Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 08:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe
-
Size
520KB
-
MD5
3529272f2c82267db4029a9e03eded89
-
SHA1
d0e14d8c61a09f82a9f52ca000892e83b345a93e
-
SHA256
61cb5c4fa2abc3729cf5c34540a862493709447762571055a42f6a9acab503e4
-
SHA512
0089fd8d21f61e03bfc4d06558d364895bfcffefc0825f791a535d00e6c7c0d8edd3a3989dc48ea1476303ff997431f8e8ea7799ec0b1f84824c4b32b4d9feba
-
SSDEEP
12288:roRXOQjmOychTjkASkLQkCeY/KExrb85D65wzHw7d31fNZ:rogQ9yeOkQkCz/KEdb8Yw7m3FN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1328 DD02.tmp 2464 DDAE.tmp 640 DE3A.tmp 1768 DED7.tmp 3876 DFA2.tmp 964 E03E.tmp 3992 E0AB.tmp 3220 E138.tmp 788 E1D4.tmp 4964 E271.tmp 5020 E2EE.tmp 4240 E36B.tmp 432 E445.tmp 4716 E4D2.tmp 3244 E5BC.tmp 4528 E659.tmp 5064 E6D6.tmp 4064 E791.tmp 4996 E83D.tmp 3596 E8D9.tmp 5060 EB3B.tmp 2560 EBC7.tmp 1028 EC54.tmp 3428 ED7D.tmp 4992 EE29.tmp 2604 EEE4.tmp 2156 EF90.tmp 1664 F01D.tmp 4280 F0C8.tmp 5024 F155.tmp 4792 F1D2.tmp 2812 F2BC.tmp 2076 F368.tmp 1360 F3E5.tmp 3548 F462.tmp 4720 F4EF.tmp 5032 F57C.tmp 2472 F608.tmp 4664 F685.tmp 2020 F702.tmp 4432 F770.tmp 4048 F7DD.tmp 4416 F85A.tmp 1720 F8C7.tmp 2124 F944.tmp 760 F9C1.tmp 4176 FA4E.tmp 2424 FADB.tmp 5108 FB67.tmp 4128 FBF4.tmp 888 FCA0.tmp 3168 FD1D.tmp 4272 FDD8.tmp 4292 FE74.tmp 1680 FF11.tmp 4004 FFFB.tmp 392 C6.tmp 2608 1D0.tmp 3092 27C.tmp 2348 366.tmp 3696 412.tmp 4508 4AE.tmp 224 56A.tmp 3748 6B2.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1328 1636 NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe 70 PID 1636 wrote to memory of 1328 1636 NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe 70 PID 1636 wrote to memory of 1328 1636 NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe 70 PID 1328 wrote to memory of 2464 1328 DD02.tmp 77 PID 1328 wrote to memory of 2464 1328 DD02.tmp 77 PID 1328 wrote to memory of 2464 1328 DD02.tmp 77 PID 2464 wrote to memory of 640 2464 DDAE.tmp 80 PID 2464 wrote to memory of 640 2464 DDAE.tmp 80 PID 2464 wrote to memory of 640 2464 DDAE.tmp 80 PID 640 wrote to memory of 1768 640 DE3A.tmp 81 PID 640 wrote to memory of 1768 640 DE3A.tmp 81 PID 640 wrote to memory of 1768 640 DE3A.tmp 81 PID 1768 wrote to memory of 3876 1768 DED7.tmp 89 PID 1768 wrote to memory of 3876 1768 DED7.tmp 89 PID 1768 wrote to memory of 3876 1768 DED7.tmp 89 PID 3876 wrote to memory of 964 3876 DFA2.tmp 91 PID 3876 wrote to memory of 964 3876 DFA2.tmp 91 PID 3876 wrote to memory of 964 3876 DFA2.tmp 91 PID 964 wrote to memory of 3992 964 E03E.tmp 92 PID 964 wrote to memory of 3992 964 E03E.tmp 92 PID 964 wrote to memory of 3992 964 E03E.tmp 92 PID 3992 wrote to memory of 3220 3992 E0AB.tmp 93 PID 3992 wrote to memory of 3220 3992 E0AB.tmp 93 PID 3992 wrote to memory of 3220 3992 E0AB.tmp 93 PID 3220 wrote to memory of 788 3220 E138.tmp 94 PID 3220 wrote to memory of 788 3220 E138.tmp 94 PID 3220 wrote to memory of 788 3220 E138.tmp 94 PID 788 wrote to memory of 4964 788 E1D4.tmp 95 PID 788 wrote to memory of 4964 788 E1D4.tmp 95 PID 788 wrote to memory of 4964 788 E1D4.tmp 95 PID 4964 wrote to memory of 5020 4964 E271.tmp 97 PID 4964 wrote to memory of 5020 4964 E271.tmp 97 PID 4964 wrote to memory of 5020 4964 E271.tmp 97 PID 5020 wrote to memory of 4240 5020 E2EE.tmp 96 PID 5020 wrote to memory of 4240 5020 E2EE.tmp 96 PID 5020 wrote to memory of 4240 5020 E2EE.tmp 96 PID 4240 wrote to memory of 432 4240 E36B.tmp 98 PID 4240 wrote to memory of 432 4240 E36B.tmp 98 PID 4240 wrote to memory of 432 4240 E36B.tmp 98 PID 432 wrote to memory of 4716 432 E445.tmp 99 PID 432 wrote to memory of 4716 432 E445.tmp 99 PID 432 wrote to memory of 4716 432 E445.tmp 99 PID 4716 wrote to memory of 3244 4716 E4D2.tmp 100 PID 4716 wrote to memory of 3244 4716 E4D2.tmp 100 PID 4716 wrote to memory of 3244 4716 E4D2.tmp 100 PID 3244 wrote to memory of 4528 3244 E5BC.tmp 101 PID 3244 wrote to memory of 4528 3244 E5BC.tmp 101 PID 3244 wrote to memory of 4528 3244 E5BC.tmp 101 PID 4528 wrote to memory of 5064 4528 E659.tmp 102 PID 4528 wrote to memory of 5064 4528 E659.tmp 102 PID 4528 wrote to memory of 5064 4528 E659.tmp 102 PID 5064 wrote to memory of 4064 5064 E6D6.tmp 103 PID 5064 wrote to memory of 4064 5064 E6D6.tmp 103 PID 5064 wrote to memory of 4064 5064 E6D6.tmp 103 PID 4064 wrote to memory of 4996 4064 E791.tmp 104 PID 4064 wrote to memory of 4996 4064 E791.tmp 104 PID 4064 wrote to memory of 4996 4064 E791.tmp 104 PID 4996 wrote to memory of 3596 4996 E83D.tmp 105 PID 4996 wrote to memory of 3596 4996 E83D.tmp 105 PID 4996 wrote to memory of 3596 4996 E83D.tmp 105 PID 3596 wrote to memory of 5060 3596 E8D9.tmp 106 PID 3596 wrote to memory of 5060 3596 E8D9.tmp 106 PID 3596 wrote to memory of 5060 3596 E8D9.tmp 106 PID 5060 wrote to memory of 2560 5060 EB3B.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_3529272f2c82267db4029a9e03eded89_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\E138.tmp"C:\Users\Admin\AppData\Local\Temp\E138.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\E271.tmp"C:\Users\Admin\AppData\Local\Temp\E271.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\E659.tmp"C:\Users\Admin\AppData\Local\Temp\E659.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"11⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\EC54.tmp"C:\Users\Admin\AppData\Local\Temp\EC54.tmp"12⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"13⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\EE29.tmp"C:\Users\Admin\AppData\Local\Temp\EE29.tmp"14⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"15⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"16⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"17⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"18⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\F155.tmp"C:\Users\Admin\AppData\Local\Temp\F155.tmp"19⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"20⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"21⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\F368.tmp"C:\Users\Admin\AppData\Local\Temp\F368.tmp"22⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"C:\Users\Admin\AppData\Local\Temp\F3E5.tmp"23⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\F462.tmp"C:\Users\Admin\AppData\Local\Temp\F462.tmp"24⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"25⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\F57C.tmp"C:\Users\Admin\AppData\Local\Temp\F57C.tmp"26⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"27⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\F685.tmp"C:\Users\Admin\AppData\Local\Temp\F685.tmp"28⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"29⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\F770.tmp"C:\Users\Admin\AppData\Local\Temp\F770.tmp"30⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"31⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"32⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"33⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\F944.tmp"C:\Users\Admin\AppData\Local\Temp\F944.tmp"34⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"C:\Users\Admin\AppData\Local\Temp\F9C1.tmp"35⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"36⤵
- Executes dropped EXE
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\FADB.tmp"C:\Users\Admin\AppData\Local\Temp\FADB.tmp"37⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\FB67.tmp"C:\Users\Admin\AppData\Local\Temp\FB67.tmp"38⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"39⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"40⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\FD1D.tmp"C:\Users\Admin\AppData\Local\Temp\FD1D.tmp"41⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"42⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"43⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\FF11.tmp"C:\Users\Admin\AppData\Local\Temp\FF11.tmp"44⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"45⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"46⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"47⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\27C.tmp"C:\Users\Admin\AppData\Local\Temp\27C.tmp"48⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"49⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"50⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\4AE.tmp"C:\Users\Admin\AppData\Local\Temp\4AE.tmp"51⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"52⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"53⤵
- Executes dropped EXE
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"54⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\8B5.tmp"C:\Users\Admin\AppData\Local\Temp\8B5.tmp"55⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\942.tmp"C:\Users\Admin\AppData\Local\Temp\942.tmp"56⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\A8A.tmp"C:\Users\Admin\AppData\Local\Temp\A8A.tmp"57⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"58⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"59⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"60⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp"61⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"62⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\FE9.tmp"C:\Users\Admin\AppData\Local\Temp\FE9.tmp"63⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\10B4.tmp"C:\Users\Admin\AppData\Local\Temp\10B4.tmp"64⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\1151.tmp"C:\Users\Admin\AppData\Local\Temp\1151.tmp"65⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"66⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"67⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"68⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\149C.tmp"C:\Users\Admin\AppData\Local\Temp\149C.tmp"69⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\15B6.tmp"C:\Users\Admin\AppData\Local\Temp\15B6.tmp"70⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"71⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\173C.tmp"C:\Users\Admin\AppData\Local\Temp\173C.tmp"72⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"73⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"74⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"75⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\19AD.tmp"C:\Users\Admin\AppData\Local\Temp\19AD.tmp"76⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\1A49.tmp"C:\Users\Admin\AppData\Local\Temp\1A49.tmp"77⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"78⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\1B92.tmp"C:\Users\Admin\AppData\Local\Temp\1B92.tmp"79⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"C:\Users\Admin\AppData\Local\Temp\1C0F.tmp"80⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"81⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\1D76.tmp"C:\Users\Admin\AppData\Local\Temp\1D76.tmp"82⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"83⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"84⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\1F4B.tmp"C:\Users\Admin\AppData\Local\Temp\1F4B.tmp"85⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"86⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2083.tmp"C:\Users\Admin\AppData\Local\Temp\2083.tmp"87⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\211F.tmp"C:\Users\Admin\AppData\Local\Temp\211F.tmp"88⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\21CB.tmp"C:\Users\Admin\AppData\Local\Temp\21CB.tmp"89⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2277.tmp"C:\Users\Admin\AppData\Local\Temp\2277.tmp"90⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\2333.tmp"C:\Users\Admin\AppData\Local\Temp\2333.tmp"91⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"92⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"93⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\2556.tmp"C:\Users\Admin\AppData\Local\Temp\2556.tmp"94⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"95⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"96⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\26CD.tmp"C:\Users\Admin\AppData\Local\Temp\26CD.tmp"97⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"98⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\2815.tmp"C:\Users\Admin\AppData\Local\Temp\2815.tmp"99⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"100⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"101⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"102⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\2A76.tmp"C:\Users\Admin\AppData\Local\Temp\2A76.tmp"103⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"104⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"105⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"106⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"107⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"108⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"109⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"110⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"111⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"112⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"113⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"114⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"115⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"116⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"117⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"118⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"119⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"120⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"121⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"122⤵PID:2640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-