2A2.tmp 4364 D35D.tmp 3132 D419.tmp 324 D503.tmp 2320 D5BF.tmp 4012 D699.tmp 1076 D736.tmp 1552 D7E1.tmp 2712 D86E.tmp 1508 DA72.tmp 2900 DB2D.tmp 3036 DBE9.tmp 232 DC95.tmp 2236 DD40.tmp 4444 DE1B.tmp 1640 DEB7.tmp 3564 DF73.tmp 4620 E06D.tmp 4304 E109.tmp 4296 E1A5.tmp 844 E242.tmp 3684 E2DE.tmp 4032 E399.tmp 3488 E4E2.tmp 4496 E56E.tmp 2924 E60A.tmp 3056 E697.tmp 3372 E791.tmp 2592 E83D.tmp 3416 E8CA.tmp 4536 E947.tmp 4848 E9C4.tmp 5112 EA41.tmp 4648 EACD.tmp 1792 EB79.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2248 1544 8196873212130232d5b50758335a0cd3_mafia_JC.exe 81 PID 1544 wrote to memory of 2248 1544 8196873212130232d5b50758335a0cd3_mafia_JC.exe 81 PID 1544 wrote to memory of 2248 1544 8196873212130232d5b50758335a0cd3_mafia_JC.exe 81 PID 2248 wrote to memory of 3372 2248 B9EA.tmp 82 PID 2248 wrote to memory of 3372 2248 B9EA.tmp 82 PID 2248 wrote to memory of 3372 2248 B9EA.tmp 82 PID 3372 wrote to memory of 4148 3372 BAC4.tmp 83 PID 3372 wrote to memory of 4148 3372 BAC4.tmp 83 PID 3372 wrote to memory of 4148 3372 BAC4.tmp 83 PID 4148 wrote to memory of 4820 4148 BB8F.tmp 84 PID 4148 wrote to memory of 4820 4148 BB8F.tmp 84 PID 4148 wrote to memory of 4820 4148 BB8F.tmp 84 PID 4820 wrote to memory of 3168 4820 BC89.tmp 85 PID 4820 wrote to memory of 3168 4820 BC89.tmp 85 PID 4820 wrote to memory of 3168 4820 BC89.tmp 85 PID 3168 wrote to memory of 4168 3168 BD74.tmp 86 PID 3168 wrote to memory of 4168 3168 BD74.tmp 86 PID 3168 wrote to memory of 4168 3168 BD74.tmp 86 PID 4168 wrote to memory of 3040 4168 BE2F.tmp 87 PID 4168 wrote to memory of 3040 4168 BE2F.tmp 87 PID 4168 wrote to memory of 3040 4168 BE2F.tmp 87 PID 3040 wrote to memory of 4492 3040 BECC.tmp 88 PID 3040 wrote to memory of 4492 3040 BECC.tmp 88 PID 3040 wrote to memory of 4492 3040 BECC.tmp 88 PID 4492 wrote to memory of 5112 4492 BF87.tmp 89 PID 4492 wrote to memory of 5112 4492 BF87.tmp 89 PID 4492 wrote to memory of 5112 4492 BF87.tmp 89 PID 5112 wrote to memory of 832 5112 C023.tmp 90 PID 5112 wrote to memory of 832 5112 C023.tmp 90 PID 5112 wrote to memory of 832 5112 C023.tmp 90 PID 832 wrote to memory of 1792 832 C0CF.tmp 92 PID 832 wrote to memory of 1792 832 C0CF.tmp 92 PID 832 wrote to memory of 1792 832 C0CF.tmp 92 PID 1792 wrote to memory of 436 1792 C18B.tmp 93 PID 1792 wrote to memory of 436 1792 C18B.tmp 93 PID 1792 wrote to memory of 436 1792 C18B.tmp 93 PID 436 wrote to memory of 3420 436 C217.tmp 94 PID 436 wrote to memory of 3420 436 C217.tmp 94 PID 436 wrote to memory of 3420 436 C217.tmp 94 PID 3420 wrote to memory of 408 3420 C2C3.tmp 95 PID 3420 wrote to memory of 408 3420 C2C3.tmp 95 PID 3420 wrote to memory of 408 3420 C2C3.tmp 95 PID 408 wrote to memory of 2068 408 C563.tmp 96 PID 408 wrote to memory of 2068 408 C563.tmp 96 PID 408 wrote to memory of 2068 408 C563.tmp 96 PID 2068 wrote to memory of 4080 2068 C5FF.tmp 97 PID 2068 wrote to memory of 4080 2068 C5FF.tmp 97 PID 2068 wrote to memory of 4080 2068 C5FF.tmp 97 PID 4080 wrote to memory of 4792 4080 C719.tmp 98 PID 4080 wrote to memory of 4792 4080 C719.tmp 98 PID 4080 wrote to memory of 4792 4080 C719.tmp 98 PID 4792 wrote to memory of 4936 4792 C7E4.tmp 99 PID 4792 wrote to memory of 4936 4792 C7E4.tmp 99 PID 4792 wrote to memory of 4936 4792 C7E4.tmp 99 PID 4936 wrote to memory of 2844 4936 C8ED.tmp 100 PID 4936 wrote to memory of 2844 4936 C8ED.tmp 100 PID 4936 wrote to memory of 2844 4936 C8ED.tmp 100 PID 2844 wrote to memory of 444 2844 C999.tmp 101 PID 2844 wrote to memory of 444 2844 C999.tmp 101 PID 2844 wrote to memory of 444 2844 C999.tmp 101 PID 444 wrote to memory of 3788 444 CA64.tmp 102 PID 444 wrote to memory of 3788 444 CA64.tmp 102 PID 444 wrote to memory of 3788 444 CA64.tmp 102 PID 3788 wrote to memory of 2936 3788 CB4F.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\8196873212130232d5b50758335a0cd3_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\8196873212130232d5b50758335a0cd3_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\BC89.tmp"C:\Users\Admin\AppData\Local\Temp\BC89.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\BD74.tmp"C:\Users\Admin\AppData\Local\Temp\BD74.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\C217.tmp"C:\Users\Admin\AppData\Local\Temp\C217.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\C563.tmp"C:\Users\Admin\AppData\Local\Temp\C563.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\C7E4.tmp"C:\Users\Admin\AppData\Local\Temp\C7E4.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\CA64.tmp"C:\Users\Admin\AppData\Local\Temp\CA64.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\CC49.tmp"C:\Users\Admin\AppData\Local\Temp\CC49.tmp"23⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"24⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"25⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\CED9.tmp"C:\Users\Admin\AppData\Local\Temp\CED9.tmp"26⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"27⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\D09E.tmp"C:\Users\Admin\AppData\Local\Temp\D09E.tmp"28⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\D13A.tmp"C:\Users\Admin\AppData\Local\Temp\D13A.tmp"29⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"30⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"31⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\D35D.tmp"C:\Users\Admin\AppData\Local\Temp\D35D.tmp"32⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"33⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"34⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"35⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"36⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"37⤵
- Executes dropped EXE
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"38⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\D86E.tmp"C:\Users\Admin\AppData\Local\Temp\D86E.tmp"39⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"40⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"41⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"42⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"43⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\DD40.tmp"C:\Users\Admin\AppData\Local\Temp\DD40.tmp"44⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"45⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"46⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\DF73.tmp"C:\Users\Admin\AppData\Local\Temp\DF73.tmp"47⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\E06D.tmp"C:\Users\Admin\AppData\Local\Temp\E06D.tmp"48⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"49⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\E1A5.tmp"C:\Users\Admin\AppData\Local\Temp\E1A5.tmp"50⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"51⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"52⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\E399.tmp"C:\Users\Admin\AppData\Local\Temp\E399.tmp"53⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\E436.tmp"C:\Users\Admin\AppData\Local\Temp\E436.tmp"54⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"55⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"56⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\E60A.tmp"C:\Users\Admin\AppData\Local\Temp\E60A.tmp"57⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"58⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"59⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"60⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"61⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"62⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"63⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"64⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\EACD.tmp"C:\Users\Admin\AppData\Local\Temp\EACD.tmp"65⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\EB79.tmp"C:\Users\Admin\AppData\Local\Temp\EB79.tmp"66⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"67⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"68⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"69⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\EE57.tmp"C:\Users\Admin\AppData\Local\Temp\EE57.tmp"70⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"71⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"72⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\F00D.tmp"C:\Users\Admin\AppData\Local\Temp\F00D.tmp"73⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\F08A.tmp"C:\Users\Admin\AppData\Local\Temp\F08A.tmp"74⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"75⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"76⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"77⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\F32A.tmp"C:\Users\Admin\AppData\Local\Temp\F32A.tmp"78⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"79⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\F453.tmp"C:\Users\Admin\AppData\Local\Temp\F453.tmp"80⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"81⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"82⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"83⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\F656.tmp"C:\Users\Admin\AppData\Local\Temp\F656.tmp"84⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"85⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\F770.tmp"C:\Users\Admin\AppData\Local\Temp\F770.tmp"86⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"87⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"88⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\F915.tmp"C:\Users\Admin\AppData\Local\Temp\F915.tmp"89⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"90⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"91⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"92⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"93⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"94⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"95⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"96⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"97⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"98⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"99⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\2A.tmp"C:\Users\Admin\AppData\Local\Temp\2A.tmp"100⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"101⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"102⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"103⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"104⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"105⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3D3.tmp"C:\Users\Admin\AppData\Local\Temp\3D3.tmp"106⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"107⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"108⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"109⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\644.tmp"C:\Users\Admin\AppData\Local\Temp\644.tmp"110⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"111⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\79C.tmp"C:\Users\Admin\AppData\Local\Temp\79C.tmp"112⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"113⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\8B5.tmp"C:\Users\Admin\AppData\Local\Temp\8B5.tmp"114⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"115⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"116⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"117⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\B07.tmp"C:\Users\Admin\AppData\Local\Temp\B07.tmp"118⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"119⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\C30.tmp"C:\Users\Admin\AppData\Local\Temp\C30.tmp"120⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"121⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"122⤵PID:4740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-