Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 16:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe
-
Size
486KB
-
MD5
f6ac6d6e0283e63d1b0121b65a08ddac
-
SHA1
f7421bde047fa52f9db3e46d4783ee23ef492ab6
-
SHA256
9dd0e1f94eb2aa2fb439d96a3dfa6920545de404aa71647e4b987fd4296e370c
-
SHA512
ce373c4874e79ff79e66957e9cde9ce86c9f40ef1b79285e287090f3c0f4987d42033db3c40b44c57872fda34367b3bda9abbdacf77f42be5eb0f262ca7ed082
-
SSDEEP
12288:UU5rCOTeiDiCzRWzvQ8C8jlM9uqUafkKl/NZ:UUQOJDiMm4HZZN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 656 BCD8.tmp 2512 BDC2.tmp 4148 BE7D.tmp 4912 BFA6.tmp 1128 C043.tmp 4168 C11D.tmp 3040 C1D9.tmp 4492 C275.tmp 5112 C311.tmp 3648 C553.tmp 1380 C5E0.tmp 496 C67C.tmp 3412 C757.tmp 2004 C832.tmp 1700 C8ED.tmp 2308 C9C8.tmp 1572 CA64.tmp 4936 CB2F.tmp 1480 CBCC.tmp 444 CC78.tmp 2376 CD14.tmp 3308 CDA0.tmp 2944 CE6C.tmp 460 CF46.tmp 4972 D031.tmp 3452 D12B.tmp 2640 D1E6.tmp 3220 D282.tmp 2224 D39C.tmp 936 D448.tmp 1716 D551.tmp 2820 D62C.tmp 1592 D726.tmp 4968 D7E1.tmp 4732 D88D.tmp 4456 D90A.tmp 240 D997.tmp 4816 DA33.tmp 3656 DB0E.tmp 2996 DB9B.tmp 3036 DC37.tmp 232 DCC3.tmp 4900 DD60.tmp 4656 DDDD.tmp 4596 DE79.tmp 2052 DF34.tmp 4208 DFC1.tmp 4620 E03E.tmp 1812 E0FA.tmp 836 E1B5.tmp 844 E290.tmp 3048 E35B.tmp 3188 E3D8.tmp 1960 E484.tmp 4496 E530.tmp 4460 E5BC.tmp 3488 E659.tmp 1312 E6F5.tmp 2916 E7A1.tmp 2592 E83D.tmp 1136 E8E9.tmp 3664 E9A4.tmp 4704 EA41.tmp 3604 EACD.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 656 4164 f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe 81 PID 4164 wrote to memory of 656 4164 f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe 81 PID 4164 wrote to memory of 656 4164 f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe 81 PID 656 wrote to memory of 2512 656 BCD8.tmp 82 PID 656 wrote to memory of 2512 656 BCD8.tmp 82 PID 656 wrote to memory of 2512 656 BCD8.tmp 82 PID 2512 wrote to memory of 4148 2512 BDC2.tmp 83 PID 2512 wrote to memory of 4148 2512 BDC2.tmp 83 PID 2512 wrote to memory of 4148 2512 BDC2.tmp 83 PID 4148 wrote to memory of 4912 4148 BE7D.tmp 84 PID 4148 wrote to memory of 4912 4148 BE7D.tmp 84 PID 4148 wrote to memory of 4912 4148 BE7D.tmp 84 PID 4912 wrote to memory of 1128 4912 BFA6.tmp 85 PID 4912 wrote to memory of 1128 4912 BFA6.tmp 85 PID 4912 wrote to memory of 1128 4912 BFA6.tmp 85 PID 1128 wrote to memory of 4168 1128 C043.tmp 86 PID 1128 wrote to memory of 4168 1128 C043.tmp 86 PID 1128 wrote to memory of 4168 1128 C043.tmp 86 PID 4168 wrote to memory of 3040 4168 C11D.tmp 87 PID 4168 wrote to memory of 3040 4168 C11D.tmp 87 PID 4168 wrote to memory of 3040 4168 C11D.tmp 87 PID 3040 wrote to memory of 4492 3040 C1D9.tmp 88 PID 3040 wrote to memory of 4492 3040 C1D9.tmp 88 PID 3040 wrote to memory of 4492 3040 C1D9.tmp 88 PID 4492 wrote to memory of 5112 4492 C275.tmp 89 PID 4492 wrote to memory of 5112 4492 C275.tmp 89 PID 4492 wrote to memory of 5112 4492 C275.tmp 89 PID 5112 wrote to memory of 3648 5112 C311.tmp 91 PID 5112 wrote to memory of 3648 5112 C311.tmp 91 PID 5112 wrote to memory of 3648 5112 C311.tmp 91 PID 3648 wrote to memory of 1380 3648 C553.tmp 92 PID 3648 wrote to memory of 1380 3648 C553.tmp 92 PID 3648 wrote to memory of 1380 3648 C553.tmp 92 PID 1380 wrote to memory of 496 1380 C5E0.tmp 93 PID 1380 wrote to memory of 496 1380 C5E0.tmp 93 PID 1380 wrote to memory of 496 1380 C5E0.tmp 93 PID 496 wrote to memory of 3412 496 C67C.tmp 94 PID 496 wrote to memory of 3412 496 C67C.tmp 94 PID 496 wrote to memory of 3412 496 C67C.tmp 94 PID 3412 wrote to memory of 2004 3412 C757.tmp 95 PID 3412 wrote to memory of 2004 3412 C757.tmp 95 PID 3412 wrote to memory of 2004 3412 C757.tmp 95 PID 2004 wrote to memory of 1700 2004 C832.tmp 96 PID 2004 wrote to memory of 1700 2004 C832.tmp 96 PID 2004 wrote to memory of 1700 2004 C832.tmp 96 PID 1700 wrote to memory of 2308 1700 C8ED.tmp 97 PID 1700 wrote to memory of 2308 1700 C8ED.tmp 97 PID 1700 wrote to memory of 2308 1700 C8ED.tmp 97 PID 2308 wrote to memory of 1572 2308 C9C8.tmp 98 PID 2308 wrote to memory of 1572 2308 C9C8.tmp 98 PID 2308 wrote to memory of 1572 2308 C9C8.tmp 98 PID 1572 wrote to memory of 4936 1572 CA64.tmp 99 PID 1572 wrote to memory of 4936 1572 CA64.tmp 99 PID 1572 wrote to memory of 4936 1572 CA64.tmp 99 PID 4936 wrote to memory of 1480 4936 CB2F.tmp 100 PID 4936 wrote to memory of 1480 4936 CB2F.tmp 100 PID 4936 wrote to memory of 1480 4936 CB2F.tmp 100 PID 1480 wrote to memory of 444 1480 CBCC.tmp 101 PID 1480 wrote to memory of 444 1480 CBCC.tmp 101 PID 1480 wrote to memory of 444 1480 CBCC.tmp 101 PID 444 wrote to memory of 2376 444 CC78.tmp 104 PID 444 wrote to memory of 2376 444 CC78.tmp 104 PID 444 wrote to memory of 2376 444 CC78.tmp 104 PID 2376 wrote to memory of 3308 2376 CD14.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\f6ac6d6e0283e63d1b0121b65a08ddac_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\BDC2.tmp"C:\Users\Admin\AppData\Local\Temp\BDC2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\C043.tmp"C:\Users\Admin\AppData\Local\Temp\C043.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\C275.tmp"C:\Users\Admin\AppData\Local\Temp\C275.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\C311.tmp"C:\Users\Admin\AppData\Local\Temp\C311.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\C553.tmp"C:\Users\Admin\AppData\Local\Temp\C553.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\C832.tmp"C:\Users\Admin\AppData\Local\Temp\C832.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\CA64.tmp"C:\Users\Admin\AppData\Local\Temp\CA64.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\CD14.tmp"C:\Users\Admin\AppData\Local\Temp\CD14.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"23⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\CE6C.tmp"C:\Users\Admin\AppData\Local\Temp\CE6C.tmp"24⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"25⤵
- Executes dropped EXE
PID:460 -
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"26⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\D12B.tmp"C:\Users\Admin\AppData\Local\Temp\D12B.tmp"27⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"28⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\D282.tmp"C:\Users\Admin\AppData\Local\Temp\D282.tmp"29⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"30⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\D448.tmp"C:\Users\Admin\AppData\Local\Temp\D448.tmp"31⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"32⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"33⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\D726.tmp"C:\Users\Admin\AppData\Local\Temp\D726.tmp"34⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"35⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\D88D.tmp"C:\Users\Admin\AppData\Local\Temp\D88D.tmp"36⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"37⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\D997.tmp"C:\Users\Admin\AppData\Local\Temp\D997.tmp"38⤵
- Executes dropped EXE
PID:240 -
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"39⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"40⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"41⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\DC37.tmp"C:\Users\Admin\AppData\Local\Temp\DC37.tmp"42⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"43⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\DD60.tmp"C:\Users\Admin\AppData\Local\Temp\DD60.tmp"44⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"45⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"46⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"47⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"48⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"49⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"50⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"51⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"52⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"53⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"54⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\E484.tmp"C:\Users\Admin\AppData\Local\Temp\E484.tmp"55⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"56⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"57⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\E659.tmp"C:\Users\Admin\AppData\Local\Temp\E659.tmp"58⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"59⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"60⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"61⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\E8E9.tmp"C:\Users\Admin\AppData\Local\Temp\E8E9.tmp"62⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"63⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"64⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\EACD.tmp"C:\Users\Admin\AppData\Local\Temp\EACD.tmp"65⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"66⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"67⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"68⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"69⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"70⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"71⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\EF03.tmp"C:\Users\Admin\AppData\Local\Temp\EF03.tmp"72⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"73⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"74⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\F08A.tmp"C:\Users\Admin\AppData\Local\Temp\F08A.tmp"75⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"76⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"77⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"78⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"79⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"80⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\F453.tmp"C:\Users\Admin\AppData\Local\Temp\F453.tmp"81⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"82⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"83⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"84⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\F656.tmp"C:\Users\Admin\AppData\Local\Temp\F656.tmp"85⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"86⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\F79E.tmp"C:\Users\Admin\AppData\Local\Temp\F79E.tmp"87⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"88⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\F889.tmp"C:\Users\Admin\AppData\Local\Temp\F889.tmp"89⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"90⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\F964.tmp"C:\Users\Admin\AppData\Local\Temp\F964.tmp"91⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"92⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"93⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"94⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"95⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"96⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"97⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"98⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\FF20.tmp"C:\Users\Admin\AppData\Local\Temp\FF20.tmp"99⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"100⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"101⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\172.tmp"C:\Users\Admin\AppData\Local\Temp\172.tmp"102⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"103⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"104⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\318.tmp"C:\Users\Admin\AppData\Local\Temp\318.tmp"105⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"106⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\460.tmp"C:\Users\Admin\AppData\Local\Temp\460.tmp"107⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"108⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\579.tmp"C:\Users\Admin\AppData\Local\Temp\579.tmp"109⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\625.tmp"C:\Users\Admin\AppData\Local\Temp\625.tmp"110⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"111⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\75E.tmp"C:\Users\Admin\AppData\Local\Temp\75E.tmp"112⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"113⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"114⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"115⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\9BF.tmp"C:\Users\Admin\AppData\Local\Temp\9BF.tmp"116⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"117⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\B07.tmp"C:\Users\Admin\AppData\Local\Temp\B07.tmp"118⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"119⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\C11.tmp"C:\Users\Admin\AppData\Local\Temp\C11.tmp"120⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\CAD.tmp"C:\Users\Admin\AppData\Local\Temp\CAD.tmp"121⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"122⤵PID:4912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-