Analysis
-
max time kernel
73s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 20:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe
-
Size
486KB
-
MD5
ed2d80ebffffe4cc4be77a12916bd729
-
SHA1
698056a2ae230667511158524365e98e46f4518f
-
SHA256
bf4bf28ec7ecf0957c1968983389925d1cc5f0323669b4a596f061bd9edbb00d
-
SHA512
352b3cd3e673f9eb930c02d9504083705b7bf16ac5e6cd89c8a9cd68ba17b4eedf0b3f097ac4df470f5fa6b4bbb264d23b31d1e4d3e97182fd7a7b84139707f7
-
SSDEEP
12288:/U5rCOTeiDGKkxpsB2ub0nGUshhPBN70gNZ:/UQOJDmxk2WmkHPBNjN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4908 9371.tmp 4344 94F8.tmp 1480 95A4.tmp 3904 96CC.tmp 3040 97B7.tmp 4324 98A1.tmp 2268 997C.tmp 3108 9A47.tmp 3300 9B70.tmp 1704 9CC8.tmp 3404 9DB2.tmp 3940 9F48.tmp 4288 A052.tmp 3908 A12D.tmp 2180 A2A4.tmp 2516 A3CD.tmp 216 A544.tmp 2132 A64D.tmp 2168 A776.tmp 1524 A8BE.tmp 3264 A989.tmp 2784 AA45.tmp 1204 AB2F.tmp 5088 ABAC.tmp 2512 AC97.tmp 64 AD04.tmp 1056 AE4C.tmp 1972 AED9.tmp 2500 B07F.tmp 4008 B1C7.tmp 1140 B263.tmp 4104 B30F.tmp 1780 B3BB.tmp 1848 B467.tmp 2156 B503.tmp 3396 B5DE.tmp 3036 B6C8.tmp 3340 B783.tmp 4956 B810.tmp 3444 B89D.tmp 1528 B90A.tmp 1812 B9D5.tmp 2252 BA91.tmp 836 BB1D.tmp 3584 BB8B.tmp 1688 BC17.tmp 3676 BD11.tmp 1096 BE4A.tmp 1784 BF53.tmp 3928 C0EA.tmp 2092 C1E4.tmp 4292 C2AF.tmp 4932 C38A.tmp 3212 C493.tmp 4872 C5BC.tmp 4388 C658.tmp 5036 C714.tmp 3460 C7C0.tmp 4328 C84C.tmp 4148 C8E9.tmp 3588 C9C3.tmp 840 CA6F.tmp 4516 CB3A.tmp 1480 CBB7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4908 2396 NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe 86 PID 2396 wrote to memory of 4908 2396 NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe 86 PID 2396 wrote to memory of 4908 2396 NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe 86 PID 4908 wrote to memory of 4344 4908 9371.tmp 87 PID 4908 wrote to memory of 4344 4908 9371.tmp 87 PID 4908 wrote to memory of 4344 4908 9371.tmp 87 PID 4344 wrote to memory of 1480 4344 94F8.tmp 88 PID 4344 wrote to memory of 1480 4344 94F8.tmp 88 PID 4344 wrote to memory of 1480 4344 94F8.tmp 88 PID 1480 wrote to memory of 3904 1480 95A4.tmp 89 PID 1480 wrote to memory of 3904 1480 95A4.tmp 89 PID 1480 wrote to memory of 3904 1480 95A4.tmp 89 PID 3904 wrote to memory of 3040 3904 96CC.tmp 90 PID 3904 wrote to memory of 3040 3904 96CC.tmp 90 PID 3904 wrote to memory of 3040 3904 96CC.tmp 90 PID 3040 wrote to memory of 4324 3040 97B7.tmp 91 PID 3040 wrote to memory of 4324 3040 97B7.tmp 91 PID 3040 wrote to memory of 4324 3040 97B7.tmp 91 PID 4324 wrote to memory of 2268 4324 98A1.tmp 92 PID 4324 wrote to memory of 2268 4324 98A1.tmp 92 PID 4324 wrote to memory of 2268 4324 98A1.tmp 92 PID 2268 wrote to memory of 3108 2268 997C.tmp 93 PID 2268 wrote to memory of 3108 2268 997C.tmp 93 PID 2268 wrote to memory of 3108 2268 997C.tmp 93 PID 3108 wrote to memory of 3300 3108 9A47.tmp 94 PID 3108 wrote to memory of 3300 3108 9A47.tmp 94 PID 3108 wrote to memory of 3300 3108 9A47.tmp 94 PID 3300 wrote to memory of 1704 3300 9B70.tmp 95 PID 3300 wrote to memory of 1704 3300 9B70.tmp 95 PID 3300 wrote to memory of 1704 3300 9B70.tmp 95 PID 1704 wrote to memory of 3404 1704 9CC8.tmp 96 PID 1704 wrote to memory of 3404 1704 9CC8.tmp 96 PID 1704 wrote to memory of 3404 1704 9CC8.tmp 96 PID 3404 wrote to memory of 3940 3404 9DB2.tmp 97 PID 3404 wrote to memory of 3940 3404 9DB2.tmp 97 PID 3404 wrote to memory of 3940 3404 9DB2.tmp 97 PID 3940 wrote to memory of 4288 3940 9F48.tmp 98 PID 3940 wrote to memory of 4288 3940 9F48.tmp 98 PID 3940 wrote to memory of 4288 3940 9F48.tmp 98 PID 4288 wrote to memory of 3908 4288 A052.tmp 99 PID 4288 wrote to memory of 3908 4288 A052.tmp 99 PID 4288 wrote to memory of 3908 4288 A052.tmp 99 PID 3908 wrote to memory of 2180 3908 A12D.tmp 100 PID 3908 wrote to memory of 2180 3908 A12D.tmp 100 PID 3908 wrote to memory of 2180 3908 A12D.tmp 100 PID 2180 wrote to memory of 2516 2180 A2A4.tmp 101 PID 2180 wrote to memory of 2516 2180 A2A4.tmp 101 PID 2180 wrote to memory of 2516 2180 A2A4.tmp 101 PID 2516 wrote to memory of 216 2516 A3CD.tmp 102 PID 2516 wrote to memory of 216 2516 A3CD.tmp 102 PID 2516 wrote to memory of 216 2516 A3CD.tmp 102 PID 216 wrote to memory of 2132 216 A544.tmp 103 PID 216 wrote to memory of 2132 216 A544.tmp 103 PID 216 wrote to memory of 2132 216 A544.tmp 103 PID 2132 wrote to memory of 2168 2132 A64D.tmp 104 PID 2132 wrote to memory of 2168 2132 A64D.tmp 104 PID 2132 wrote to memory of 2168 2132 A64D.tmp 104 PID 2168 wrote to memory of 1524 2168 A776.tmp 105 PID 2168 wrote to memory of 1524 2168 A776.tmp 105 PID 2168 wrote to memory of 1524 2168 A776.tmp 105 PID 1524 wrote to memory of 3264 1524 A8BE.tmp 106 PID 1524 wrote to memory of 3264 1524 A8BE.tmp 106 PID 1524 wrote to memory of 3264 1524 A8BE.tmp 106 PID 3264 wrote to memory of 2784 3264 A989.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_ed2d80ebffffe4cc4be77a12916bd729_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\9371.tmp"C:\Users\Admin\AppData\Local\Temp\9371.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\94F8.tmp"C:\Users\Admin\AppData\Local\Temp\94F8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\95A4.tmp"C:\Users\Admin\AppData\Local\Temp\95A4.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\96CC.tmp"C:\Users\Admin\AppData\Local\Temp\96CC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\97B7.tmp"C:\Users\Admin\AppData\Local\Temp\97B7.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\98A1.tmp"C:\Users\Admin\AppData\Local\Temp\98A1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\997C.tmp"C:\Users\Admin\AppData\Local\Temp\997C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\9A47.tmp"C:\Users\Admin\AppData\Local\Temp\9A47.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\9B70.tmp"C:\Users\Admin\AppData\Local\Temp\9B70.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\9CC8.tmp"C:\Users\Admin\AppData\Local\Temp\9CC8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\9DB2.tmp"C:\Users\Admin\AppData\Local\Temp\9DB2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\9F48.tmp"C:\Users\Admin\AppData\Local\Temp\9F48.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\A052.tmp"C:\Users\Admin\AppData\Local\Temp\A052.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\A12D.tmp"C:\Users\Admin\AppData\Local\Temp\A12D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\A2A4.tmp"C:\Users\Admin\AppData\Local\Temp\A2A4.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\A3CD.tmp"C:\Users\Admin\AppData\Local\Temp\A3CD.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\A544.tmp"C:\Users\Admin\AppData\Local\Temp\A544.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\A64D.tmp"C:\Users\Admin\AppData\Local\Temp\A64D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\A776.tmp"C:\Users\Admin\AppData\Local\Temp\A776.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\A8BE.tmp"C:\Users\Admin\AppData\Local\Temp\A8BE.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\A989.tmp"C:\Users\Admin\AppData\Local\Temp\A989.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\AA45.tmp"C:\Users\Admin\AppData\Local\Temp\AA45.tmp"23⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\AB2F.tmp"C:\Users\Admin\AppData\Local\Temp\AB2F.tmp"24⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\ABAC.tmp"C:\Users\Admin\AppData\Local\Temp\ABAC.tmp"25⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\AC97.tmp"C:\Users\Admin\AppData\Local\Temp\AC97.tmp"26⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\AD04.tmp"C:\Users\Admin\AppData\Local\Temp\AD04.tmp"27⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\AE4C.tmp"C:\Users\Admin\AppData\Local\Temp\AE4C.tmp"28⤵
- Executes dropped EXE
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\AED9.tmp"C:\Users\Admin\AppData\Local\Temp\AED9.tmp"29⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\B07F.tmp"C:\Users\Admin\AppData\Local\Temp\B07F.tmp"30⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\B1C7.tmp"C:\Users\Admin\AppData\Local\Temp\B1C7.tmp"31⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\B263.tmp"C:\Users\Admin\AppData\Local\Temp\B263.tmp"32⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\B30F.tmp"C:\Users\Admin\AppData\Local\Temp\B30F.tmp"33⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\B3BB.tmp"C:\Users\Admin\AppData\Local\Temp\B3BB.tmp"34⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\B467.tmp"C:\Users\Admin\AppData\Local\Temp\B467.tmp"35⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\B503.tmp"C:\Users\Admin\AppData\Local\Temp\B503.tmp"36⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\B5DE.tmp"C:\Users\Admin\AppData\Local\Temp\B5DE.tmp"37⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\B6C8.tmp"C:\Users\Admin\AppData\Local\Temp\B6C8.tmp"38⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\B783.tmp"C:\Users\Admin\AppData\Local\Temp\B783.tmp"39⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\B810.tmp"C:\Users\Admin\AppData\Local\Temp\B810.tmp"40⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\B89D.tmp"C:\Users\Admin\AppData\Local\Temp\B89D.tmp"41⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\B90A.tmp"C:\Users\Admin\AppData\Local\Temp\B90A.tmp"42⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"43⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\BA91.tmp"C:\Users\Admin\AppData\Local\Temp\BA91.tmp"44⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\BB1D.tmp"C:\Users\Admin\AppData\Local\Temp\BB1D.tmp"45⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\BB8B.tmp"C:\Users\Admin\AppData\Local\Temp\BB8B.tmp"46⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\BC17.tmp"C:\Users\Admin\AppData\Local\Temp\BC17.tmp"47⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\BD11.tmp"C:\Users\Admin\AppData\Local\Temp\BD11.tmp"48⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\BE4A.tmp"C:\Users\Admin\AppData\Local\Temp\BE4A.tmp"49⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\BF53.tmp"C:\Users\Admin\AppData\Local\Temp\BF53.tmp"50⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"51⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\C1E4.tmp"C:\Users\Admin\AppData\Local\Temp\C1E4.tmp"52⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\C2AF.tmp"C:\Users\Admin\AppData\Local\Temp\C2AF.tmp"53⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\C38A.tmp"C:\Users\Admin\AppData\Local\Temp\C38A.tmp"54⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\C493.tmp"C:\Users\Admin\AppData\Local\Temp\C493.tmp"55⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\C5BC.tmp"C:\Users\Admin\AppData\Local\Temp\C5BC.tmp"56⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\C658.tmp"C:\Users\Admin\AppData\Local\Temp\C658.tmp"57⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\C714.tmp"C:\Users\Admin\AppData\Local\Temp\C714.tmp"58⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\C7C0.tmp"C:\Users\Admin\AppData\Local\Temp\C7C0.tmp"59⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\C84C.tmp"C:\Users\Admin\AppData\Local\Temp\C84C.tmp"60⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\C8E9.tmp"C:\Users\Admin\AppData\Local\Temp\C8E9.tmp"61⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\C9C3.tmp"C:\Users\Admin\AppData\Local\Temp\C9C3.tmp"62⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\CA6F.tmp"C:\Users\Admin\AppData\Local\Temp\CA6F.tmp"63⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"64⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\CBB7.tmp"C:\Users\Admin\AppData\Local\Temp\CBB7.tmp"65⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\CC63.tmp"C:\Users\Admin\AppData\Local\Temp\CC63.tmp"66⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\CD9C.tmp"C:\Users\Admin\AppData\Local\Temp\CD9C.tmp"67⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\CE48.tmp"C:\Users\Admin\AppData\Local\Temp\CE48.tmp"68⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"69⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"70⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\D174.tmp"C:\Users\Admin\AppData\Local\Temp\D174.tmp"71⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\D201.tmp"C:\Users\Admin\AppData\Local\Temp\D201.tmp"72⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\D2FB.tmp"C:\Users\Admin\AppData\Local\Temp\D2FB.tmp"73⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\D378.tmp"C:\Users\Admin\AppData\Local\Temp\D378.tmp"74⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\D414.tmp"C:\Users\Admin\AppData\Local\Temp\D414.tmp"75⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\D4B0.tmp"C:\Users\Admin\AppData\Local\Temp\D4B0.tmp"76⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\D51E.tmp"C:\Users\Admin\AppData\Local\Temp\D51E.tmp"77⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\D59B.tmp"C:\Users\Admin\AppData\Local\Temp\D59B.tmp"78⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\D618.tmp"C:\Users\Admin\AppData\Local\Temp\D618.tmp"79⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\D6A4.tmp"C:\Users\Admin\AppData\Local\Temp\D6A4.tmp"80⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\D76F.tmp"C:\Users\Admin\AppData\Local\Temp\D76F.tmp"81⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\D8E6.tmp"C:\Users\Admin\AppData\Local\Temp\D8E6.tmp"82⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\DA00.tmp"C:\Users\Admin\AppData\Local\Temp\DA00.tmp"83⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\DA7D.tmp"C:\Users\Admin\AppData\Local\Temp\DA7D.tmp"84⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\DB19.tmp"C:\Users\Admin\AppData\Local\Temp\DB19.tmp"85⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\DC51.tmp"C:\Users\Admin\AppData\Local\Temp\DC51.tmp"86⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\DCBF.tmp"C:\Users\Admin\AppData\Local\Temp\DCBF.tmp"87⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\DEB3.tmp"C:\Users\Admin\AppData\Local\Temp\DEB3.tmp"88⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\DF4F.tmp"C:\Users\Admin\AppData\Local\Temp\DF4F.tmp"89⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\E01A.tmp"C:\Users\Admin\AppData\Local\Temp\E01A.tmp"90⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\E0C6.tmp"C:\Users\Admin\AppData\Local\Temp\E0C6.tmp"91⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\E22D.tmp"C:\Users\Admin\AppData\Local\Temp\E22D.tmp"92⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\E2BA.tmp"C:\Users\Admin\AppData\Local\Temp\E2BA.tmp"93⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\E356.tmp"C:\Users\Admin\AppData\Local\Temp\E356.tmp"94⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\E450.tmp"C:\Users\Admin\AppData\Local\Temp\E450.tmp"95⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\E52B.tmp"C:\Users\Admin\AppData\Local\Temp\E52B.tmp"96⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\E5C7.tmp"C:\Users\Admin\AppData\Local\Temp\E5C7.tmp"97⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\E78C.tmp"C:\Users\Admin\AppData\Local\Temp\E78C.tmp"98⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\E819.tmp"C:\Users\Admin\AppData\Local\Temp\E819.tmp"99⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\E8C5.tmp"C:\Users\Admin\AppData\Local\Temp\E8C5.tmp"100⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\E9A0.tmp"C:\Users\Admin\AppData\Local\Temp\E9A0.tmp"101⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\EA6B.tmp"C:\Users\Admin\AppData\Local\Temp\EA6B.tmp"102⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\EAE8.tmp"C:\Users\Admin\AppData\Local\Temp\EAE8.tmp"103⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\EBB3.tmp"C:\Users\Admin\AppData\Local\Temp\EBB3.tmp"104⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\EC4F.tmp"C:\Users\Admin\AppData\Local\Temp\EC4F.tmp"105⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\ECEB.tmp"C:\Users\Admin\AppData\Local\Temp\ECEB.tmp"106⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\ED88.tmp"C:\Users\Admin\AppData\Local\Temp\ED88.tmp"107⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\EE24.tmp"C:\Users\Admin\AppData\Local\Temp\EE24.tmp"108⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"109⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\EF7C.tmp"C:\Users\Admin\AppData\Local\Temp\EF7C.tmp"110⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\EFF9.tmp"C:\Users\Admin\AppData\Local\Temp\EFF9.tmp"111⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\F076.tmp"C:\Users\Admin\AppData\Local\Temp\F076.tmp"112⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\F112.tmp"C:\Users\Admin\AppData\Local\Temp\F112.tmp"113⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\F1AE.tmp"C:\Users\Admin\AppData\Local\Temp\F1AE.tmp"114⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\F25A.tmp"C:\Users\Admin\AppData\Local\Temp\F25A.tmp"115⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\F306.tmp"C:\Users\Admin\AppData\Local\Temp\F306.tmp"116⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\F3C1.tmp"C:\Users\Admin\AppData\Local\Temp\F3C1.tmp"117⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\F42F.tmp"C:\Users\Admin\AppData\Local\Temp\F42F.tmp"118⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\F4CB.tmp"C:\Users\Admin\AppData\Local\Temp\F4CB.tmp"119⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\F577.tmp"C:\Users\Admin\AppData\Local\Temp\F577.tmp"120⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\F603.tmp"C:\Users\Admin\AppData\Local\Temp\F603.tmp"121⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\F6A0.tmp"C:\Users\Admin\AppData\Local\Temp\F6A0.tmp"122⤵PID:628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-