Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 13:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe
-
Size
527KB
-
MD5
a19c47809f75e5dff7f771317ca43bd5
-
SHA1
91ac855519ae988e653c7172c637559a5dc6e108
-
SHA256
410a3ae9f17b091bee69715e592f1432b1d318f3a8e7af4ba03b8a748b5d8529
-
SHA512
8dcce49ad4aeec6377edb8b7439eb091465421a4e1affb9d9d7e4968d18ec23013aaabdc60b479b1356ccf1cb87ef2ce38fa434375fafe7b0f92f1d24718a36a
-
SSDEEP
12288:fU5rCOTeidWQ537w7GWIREnQJpZDQnAkSFDZu:fUQOJdx37dW1nDMFDo
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4524 BF29.tmp 456 C071.tmp 4048 C14C.tmp 1644 C285.tmp 3944 C35F.tmp 356 C44A.tmp 3796 C515.tmp 4900 C5D0.tmp 3916 C6BB.tmp 1448 C861.tmp 2796 C91C.tmp 3424 C9D8.tmp 5000 CAC2.tmp 3128 CB9D.tmp 4100 CC78.tmp 100 CD52.tmp 724 CE2D.tmp 4312 CF08.tmp 3544 D011.tmp 4872 D0CD.tmp 4792 D1A8.tmp 3628 D263.tmp 2712 D31F.tmp 2284 D409.tmp 2872 D4D4.tmp 2384 D5AF.tmp 3368 D66A.tmp 4436 D736.tmp 1292 D820.tmp 4712 D90A.tmp 4660 D9E5.tmp 4800 DA91.tmp 2604 DB9B.tmp 3232 DC66.tmp 1972 DD7F.tmp 4308 DE1B.tmp 4376 DEB7.tmp 2324 DF34.tmp 3140 DFF0.tmp 2908 E07D.tmp 3464 E109.tmp 1636 E177.tmp 3324 E213.tmp 2340 E2AF.tmp 3744 E33C.tmp 3372 E3F7.tmp 2084 E4C2.tmp 2636 E56E.tmp 3480 E62A.tmp 1112 E6E5.tmp 2640 E7B0.tmp 4092 E86C.tmp 4280 E918.tmp 4264 E9A4.tmp 4824 EA41.tmp 5096 EAEC.tmp 4008 EBB8.tmp 2660 EC44.tmp 504 ECD1.tmp 3804 ED5D.tmp 2720 EDFA.tmp 2396 EE96.tmp 2436 EF23.tmp 3780 EFBF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 4524 3976 a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe 81 PID 3976 wrote to memory of 4524 3976 a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe 81 PID 3976 wrote to memory of 4524 3976 a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe 81 PID 4524 wrote to memory of 456 4524 BF29.tmp 82 PID 4524 wrote to memory of 456 4524 BF29.tmp 82 PID 4524 wrote to memory of 456 4524 BF29.tmp 82 PID 456 wrote to memory of 4048 456 C071.tmp 83 PID 456 wrote to memory of 4048 456 C071.tmp 83 PID 456 wrote to memory of 4048 456 C071.tmp 83 PID 4048 wrote to memory of 1644 4048 C14C.tmp 84 PID 4048 wrote to memory of 1644 4048 C14C.tmp 84 PID 4048 wrote to memory of 1644 4048 C14C.tmp 84 PID 1644 wrote to memory of 3944 1644 C285.tmp 85 PID 1644 wrote to memory of 3944 1644 C285.tmp 85 PID 1644 wrote to memory of 3944 1644 C285.tmp 85 PID 3944 wrote to memory of 356 3944 C35F.tmp 86 PID 3944 wrote to memory of 356 3944 C35F.tmp 86 PID 3944 wrote to memory of 356 3944 C35F.tmp 86 PID 356 wrote to memory of 3796 356 C44A.tmp 87 PID 356 wrote to memory of 3796 356 C44A.tmp 87 PID 356 wrote to memory of 3796 356 C44A.tmp 87 PID 3796 wrote to memory of 4900 3796 C515.tmp 88 PID 3796 wrote to memory of 4900 3796 C515.tmp 88 PID 3796 wrote to memory of 4900 3796 C515.tmp 88 PID 4900 wrote to memory of 3916 4900 C5D0.tmp 89 PID 4900 wrote to memory of 3916 4900 C5D0.tmp 89 PID 4900 wrote to memory of 3916 4900 C5D0.tmp 89 PID 3916 wrote to memory of 1448 3916 C6BB.tmp 91 PID 3916 wrote to memory of 1448 3916 C6BB.tmp 91 PID 3916 wrote to memory of 1448 3916 C6BB.tmp 91 PID 1448 wrote to memory of 2796 1448 C861.tmp 92 PID 1448 wrote to memory of 2796 1448 C861.tmp 92 PID 1448 wrote to memory of 2796 1448 C861.tmp 92 PID 2796 wrote to memory of 3424 2796 C91C.tmp 93 PID 2796 wrote to memory of 3424 2796 C91C.tmp 93 PID 2796 wrote to memory of 3424 2796 C91C.tmp 93 PID 3424 wrote to memory of 5000 3424 C9D8.tmp 94 PID 3424 wrote to memory of 5000 3424 C9D8.tmp 94 PID 3424 wrote to memory of 5000 3424 C9D8.tmp 94 PID 5000 wrote to memory of 3128 5000 CAC2.tmp 95 PID 5000 wrote to memory of 3128 5000 CAC2.tmp 95 PID 5000 wrote to memory of 3128 5000 CAC2.tmp 95 PID 3128 wrote to memory of 4100 3128 CB9D.tmp 96 PID 3128 wrote to memory of 4100 3128 CB9D.tmp 96 PID 3128 wrote to memory of 4100 3128 CB9D.tmp 96 PID 4100 wrote to memory of 100 4100 CC78.tmp 97 PID 4100 wrote to memory of 100 4100 CC78.tmp 97 PID 4100 wrote to memory of 100 4100 CC78.tmp 97 PID 100 wrote to memory of 724 100 CD52.tmp 98 PID 100 wrote to memory of 724 100 CD52.tmp 98 PID 100 wrote to memory of 724 100 CD52.tmp 98 PID 724 wrote to memory of 4312 724 CE2D.tmp 99 PID 724 wrote to memory of 4312 724 CE2D.tmp 99 PID 724 wrote to memory of 4312 724 CE2D.tmp 99 PID 4312 wrote to memory of 3544 4312 CF08.tmp 102 PID 4312 wrote to memory of 3544 4312 CF08.tmp 102 PID 4312 wrote to memory of 3544 4312 CF08.tmp 102 PID 3544 wrote to memory of 4872 3544 D011.tmp 103 PID 3544 wrote to memory of 4872 3544 D011.tmp 103 PID 3544 wrote to memory of 4872 3544 D011.tmp 103 PID 4872 wrote to memory of 4792 4872 D0CD.tmp 104 PID 4872 wrote to memory of 4792 4872 D0CD.tmp 104 PID 4872 wrote to memory of 4792 4872 D0CD.tmp 104 PID 4792 wrote to memory of 3628 4792 D1A8.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\a19c47809f75e5dff7f771317ca43bd5_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\C35F.tmp"C:\Users\Admin\AppData\Local\Temp\C35F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Users\Admin\AppData\Local\Temp\C515.tmp"C:\Users\Admin\AppData\Local\Temp\C515.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\C5D0.tmp"C:\Users\Admin\AppData\Local\Temp\C5D0.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\C6BB.tmp"C:\Users\Admin\AppData\Local\Temp\C6BB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\C861.tmp"C:\Users\Admin\AppData\Local\Temp\C861.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\C91C.tmp"C:\Users\Admin\AppData\Local\Temp\C91C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\CF08.tmp"C:\Users\Admin\AppData\Local\Temp\CF08.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\D263.tmp"C:\Users\Admin\AppData\Local\Temp\D263.tmp"23⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"24⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\D409.tmp"C:\Users\Admin\AppData\Local\Temp\D409.tmp"25⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"26⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"27⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\D66A.tmp"C:\Users\Admin\AppData\Local\Temp\D66A.tmp"28⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"29⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"30⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"31⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"32⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"33⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"34⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"35⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"36⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"37⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"38⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"39⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"40⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\E07D.tmp"C:\Users\Admin\AppData\Local\Temp\E07D.tmp"41⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"42⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"43⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\E213.tmp"C:\Users\Admin\AppData\Local\Temp\E213.tmp"44⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"45⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"46⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"47⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"48⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"49⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\E62A.tmp"C:\Users\Admin\AppData\Local\Temp\E62A.tmp"50⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"51⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"52⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\E86C.tmp"C:\Users\Admin\AppData\Local\Temp\E86C.tmp"53⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\E918.tmp"C:\Users\Admin\AppData\Local\Temp\E918.tmp"54⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"55⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"56⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"57⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"58⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\EC44.tmp"C:\Users\Admin\AppData\Local\Temp\EC44.tmp"59⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\ECD1.tmp"C:\Users\Admin\AppData\Local\Temp\ECD1.tmp"60⤵
- Executes dropped EXE
PID:504 -
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"61⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"62⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"63⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"64⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"65⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"66⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"67⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\F184.tmp"C:\Users\Admin\AppData\Local\Temp\F184.tmp"68⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\F23F.tmp"C:\Users\Admin\AppData\Local\Temp\F23F.tmp"69⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"70⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\F368.tmp"C:\Users\Admin\AppData\Local\Temp\F368.tmp"71⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"72⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"73⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"74⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"75⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"76⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\F712.tmp"C:\Users\Admin\AppData\Local\Temp\F712.tmp"77⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"78⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\F889.tmp"C:\Users\Admin\AppData\Local\Temp\F889.tmp"79⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"80⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\F964.tmp"C:\Users\Admin\AppData\Local\Temp\F964.tmp"81⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"82⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"83⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\FB29.tmp"C:\Users\Admin\AppData\Local\Temp\FB29.tmp"84⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\FB96.tmp"C:\Users\Admin\AppData\Local\Temp\FB96.tmp"85⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"86⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"87⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"88⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\FE46.tmp"C:\Users\Admin\AppData\Local\Temp\FE46.tmp"89⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\FED2.tmp"C:\Users\Admin\AppData\Local\Temp\FED2.tmp"90⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"91⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\3A.tmp"C:\Users\Admin\AppData\Local\Temp\3A.tmp"92⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\E5.tmp"C:\Users\Admin\AppData\Local\Temp\E5.tmp"93⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\182.tmp"C:\Users\Admin\AppData\Local\Temp\182.tmp"94⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"95⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"96⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"97⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3D3.tmp"C:\Users\Admin\AppData\Local\Temp\3D3.tmp"98⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\4AE.tmp"C:\Users\Admin\AppData\Local\Temp\4AE.tmp"99⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"100⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\635.tmp"C:\Users\Admin\AppData\Local\Temp\635.tmp"101⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"102⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"103⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"104⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"105⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"106⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"107⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\AD8.tmp"C:\Users\Admin\AppData\Local\Temp\AD8.tmp"108⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"109⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\C5F.tmp"C:\Users\Admin\AppData\Local\Temp\C5F.tmp"110⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"111⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\DB7.tmp"C:\Users\Admin\AppData\Local\Temp\DB7.tmp"112⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\E43.tmp"C:\Users\Admin\AppData\Local\Temp\E43.tmp"113⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\EFF.tmp"C:\Users\Admin\AppData\Local\Temp\EFF.tmp"114⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"115⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"116⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"117⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\11CE.tmp"C:\Users\Admin\AppData\Local\Temp\11CE.tmp"118⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"119⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp"120⤵PID:504
-
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"121⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"122⤵PID:3952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-