Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 16:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe
-
Size
486KB
-
MD5
35f4b479d6f9d1d7beed7081ec566baf
-
SHA1
1b2852adaebde00c338bc6639073874ffbdf2997
-
SHA256
fe03d99d99abc6fb78c7a06738a6aad6374d2680dee9b43e7a58bab446a85ea4
-
SHA512
88ecdd6d5f6704f0b1d80f79d26094e1c224f11b83244cfdc5be8f0dfb5a5715308e963f44299f929687d25450589dcf6898975ce07308f758d82dab32a2b82b
-
SSDEEP
12288:UU5rCOTeiD6gad6ZobO0yIYTsJRoO/etzoLiNZ:UUQOJD6gf2K0pDNGhomN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 700 6C75.tmp 2968 6D12.tmp 4684 6E0C.tmp 4912 6EF6.tmp 1000 6F83.tmp 4716 7119.tmp 4708 71A6.tmp 2184 7232.tmp 1072 736B.tmp 3160 73E8.tmp 5096 7465.tmp 964 74F1.tmp 4732 758E.tmp 2324 7668.tmp 3396 7705.tmp 4116 77A1.tmp 2540 783D.tmp 852 78F9.tmp 3244 7976.tmp 1248 7A02.tmp 4068 7ADD.tmp 64 7BC7.tmp 5020 7C73.tmp 1576 7D2F.tmp 1892 7E96.tmp 3152 7F32.tmp 3016 7FCF.tmp 1628 803C.tmp 3240 80C9.tmp 4728 8165.tmp 984 8220.tmp 1492 8397.tmp 4460 8472.tmp 3988 84DF.tmp 1836 858B.tmp 4788 8618.tmp 2112 86A5.tmp 1156 8722.tmp 2648 87BE.tmp 4260 883B.tmp 1180 88B8.tmp 3840 8925.tmp 3140 89A2.tmp 4544 8A2F.tmp 3808 8A9C.tmp 3380 8B19.tmp 2432 8B96.tmp 2552 8C04.tmp 4532 8C90.tmp 4228 8D1D.tmp 1896 8DA9.tmp 1020 8E36.tmp 2392 8EA3.tmp 4272 8F11.tmp 2272 8FAD.tmp 1948 903A.tmp 4132 90B7.tmp 1936 9134.tmp 788 91B1.tmp 2060 923D.tmp 2236 9376.tmp 4708 93E3.tmp 1068 9460.tmp 3368 950C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 700 1020 35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe 82 PID 1020 wrote to memory of 700 1020 35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe 82 PID 1020 wrote to memory of 700 1020 35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe 82 PID 700 wrote to memory of 2968 700 6C75.tmp 83 PID 700 wrote to memory of 2968 700 6C75.tmp 83 PID 700 wrote to memory of 2968 700 6C75.tmp 83 PID 2968 wrote to memory of 4684 2968 6D12.tmp 84 PID 2968 wrote to memory of 4684 2968 6D12.tmp 84 PID 2968 wrote to memory of 4684 2968 6D12.tmp 84 PID 4684 wrote to memory of 4912 4684 6E0C.tmp 85 PID 4684 wrote to memory of 4912 4684 6E0C.tmp 85 PID 4684 wrote to memory of 4912 4684 6E0C.tmp 85 PID 4912 wrote to memory of 1000 4912 6EF6.tmp 86 PID 4912 wrote to memory of 1000 4912 6EF6.tmp 86 PID 4912 wrote to memory of 1000 4912 6EF6.tmp 86 PID 1000 wrote to memory of 4716 1000 6F83.tmp 87 PID 1000 wrote to memory of 4716 1000 6F83.tmp 87 PID 1000 wrote to memory of 4716 1000 6F83.tmp 87 PID 4716 wrote to memory of 4708 4716 7119.tmp 88 PID 4716 wrote to memory of 4708 4716 7119.tmp 88 PID 4716 wrote to memory of 4708 4716 7119.tmp 88 PID 4708 wrote to memory of 2184 4708 71A6.tmp 89 PID 4708 wrote to memory of 2184 4708 71A6.tmp 89 PID 4708 wrote to memory of 2184 4708 71A6.tmp 89 PID 2184 wrote to memory of 1072 2184 7232.tmp 90 PID 2184 wrote to memory of 1072 2184 7232.tmp 90 PID 2184 wrote to memory of 1072 2184 7232.tmp 90 PID 1072 wrote to memory of 3160 1072 736B.tmp 91 PID 1072 wrote to memory of 3160 1072 736B.tmp 91 PID 1072 wrote to memory of 3160 1072 736B.tmp 91 PID 3160 wrote to memory of 5096 3160 73E8.tmp 92 PID 3160 wrote to memory of 5096 3160 73E8.tmp 92 PID 3160 wrote to memory of 5096 3160 73E8.tmp 92 PID 5096 wrote to memory of 964 5096 7465.tmp 93 PID 5096 wrote to memory of 964 5096 7465.tmp 93 PID 5096 wrote to memory of 964 5096 7465.tmp 93 PID 964 wrote to memory of 4732 964 74F1.tmp 94 PID 964 wrote to memory of 4732 964 74F1.tmp 94 PID 964 wrote to memory of 4732 964 74F1.tmp 94 PID 4732 wrote to memory of 2324 4732 758E.tmp 95 PID 4732 wrote to memory of 2324 4732 758E.tmp 95 PID 4732 wrote to memory of 2324 4732 758E.tmp 95 PID 2324 wrote to memory of 3396 2324 7668.tmp 96 PID 2324 wrote to memory of 3396 2324 7668.tmp 96 PID 2324 wrote to memory of 3396 2324 7668.tmp 96 PID 3396 wrote to memory of 4116 3396 7705.tmp 97 PID 3396 wrote to memory of 4116 3396 7705.tmp 97 PID 3396 wrote to memory of 4116 3396 7705.tmp 97 PID 4116 wrote to memory of 2540 4116 77A1.tmp 98 PID 4116 wrote to memory of 2540 4116 77A1.tmp 98 PID 4116 wrote to memory of 2540 4116 77A1.tmp 98 PID 2540 wrote to memory of 852 2540 783D.tmp 99 PID 2540 wrote to memory of 852 2540 783D.tmp 99 PID 2540 wrote to memory of 852 2540 783D.tmp 99 PID 852 wrote to memory of 3244 852 78F9.tmp 100 PID 852 wrote to memory of 3244 852 78F9.tmp 100 PID 852 wrote to memory of 3244 852 78F9.tmp 100 PID 3244 wrote to memory of 1248 3244 7976.tmp 103 PID 3244 wrote to memory of 1248 3244 7976.tmp 103 PID 3244 wrote to memory of 1248 3244 7976.tmp 103 PID 1248 wrote to memory of 4068 1248 7A02.tmp 104 PID 1248 wrote to memory of 4068 1248 7A02.tmp 104 PID 1248 wrote to memory of 4068 1248 7A02.tmp 104 PID 4068 wrote to memory of 64 4068 7ADD.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\35f4b479d6f9d1d7beed7081ec566baf_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\6C75.tmp"C:\Users\Admin\AppData\Local\Temp\6C75.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\6D12.tmp"C:\Users\Admin\AppData\Local\Temp\6D12.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\6F83.tmp"C:\Users\Admin\AppData\Local\Temp\6F83.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\7119.tmp"C:\Users\Admin\AppData\Local\Temp\7119.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\71A6.tmp"C:\Users\Admin\AppData\Local\Temp\71A6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\7232.tmp"C:\Users\Admin\AppData\Local\Temp\7232.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\736B.tmp"C:\Users\Admin\AppData\Local\Temp\736B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\7465.tmp"C:\Users\Admin\AppData\Local\Temp\7465.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\758E.tmp"C:\Users\Admin\AppData\Local\Temp\758E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\7705.tmp"C:\Users\Admin\AppData\Local\Temp\7705.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\77A1.tmp"C:\Users\Admin\AppData\Local\Temp\77A1.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\783D.tmp"C:\Users\Admin\AppData\Local\Temp\783D.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\78F9.tmp"C:\Users\Admin\AppData\Local\Temp\78F9.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\7976.tmp"C:\Users\Admin\AppData\Local\Temp\7976.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\7A02.tmp"C:\Users\Admin\AppData\Local\Temp\7A02.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"C:\Users\Admin\AppData\Local\Temp\7BC7.tmp"23⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"24⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"25⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\7E96.tmp"C:\Users\Admin\AppData\Local\Temp\7E96.tmp"26⤵
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\7F32.tmp"C:\Users\Admin\AppData\Local\Temp\7F32.tmp"27⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"28⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\803C.tmp"C:\Users\Admin\AppData\Local\Temp\803C.tmp"29⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\80C9.tmp"C:\Users\Admin\AppData\Local\Temp\80C9.tmp"30⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\8165.tmp"C:\Users\Admin\AppData\Local\Temp\8165.tmp"31⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\8220.tmp"C:\Users\Admin\AppData\Local\Temp\8220.tmp"32⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\8397.tmp"C:\Users\Admin\AppData\Local\Temp\8397.tmp"33⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\8472.tmp"C:\Users\Admin\AppData\Local\Temp\8472.tmp"34⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\84DF.tmp"C:\Users\Admin\AppData\Local\Temp\84DF.tmp"35⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\858B.tmp"C:\Users\Admin\AppData\Local\Temp\858B.tmp"36⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\8618.tmp"C:\Users\Admin\AppData\Local\Temp\8618.tmp"37⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"38⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\8722.tmp"C:\Users\Admin\AppData\Local\Temp\8722.tmp"39⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\87BE.tmp"C:\Users\Admin\AppData\Local\Temp\87BE.tmp"40⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\883B.tmp"C:\Users\Admin\AppData\Local\Temp\883B.tmp"41⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\88B8.tmp"C:\Users\Admin\AppData\Local\Temp\88B8.tmp"42⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"43⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\89A2.tmp"C:\Users\Admin\AppData\Local\Temp\89A2.tmp"44⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"45⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\8A9C.tmp"C:\Users\Admin\AppData\Local\Temp\8A9C.tmp"46⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\8B19.tmp"C:\Users\Admin\AppData\Local\Temp\8B19.tmp"47⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\8B96.tmp"C:\Users\Admin\AppData\Local\Temp\8B96.tmp"48⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\8C04.tmp"C:\Users\Admin\AppData\Local\Temp\8C04.tmp"49⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\8C90.tmp"C:\Users\Admin\AppData\Local\Temp\8C90.tmp"50⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"51⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"52⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"53⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"54⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\8F11.tmp"C:\Users\Admin\AppData\Local\Temp\8F11.tmp"55⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"56⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\903A.tmp"C:\Users\Admin\AppData\Local\Temp\903A.tmp"57⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\90B7.tmp"C:\Users\Admin\AppData\Local\Temp\90B7.tmp"58⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\9134.tmp"C:\Users\Admin\AppData\Local\Temp\9134.tmp"59⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\91B1.tmp"C:\Users\Admin\AppData\Local\Temp\91B1.tmp"60⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\923D.tmp"C:\Users\Admin\AppData\Local\Temp\923D.tmp"61⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"62⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\93E3.tmp"C:\Users\Admin\AppData\Local\Temp\93E3.tmp"63⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\9460.tmp"C:\Users\Admin\AppData\Local\Temp\9460.tmp"64⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\950C.tmp"C:\Users\Admin\AppData\Local\Temp\950C.tmp"65⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\95A8.tmp"C:\Users\Admin\AppData\Local\Temp\95A8.tmp"66⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\9635.tmp"C:\Users\Admin\AppData\Local\Temp\9635.tmp"67⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\96A2.tmp"C:\Users\Admin\AppData\Local\Temp\96A2.tmp"68⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\9710.tmp"C:\Users\Admin\AppData\Local\Temp\9710.tmp"69⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\977D.tmp"C:\Users\Admin\AppData\Local\Temp\977D.tmp"70⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\98A6.tmp"C:\Users\Admin\AppData\Local\Temp\98A6.tmp"71⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\9913.tmp"C:\Users\Admin\AppData\Local\Temp\9913.tmp"72⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"73⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"74⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"75⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"76⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"77⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"78⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\9C40.tmp"C:\Users\Admin\AppData\Local\Temp\9C40.tmp"79⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"80⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"81⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\9E43.tmp"C:\Users\Admin\AppData\Local\Temp\9E43.tmp"82⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\9F1E.tmp"C:\Users\Admin\AppData\Local\Temp\9F1E.tmp"83⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\A009.tmp"C:\Users\Admin\AppData\Local\Temp\A009.tmp"84⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"85⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\A160.tmp"C:\Users\Admin\AppData\Local\Temp\A160.tmp"86⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"87⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\A23B.tmp"C:\Users\Admin\AppData\Local\Temp\A23B.tmp"88⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"89⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\A374.tmp"C:\Users\Admin\AppData\Local\Temp\A374.tmp"90⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\A3F1.tmp"C:\Users\Admin\AppData\Local\Temp\A3F1.tmp"91⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"92⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"93⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\A568.tmp"C:\Users\Admin\AppData\Local\Temp\A568.tmp"94⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\A604.tmp"C:\Users\Admin\AppData\Local\Temp\A604.tmp"95⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\A690.tmp"C:\Users\Admin\AppData\Local\Temp\A690.tmp"96⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\A71D.tmp"C:\Users\Admin\AppData\Local\Temp\A71D.tmp"97⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"98⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"99⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"100⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\A930.tmp"C:\Users\Admin\AppData\Local\Temp\A930.tmp"101⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"102⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"103⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"104⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\AB63.tmp"C:\Users\Admin\AppData\Local\Temp\AB63.tmp"105⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"106⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"107⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"108⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\AE70.tmp"C:\Users\Admin\AppData\Local\Temp\AE70.tmp"109⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\AEED.tmp"C:\Users\Admin\AppData\Local\Temp\AEED.tmp"110⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"111⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"112⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\B093.tmp"C:\Users\Admin\AppData\Local\Temp\B093.tmp"113⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"114⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"115⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"116⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"117⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"118⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"119⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"120⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"121⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\B585.tmp"C:\Users\Admin\AppData\Local\Temp\B585.tmp"122⤵PID:3408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-