Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 15:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe
-
Size
488KB
-
MD5
5855fa3c6bb4b10c608a228804049d7e
-
SHA1
81acd421b5e161eca7d5e0be17099789d1591186
-
SHA256
2c1341588f7b2a716ad0a39970a73110aede7337b07f51d7a0918ae3c0d9ed1c
-
SHA512
0661bedf60a3d4b621042fe9c7c8fda1b966c4b40e5f928d80a06d134ca432cb6761d46f7a08745d43bbd5019865be9db9ee8712fb0221ac363bbd85d6c86b67
-
SSDEEP
12288:/U5rCOTeiDVK7Hn6EdD6geXycerXTqgNZ:/UQOJDVKzLKXycOXGgN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4184 B1DB.tmp 3084 B2A6.tmp 2812 B362.tmp 4240 B43C.tmp 4664 B4F8.tmp 1992 B5D3.tmp 5076 B68E.tmp 3164 B72A.tmp 4452 B7E6.tmp 3252 B8A1.tmp 3968 B98C.tmp 3552 BA76.tmp 3684 BB51.tmp 872 BBED.tmp 3288 BE3F.tmp 4996 BF39.tmp 5020 BFF4.tmp 1204 C0C0.tmp 4476 C1AA.tmp 3956 C256.tmp 4524 C302.tmp 3844 C3DC.tmp 1520 C488.tmp 2236 C582.tmp 4512 C67C.tmp 1792 C738.tmp 4964 C832.tmp 2128 C8DE.tmp 2096 C9A9.tmp 1576 CA74.tmp 2860 CB2F.tmp 2224 CC68.tmp 4472 CD52.tmp 2332 CE1D.tmp 1136 CE8B.tmp 4692 CF46.tmp 2092 CFD3.tmp 3232 D08E.tmp 572 D13A.tmp 5016 D32E.tmp 2932 D3EA.tmp 4652 D476.tmp 4132 D513.tmp 1784 D5AF.tmp 4040 D65B.tmp 1352 D6F7.tmp 4324 D7D2.tmp 1980 D85E.tmp 1480 D939.tmp 3868 D9E5.tmp 3836 DA81.tmp 1700 DB3D.tmp 672 DC18.tmp 2624 DCB4.tmp 3384 DDEC.tmp 1856 DEB7.tmp 4592 DF44.tmp 3280 DFF0.tmp 3344 E09C.tmp 4664 E148.tmp 4600 E1E4.tmp 824 E271.tmp 4700 E2EE.tmp 404 E37A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4184 4936 5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe 80 PID 4936 wrote to memory of 4184 4936 5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe 80 PID 4936 wrote to memory of 4184 4936 5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe 80 PID 4184 wrote to memory of 3084 4184 B1DB.tmp 81 PID 4184 wrote to memory of 3084 4184 B1DB.tmp 81 PID 4184 wrote to memory of 3084 4184 B1DB.tmp 81 PID 3084 wrote to memory of 2812 3084 B2A6.tmp 82 PID 3084 wrote to memory of 2812 3084 B2A6.tmp 82 PID 3084 wrote to memory of 2812 3084 B2A6.tmp 82 PID 2812 wrote to memory of 4240 2812 B362.tmp 83 PID 2812 wrote to memory of 4240 2812 B362.tmp 83 PID 2812 wrote to memory of 4240 2812 B362.tmp 83 PID 4240 wrote to memory of 4664 4240 B43C.tmp 84 PID 4240 wrote to memory of 4664 4240 B43C.tmp 84 PID 4240 wrote to memory of 4664 4240 B43C.tmp 84 PID 4664 wrote to memory of 1992 4664 B4F8.tmp 85 PID 4664 wrote to memory of 1992 4664 B4F8.tmp 85 PID 4664 wrote to memory of 1992 4664 B4F8.tmp 85 PID 1992 wrote to memory of 5076 1992 B5D3.tmp 86 PID 1992 wrote to memory of 5076 1992 B5D3.tmp 86 PID 1992 wrote to memory of 5076 1992 B5D3.tmp 86 PID 5076 wrote to memory of 3164 5076 B68E.tmp 87 PID 5076 wrote to memory of 3164 5076 B68E.tmp 87 PID 5076 wrote to memory of 3164 5076 B68E.tmp 87 PID 3164 wrote to memory of 4452 3164 B72A.tmp 88 PID 3164 wrote to memory of 4452 3164 B72A.tmp 88 PID 3164 wrote to memory of 4452 3164 B72A.tmp 88 PID 4452 wrote to memory of 3252 4452 B7E6.tmp 89 PID 4452 wrote to memory of 3252 4452 B7E6.tmp 89 PID 4452 wrote to memory of 3252 4452 B7E6.tmp 89 PID 3252 wrote to memory of 3968 3252 B8A1.tmp 90 PID 3252 wrote to memory of 3968 3252 B8A1.tmp 90 PID 3252 wrote to memory of 3968 3252 B8A1.tmp 90 PID 3968 wrote to memory of 3552 3968 B98C.tmp 92 PID 3968 wrote to memory of 3552 3968 B98C.tmp 92 PID 3968 wrote to memory of 3552 3968 B98C.tmp 92 PID 3552 wrote to memory of 3684 3552 BA76.tmp 93 PID 3552 wrote to memory of 3684 3552 BA76.tmp 93 PID 3552 wrote to memory of 3684 3552 BA76.tmp 93 PID 3684 wrote to memory of 872 3684 BB51.tmp 94 PID 3684 wrote to memory of 872 3684 BB51.tmp 94 PID 3684 wrote to memory of 872 3684 BB51.tmp 94 PID 872 wrote to memory of 3288 872 BBED.tmp 95 PID 872 wrote to memory of 3288 872 BBED.tmp 95 PID 872 wrote to memory of 3288 872 BBED.tmp 95 PID 3288 wrote to memory of 4996 3288 BE3F.tmp 96 PID 3288 wrote to memory of 4996 3288 BE3F.tmp 96 PID 3288 wrote to memory of 4996 3288 BE3F.tmp 96 PID 4996 wrote to memory of 5020 4996 BF39.tmp 97 PID 4996 wrote to memory of 5020 4996 BF39.tmp 97 PID 4996 wrote to memory of 5020 4996 BF39.tmp 97 PID 5020 wrote to memory of 1204 5020 BFF4.tmp 98 PID 5020 wrote to memory of 1204 5020 BFF4.tmp 98 PID 5020 wrote to memory of 1204 5020 BFF4.tmp 98 PID 1204 wrote to memory of 4476 1204 C0C0.tmp 99 PID 1204 wrote to memory of 4476 1204 C0C0.tmp 99 PID 1204 wrote to memory of 4476 1204 C0C0.tmp 99 PID 4476 wrote to memory of 3956 4476 C1AA.tmp 100 PID 4476 wrote to memory of 3956 4476 C1AA.tmp 100 PID 4476 wrote to memory of 3956 4476 C1AA.tmp 100 PID 3956 wrote to memory of 4524 3956 C256.tmp 103 PID 3956 wrote to memory of 4524 3956 C256.tmp 103 PID 3956 wrote to memory of 4524 3956 C256.tmp 103 PID 4524 wrote to memory of 3844 4524 C302.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\5855fa3c6bb4b10c608a228804049d7e_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\B43C.tmp"C:\Users\Admin\AppData\Local\Temp\B43C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\B72A.tmp"C:\Users\Admin\AppData\Local\Temp\B72A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\B98C.tmp"C:\Users\Admin\AppData\Local\Temp\B98C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\BA76.tmp"C:\Users\Admin\AppData\Local\Temp\BA76.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\C1AA.tmp"C:\Users\Admin\AppData\Local\Temp\C1AA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\C256.tmp"C:\Users\Admin\AppData\Local\Temp\C256.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\C302.tmp"C:\Users\Admin\AppData\Local\Temp\C302.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"23⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\C488.tmp"C:\Users\Admin\AppData\Local\Temp\C488.tmp"24⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\C582.tmp"C:\Users\Admin\AppData\Local\Temp\C582.tmp"25⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"26⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"27⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\C832.tmp"C:\Users\Admin\AppData\Local\Temp\C832.tmp"28⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\C8DE.tmp"C:\Users\Admin\AppData\Local\Temp\C8DE.tmp"29⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"30⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\CA74.tmp"C:\Users\Admin\AppData\Local\Temp\CA74.tmp"31⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"32⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"33⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"34⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"35⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"36⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"37⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"38⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"39⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\D13A.tmp"C:\Users\Admin\AppData\Local\Temp\D13A.tmp"40⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"41⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\D3EA.tmp"C:\Users\Admin\AppData\Local\Temp\D3EA.tmp"42⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"43⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"44⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"45⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"46⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"47⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"48⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"49⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\D939.tmp"C:\Users\Admin\AppData\Local\Temp\D939.tmp"50⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"51⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\DA81.tmp"C:\Users\Admin\AppData\Local\Temp\DA81.tmp"52⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"53⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"54⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"55⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\DD50.tmp"C:\Users\Admin\AppData\Local\Temp\DD50.tmp"56⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"57⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"58⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"59⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"60⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\E09C.tmp"C:\Users\Admin\AppData\Local\Temp\E09C.tmp"61⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"62⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"C:\Users\Admin\AppData\Local\Temp\E1E4.tmp"63⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\E271.tmp"C:\Users\Admin\AppData\Local\Temp\E271.tmp"64⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"65⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\E37A.tmp"C:\Users\Admin\AppData\Local\Temp\E37A.tmp"66⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"67⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"68⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"69⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"70⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\E60A.tmp"C:\Users\Admin\AppData\Local\Temp\E60A.tmp"71⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"72⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"73⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"74⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"75⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"76⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"77⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"78⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"79⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"80⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"81⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\EDBB.tmp"C:\Users\Admin\AppData\Local\Temp\EDBB.tmp"82⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"83⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"84⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"85⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"86⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"87⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"88⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\F23F.tmp"C:\Users\Admin\AppData\Local\Temp\F23F.tmp"89⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"90⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\F368.tmp"C:\Users\Admin\AppData\Local\Temp\F368.tmp"91⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"92⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\F491.tmp"C:\Users\Admin\AppData\Local\Temp\F491.tmp"93⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"94⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"95⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"96⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\F721.tmp"C:\Users\Admin\AppData\Local\Temp\F721.tmp"97⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"98⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\F83B.tmp"C:\Users\Admin\AppData\Local\Temp\F83B.tmp"99⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"100⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"101⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"102⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"103⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"104⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"105⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"106⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"107⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\FE65.tmp"C:\Users\Admin\AppData\Local\Temp\FE65.tmp"108⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"109⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"110⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"111⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"112⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"113⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"114⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"115⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\3B4.tmp"C:\Users\Admin\AppData\Local\Temp\3B4.tmp"116⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\470.tmp"C:\Users\Admin\AppData\Local\Temp\470.tmp"117⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"118⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\5E7.tmp"C:\Users\Admin\AppData\Local\Temp\5E7.tmp"119⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\683.tmp"C:\Users\Admin\AppData\Local\Temp\683.tmp"120⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"121⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"122⤵PID:3280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-