Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 09:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe
-
Size
486KB
-
MD5
99fafd2c60f035a5a841f1c852dc5ec4
-
SHA1
ef7e58f58ec2277078df7bfc30fe149467207ac8
-
SHA256
a9dcc62ca47a62e978a64413dae078a6ce1a96078d921eb5eb3dfad7ae1e1360
-
SHA512
0d60bd16a0b77984e7700713cd2d4adaf8c5dc5f0bc211ecbf2516319ce29735f3277ec18fe1b9374a27c2188699408409e6c94204b3b4c66fc77d2a4310d6d4
-
SSDEEP
12288:oU5rCOTeiDiIxO/s9vCWc4AJUJbPOKQ4Q/gxNZ:oUQOJDZO/sRF/VbPBpwAN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3984 74F1.tmp 1964 759D.tmp 5096 762A.tmp 4960 7724.tmp 932 77D0.tmp 2884 788B.tmp 1104 7966.tmp 2080 7B0C.tmp 4608 7B79.tmp 560 7C25.tmp 2272 7CC1.tmp 4948 7D5E.tmp 1724 BB9F.tmp 4440 BC3B.tmp 5072 BCB8.tmp 3636 BD35.tmp 3476 BDB2.tmp 4972 BE2F.tmp 1004 BECC.tmp 4912 BF68.tmp 4192 C870.tmp 1112 C93B.tmp 4980 CE5C.tmp 2388 D958.tmp 4640 E08C.tmp 2400 E9F2.tmp 3456 EA6F.tmp 4332 EBB8.tmp 2948 EC15.tmp 3136 EC73.tmp 316 ED2F.tmp 3148 ED9C.tmp 4772 EE48.tmp 4960 EEC5.tmp 1700 EF32.tmp 932 EFCE.tmp 3172 F81B.tmp 4648 F8A8.tmp 3216 F954.tmp 1784 F9F0.tmp 1424 FA6D.tmp 2808 FB09.tmp 3792 FC23.tmp 2280 21E.tmp 3200 9FE.tmp 4316 B84.tmp 556 C01.tmp 3752 C7E.tmp 1188 CFB.tmp 384 D88.tmp 4052 E05.tmp 4384 E91.tmp 4008 F1E.tmp 4132 F8B.tmp 2272 1028.tmp 2752 1095.tmp 4284 1122.tmp 1200 118F.tmp 3368 120C.tmp 432 1289.tmp 2148 1325.tmp 1680 1393.tmp 3500 141F.tmp 3768 14AC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3984 3960 NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe 87 PID 3960 wrote to memory of 3984 3960 NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe 87 PID 3960 wrote to memory of 3984 3960 NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe 87 PID 3984 wrote to memory of 1964 3984 74F1.tmp 89 PID 3984 wrote to memory of 1964 3984 74F1.tmp 89 PID 3984 wrote to memory of 1964 3984 74F1.tmp 89 PID 1964 wrote to memory of 5096 1964 759D.tmp 90 PID 1964 wrote to memory of 5096 1964 759D.tmp 90 PID 1964 wrote to memory of 5096 1964 759D.tmp 90 PID 5096 wrote to memory of 4960 5096 762A.tmp 91 PID 5096 wrote to memory of 4960 5096 762A.tmp 91 PID 5096 wrote to memory of 4960 5096 762A.tmp 91 PID 4960 wrote to memory of 932 4960 7724.tmp 93 PID 4960 wrote to memory of 932 4960 7724.tmp 93 PID 4960 wrote to memory of 932 4960 7724.tmp 93 PID 932 wrote to memory of 2884 932 77D0.tmp 94 PID 932 wrote to memory of 2884 932 77D0.tmp 94 PID 932 wrote to memory of 2884 932 77D0.tmp 94 PID 2884 wrote to memory of 1104 2884 788B.tmp 95 PID 2884 wrote to memory of 1104 2884 788B.tmp 95 PID 2884 wrote to memory of 1104 2884 788B.tmp 95 PID 1104 wrote to memory of 2080 1104 7966.tmp 97 PID 1104 wrote to memory of 2080 1104 7966.tmp 97 PID 1104 wrote to memory of 2080 1104 7966.tmp 97 PID 2080 wrote to memory of 4608 2080 7B0C.tmp 98 PID 2080 wrote to memory of 4608 2080 7B0C.tmp 98 PID 2080 wrote to memory of 4608 2080 7B0C.tmp 98 PID 4608 wrote to memory of 560 4608 7B79.tmp 99 PID 4608 wrote to memory of 560 4608 7B79.tmp 99 PID 4608 wrote to memory of 560 4608 7B79.tmp 99 PID 560 wrote to memory of 2272 560 7C25.tmp 100 PID 560 wrote to memory of 2272 560 7C25.tmp 100 PID 560 wrote to memory of 2272 560 7C25.tmp 100 PID 2272 wrote to memory of 4948 2272 7CC1.tmp 101 PID 2272 wrote to memory of 4948 2272 7CC1.tmp 101 PID 2272 wrote to memory of 4948 2272 7CC1.tmp 101 PID 4948 wrote to memory of 1724 4948 7D5E.tmp 102 PID 4948 wrote to memory of 1724 4948 7D5E.tmp 102 PID 4948 wrote to memory of 1724 4948 7D5E.tmp 102 PID 1724 wrote to memory of 4440 1724 BB9F.tmp 103 PID 1724 wrote to memory of 4440 1724 BB9F.tmp 103 PID 1724 wrote to memory of 4440 1724 BB9F.tmp 103 PID 4440 wrote to memory of 5072 4440 BC3B.tmp 105 PID 4440 wrote to memory of 5072 4440 BC3B.tmp 105 PID 4440 wrote to memory of 5072 4440 BC3B.tmp 105 PID 5072 wrote to memory of 3636 5072 BCB8.tmp 106 PID 5072 wrote to memory of 3636 5072 BCB8.tmp 106 PID 5072 wrote to memory of 3636 5072 BCB8.tmp 106 PID 3636 wrote to memory of 3476 3636 BD35.tmp 107 PID 3636 wrote to memory of 3476 3636 BD35.tmp 107 PID 3636 wrote to memory of 3476 3636 BD35.tmp 107 PID 3476 wrote to memory of 4972 3476 BDB2.tmp 108 PID 3476 wrote to memory of 4972 3476 BDB2.tmp 108 PID 3476 wrote to memory of 4972 3476 BDB2.tmp 108 PID 4972 wrote to memory of 1004 4972 BE2F.tmp 109 PID 4972 wrote to memory of 1004 4972 BE2F.tmp 109 PID 4972 wrote to memory of 1004 4972 BE2F.tmp 109 PID 1004 wrote to memory of 4912 1004 BECC.tmp 110 PID 1004 wrote to memory of 4912 1004 BECC.tmp 110 PID 1004 wrote to memory of 4912 1004 BECC.tmp 110 PID 4912 wrote to memory of 4192 4912 BF68.tmp 111 PID 4912 wrote to memory of 4192 4912 BF68.tmp 111 PID 4912 wrote to memory of 4192 4912 BF68.tmp 111 PID 4192 wrote to memory of 1112 4192 C870.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_99fafd2c60f035a5a841f1c852dc5ec4_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\74F1.tmp"C:\Users\Admin\AppData\Local\Temp\74F1.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\762A.tmp"C:\Users\Admin\AppData\Local\Temp\762A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\77D0.tmp"C:\Users\Admin\AppData\Local\Temp\77D0.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\788B.tmp"C:\Users\Admin\AppData\Local\Temp\788B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\7966.tmp"C:\Users\Admin\AppData\Local\Temp\7966.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\7B0C.tmp"C:\Users\Admin\AppData\Local\Temp\7B0C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\7C25.tmp"C:\Users\Admin\AppData\Local\Temp\7C25.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"C:\Users\Admin\AppData\Local\Temp\7CC1.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\7D5E.tmp"C:\Users\Admin\AppData\Local\Temp\7D5E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\BB9F.tmp"C:\Users\Admin\AppData\Local\Temp\BB9F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\BF68.tmp"C:\Users\Admin\AppData\Local\Temp\BF68.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\C870.tmp"C:\Users\Admin\AppData\Local\Temp\C870.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\C93B.tmp"C:\Users\Admin\AppData\Local\Temp\C93B.tmp"23⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"24⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"25⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"26⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"27⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"28⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"29⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"30⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"31⤵
- Executes dropped EXE
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"32⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"33⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\EE48.tmp"C:\Users\Admin\AppData\Local\Temp\EE48.tmp"34⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"35⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"36⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"37⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\F81B.tmp"C:\Users\Admin\AppData\Local\Temp\F81B.tmp"38⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"39⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"40⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"41⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"42⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"43⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"44⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"45⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"46⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"47⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"48⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"49⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\CFB.tmp"C:\Users\Admin\AppData\Local\Temp\CFB.tmp"50⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\D88.tmp"C:\Users\Admin\AppData\Local\Temp\D88.tmp"51⤵
- Executes dropped EXE
PID:384 -
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"52⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"53⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"54⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"55⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"56⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"57⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"58⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\118F.tmp"C:\Users\Admin\AppData\Local\Temp\118F.tmp"59⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"60⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"61⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\1325.tmp"C:\Users\Admin\AppData\Local\Temp\1325.tmp"62⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"63⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\141F.tmp"C:\Users\Admin\AppData\Local\Temp\141F.tmp"64⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\14AC.tmp"C:\Users\Admin\AppData\Local\Temp\14AC.tmp"65⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\1539.tmp"C:\Users\Admin\AppData\Local\Temp\1539.tmp"66⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\15B6.tmp"C:\Users\Admin\AppData\Local\Temp\15B6.tmp"67⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\1633.tmp"C:\Users\Admin\AppData\Local\Temp\1633.tmp"68⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\16B0.tmp"C:\Users\Admin\AppData\Local\Temp\16B0.tmp"69⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"70⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"71⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"72⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"73⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\1921.tmp"C:\Users\Admin\AppData\Local\Temp\1921.tmp"74⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"75⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"76⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"77⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"78⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\1B82.tmp"C:\Users\Admin\AppData\Local\Temp\1B82.tmp"79⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"80⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"81⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"82⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"83⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"84⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\1E41.tmp"C:\Users\Admin\AppData\Local\Temp\1E41.tmp"85⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"86⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"87⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"88⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2025.tmp"C:\Users\Admin\AppData\Local\Temp\2025.tmp"89⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"90⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\2110.tmp"C:\Users\Admin\AppData\Local\Temp\2110.tmp"91⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"92⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\21FA.tmp"C:\Users\Admin\AppData\Local\Temp\21FA.tmp"93⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\2268.tmp"C:\Users\Admin\AppData\Local\Temp\2268.tmp"94⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"95⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"96⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"97⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"98⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"99⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"100⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\2601.tmp"C:\Users\Admin\AppData\Local\Temp\2601.tmp"101⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"102⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\26EC.tmp"C:\Users\Admin\AppData\Local\Temp\26EC.tmp"103⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"104⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\27E6.tmp"C:\Users\Admin\AppData\Local\Temp\27E6.tmp"105⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\2863.tmp"C:\Users\Admin\AppData\Local\Temp\2863.tmp"106⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\28D0.tmp"C:\Users\Admin\AppData\Local\Temp\28D0.tmp"107⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"108⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"109⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\2A38.tmp"C:\Users\Admin\AppData\Local\Temp\2A38.tmp"110⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"111⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"112⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"113⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"C:\Users\Admin\AppData\Local\Temp\2C0C.tmp"114⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"115⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\2D16.tmp"C:\Users\Admin\AppData\Local\Temp\2D16.tmp"116⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"117⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"118⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"119⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"120⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"121⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\3033.tmp"C:\Users\Admin\AppData\Local\Temp\3033.tmp"122⤵PID:4304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-