Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 18:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe
-
Size
486KB
-
MD5
1edc0f1b8e7efe38b5f636dfd5d2ceca
-
SHA1
1d4ad96fd0cde2d6fef9c0bea6a751190d19359d
-
SHA256
70f54bd2df7e1137590e42172c0f359d57fc77d7af88775235f957657ff85072
-
SHA512
d54873695664061b2dfe3d30055d1a5887bee52dd55221a6bc07cd168dd49f3c35ff3490073143c8ed1bb80fa650809fe14ca16633f2a4c63254f79c59387a36
-
SSDEEP
12288:/U5rCOTeiDVm1mNKv+KbUP2Z1b12kpnuaW3NZ:/UQOJDV7S+5018J3N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3956 F230.tmp 488 F54D.tmp 1664 F7ED.tmp 4296 F8F6.tmp 4988 F9C1.tmp 4152 FA8C.tmp 2876 FB38.tmp 4744 FBB5.tmp 652 FCAF.tmp 2316 FF5F.tmp 412 B7.tmp 4356 1B1.tmp 1736 337.tmp 860 51C.tmp 1680 700.tmp 2756 A0D.tmp 2224 B75.tmp 4788 C4F.tmp 3664 D0B.tmp 4420 DD6.tmp 4820 EB1.tmp 1632 F4D.tmp 4512 1028.tmp 2760 1102.tmp 2512 11BE.tmp 2768 1289.tmp 780 13A2.tmp 3332 147D.tmp 3456 1539.tmp 3144 1875.tmp 4452 1EFD.tmp 960 1FB8.tmp 2788 220A.tmp 2160 2296.tmp 892 2362.tmp 4832 242D.tmp 212 24E8.tmp 4416 2650.tmp 1752 26FB.tmp 2932 27D6.tmp 648 28A1.tmp 3140 290F.tmp 1060 2A95.tmp 1988 2B32.tmp 3348 2B8F.tmp 4500 2C99.tmp 3580 2D16.tmp 3108 2E10.tmp 5108 2F29.tmp 2480 2FB6.tmp 5052 3042.tmp 4240 314C.tmp 3480 31D9.tmp 1508 3246.tmp 2732 32C3.tmp 1812 344A.tmp 4520 35A1.tmp 216 361E.tmp 4992 369B.tmp 4768 3718.tmp 3740 3812.tmp 408 38AF.tmp 2196 3A83.tmp 4200 3AF1.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3956 1556 1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe 83 PID 1556 wrote to memory of 3956 1556 1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe 83 PID 1556 wrote to memory of 3956 1556 1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe 83 PID 3956 wrote to memory of 488 3956 F230.tmp 84 PID 3956 wrote to memory of 488 3956 F230.tmp 84 PID 3956 wrote to memory of 488 3956 F230.tmp 84 PID 488 wrote to memory of 1664 488 F54D.tmp 85 PID 488 wrote to memory of 1664 488 F54D.tmp 85 PID 488 wrote to memory of 1664 488 F54D.tmp 85 PID 1664 wrote to memory of 4296 1664 F7ED.tmp 86 PID 1664 wrote to memory of 4296 1664 F7ED.tmp 86 PID 1664 wrote to memory of 4296 1664 F7ED.tmp 86 PID 4296 wrote to memory of 4988 4296 F8F6.tmp 87 PID 4296 wrote to memory of 4988 4296 F8F6.tmp 87 PID 4296 wrote to memory of 4988 4296 F8F6.tmp 87 PID 4988 wrote to memory of 4152 4988 F9C1.tmp 88 PID 4988 wrote to memory of 4152 4988 F9C1.tmp 88 PID 4988 wrote to memory of 4152 4988 F9C1.tmp 88 PID 4152 wrote to memory of 2876 4152 FA8C.tmp 89 PID 4152 wrote to memory of 2876 4152 FA8C.tmp 89 PID 4152 wrote to memory of 2876 4152 FA8C.tmp 89 PID 2876 wrote to memory of 4744 2876 FB38.tmp 90 PID 2876 wrote to memory of 4744 2876 FB38.tmp 90 PID 2876 wrote to memory of 4744 2876 FB38.tmp 90 PID 4744 wrote to memory of 652 4744 FBB5.tmp 91 PID 4744 wrote to memory of 652 4744 FBB5.tmp 91 PID 4744 wrote to memory of 652 4744 FBB5.tmp 91 PID 652 wrote to memory of 2316 652 FCAF.tmp 92 PID 652 wrote to memory of 2316 652 FCAF.tmp 92 PID 652 wrote to memory of 2316 652 FCAF.tmp 92 PID 2316 wrote to memory of 412 2316 FF5F.tmp 93 PID 2316 wrote to memory of 412 2316 FF5F.tmp 93 PID 2316 wrote to memory of 412 2316 FF5F.tmp 93 PID 412 wrote to memory of 4356 412 B7.tmp 94 PID 412 wrote to memory of 4356 412 B7.tmp 94 PID 412 wrote to memory of 4356 412 B7.tmp 94 PID 4356 wrote to memory of 1736 4356 1B1.tmp 95 PID 4356 wrote to memory of 1736 4356 1B1.tmp 95 PID 4356 wrote to memory of 1736 4356 1B1.tmp 95 PID 1736 wrote to memory of 860 1736 337.tmp 96 PID 1736 wrote to memory of 860 1736 337.tmp 96 PID 1736 wrote to memory of 860 1736 337.tmp 96 PID 860 wrote to memory of 1680 860 51C.tmp 97 PID 860 wrote to memory of 1680 860 51C.tmp 97 PID 860 wrote to memory of 1680 860 51C.tmp 97 PID 1680 wrote to memory of 2756 1680 700.tmp 98 PID 1680 wrote to memory of 2756 1680 700.tmp 98 PID 1680 wrote to memory of 2756 1680 700.tmp 98 PID 2756 wrote to memory of 2224 2756 A0D.tmp 99 PID 2756 wrote to memory of 2224 2756 A0D.tmp 99 PID 2756 wrote to memory of 2224 2756 A0D.tmp 99 PID 2224 wrote to memory of 4788 2224 B75.tmp 100 PID 2224 wrote to memory of 4788 2224 B75.tmp 100 PID 2224 wrote to memory of 4788 2224 B75.tmp 100 PID 4788 wrote to memory of 3664 4788 C4F.tmp 101 PID 4788 wrote to memory of 3664 4788 C4F.tmp 101 PID 4788 wrote to memory of 3664 4788 C4F.tmp 101 PID 3664 wrote to memory of 4420 3664 D0B.tmp 102 PID 3664 wrote to memory of 4420 3664 D0B.tmp 102 PID 3664 wrote to memory of 4420 3664 D0B.tmp 102 PID 4420 wrote to memory of 4820 4420 DD6.tmp 103 PID 4420 wrote to memory of 4820 4420 DD6.tmp 103 PID 4420 wrote to memory of 4820 4420 DD6.tmp 103 PID 4820 wrote to memory of 1632 4820 EB1.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\1edc0f1b8e7efe38b5f636dfd5d2ceca_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\700.tmp"C:\Users\Admin\AppData\Local\Temp\700.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\A0D.tmp"C:\Users\Admin\AppData\Local\Temp\A0D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\B75.tmp"C:\Users\Admin\AppData\Local\Temp\B75.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\F4D.tmp"C:\Users\Admin\AppData\Local\Temp\F4D.tmp"23⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"24⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"25⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"26⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"27⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"28⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"29⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\1539.tmp"C:\Users\Admin\AppData\Local\Temp\1539.tmp"30⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"31⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\1EFD.tmp"C:\Users\Admin\AppData\Local\Temp\1EFD.tmp"32⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"33⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"34⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"35⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"36⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"37⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\24E8.tmp"C:\Users\Admin\AppData\Local\Temp\24E8.tmp"38⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"39⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\26FB.tmp"C:\Users\Admin\AppData\Local\Temp\26FB.tmp"40⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\27D6.tmp"C:\Users\Admin\AppData\Local\Temp\27D6.tmp"41⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\28A1.tmp"C:\Users\Admin\AppData\Local\Temp\28A1.tmp"42⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\290F.tmp"C:\Users\Admin\AppData\Local\Temp\290F.tmp"43⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"44⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"45⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"46⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\2C99.tmp"C:\Users\Admin\AppData\Local\Temp\2C99.tmp"47⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\2D16.tmp"C:\Users\Admin\AppData\Local\Temp\2D16.tmp"48⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"49⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"50⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"51⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"52⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\314C.tmp"C:\Users\Admin\AppData\Local\Temp\314C.tmp"53⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\31D9.tmp"C:\Users\Admin\AppData\Local\Temp\31D9.tmp"54⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"55⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"56⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"57⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"58⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"59⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"60⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"61⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"62⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"63⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"64⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"65⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"66⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"67⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"68⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"69⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"C:\Users\Admin\AppData\Local\Temp\3E9A.tmp"70⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"71⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"72⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\40CD.tmp"C:\Users\Admin\AppData\Local\Temp\40CD.tmp"73⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"74⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\430F.tmp"C:\Users\Admin\AppData\Local\Temp\430F.tmp"75⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"76⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"77⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"78⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"79⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"80⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\48EB.tmp"C:\Users\Admin\AppData\Local\Temp\48EB.tmp"81⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"82⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"83⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\4A33.tmp"C:\Users\Admin\AppData\Local\Temp\4A33.tmp"84⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"85⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"86⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\4B8B.tmp"C:\Users\Admin\AppData\Local\Temp\4B8B.tmp"87⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\4BF8.tmp"C:\Users\Admin\AppData\Local\Temp\4BF8.tmp"88⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"89⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"90⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"91⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"92⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"93⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"94⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\5176.tmp"C:\Users\Admin\AppData\Local\Temp\5176.tmp"95⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\51F3.tmp"C:\Users\Admin\AppData\Local\Temp\51F3.tmp"96⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\5280.tmp"C:\Users\Admin\AppData\Local\Temp\5280.tmp"97⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\52FD.tmp"C:\Users\Admin\AppData\Local\Temp\52FD.tmp"98⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"99⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"100⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\56B6.tmp"C:\Users\Admin\AppData\Local\Temp\56B6.tmp"101⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"102⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\57EF.tmp"C:\Users\Admin\AppData\Local\Temp\57EF.tmp"103⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"104⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"105⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"106⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"107⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"108⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"C:\Users\Admin\AppData\Local\Temp\5BC7.tmp"109⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\5C44.tmp"C:\Users\Admin\AppData\Local\Temp\5C44.tmp"110⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\5F71.tmp"C:\Users\Admin\AppData\Local\Temp\5F71.tmp"111⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\606B.tmp"C:\Users\Admin\AppData\Local\Temp\606B.tmp"112⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"113⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\6174.tmp"C:\Users\Admin\AppData\Local\Temp\6174.tmp"114⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\61E2.tmp"C:\Users\Admin\AppData\Local\Temp\61E2.tmp"115⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"116⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"117⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\6378.tmp"C:\Users\Admin\AppData\Local\Temp\6378.tmp"118⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"119⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\64A1.tmp"C:\Users\Admin\AppData\Local\Temp\64A1.tmp"120⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\659B.tmp"C:\Users\Admin\AppData\Local\Temp\659B.tmp"121⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\6608.tmp"C:\Users\Admin\AppData\Local\Temp\6608.tmp"122⤵PID:3980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-