Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 10:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe
-
Size
486KB
-
MD5
b9f12906afb58c3176b2a4f97f5efa49
-
SHA1
83509b1e0989bbef22426a7145e6185cb971f72e
-
SHA256
ce4c73e4ed6373510058388f210d8b542967b2ab3fb6ad7f05d6e0a81035833a
-
SHA512
caf45768b9fa05b2b1a9009afa9a56ce883267eb453053747b3a1a840cbbdc64818eb20306ba428bcf43206456dda23acd49ebb2e01f1950654425adc7fecf13
-
SSDEEP
12288:oU5rCOTeiDxCwma3dlUBd6ncFlI0GfMnkNZ:oUQOJDxMo7ERI0yYkN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4156 7FCF.tmp 2780 80A9.tmp 4056 8155.tmp 2952 8230.tmp 4972 830B.tmp 4520 83C6.tmp 3168 8472.tmp 468 851E.tmp 2912 85AB.tmp 2464 8656.tmp 3744 86F3.tmp 3588 87BE.tmp 3132 88E7.tmp 4168 8983.tmp 3336 8A1F.tmp 1936 8ADB.tmp 4000 8B77.tmp 2144 8BE4.tmp 1212 8E36.tmp 1660 8ED2.tmp 880 8F5F.tmp 1924 8FFB.tmp 3024 90B7.tmp 2928 9172.tmp 2284 923D.tmp 1552 92F9.tmp 2644 93B4.tmp 4244 9451.tmp 1332 951C.tmp 4500 95D7.tmp 4512 9693.tmp 4232 971F.tmp 2968 97EA.tmp 924 98B6.tmp 4252 9942.tmp 1416 99DE.tmp 3164 9A8A.tmp 4156 9B17.tmp 4240 9BF2.tmp 4372 9C7E.tmp 5004 9D1B.tmp 4540 9DB7.tmp 1480 9E53.tmp 3368 9EE0.tmp 2504 9F7C.tmp 2316 A018.tmp 1216 A0A5.tmp 1348 A141.tmp 2604 A1CE.tmp 840 A299.tmp 468 A345.tmp 4324 A3D1.tmp 2912 A45E.tmp 2464 A4EB.tmp 3728 A568.tmp 5016 A5D5.tmp 4736 A662.tmp 2948 A6BF.tmp 1404 A75C.tmp 3548 A7B9.tmp 3940 A8D3.tmp 3048 A97E.tmp 4160 AA0B.tmp 4068 AAB7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4156 2208 NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe 88 PID 2208 wrote to memory of 4156 2208 NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe 88 PID 2208 wrote to memory of 4156 2208 NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe 88 PID 4156 wrote to memory of 2780 4156 7FCF.tmp 90 PID 4156 wrote to memory of 2780 4156 7FCF.tmp 90 PID 4156 wrote to memory of 2780 4156 7FCF.tmp 90 PID 2780 wrote to memory of 4056 2780 80A9.tmp 91 PID 2780 wrote to memory of 4056 2780 80A9.tmp 91 PID 2780 wrote to memory of 4056 2780 80A9.tmp 91 PID 4056 wrote to memory of 2952 4056 8155.tmp 92 PID 4056 wrote to memory of 2952 4056 8155.tmp 92 PID 4056 wrote to memory of 2952 4056 8155.tmp 92 PID 2952 wrote to memory of 4972 2952 8230.tmp 94 PID 2952 wrote to memory of 4972 2952 8230.tmp 94 PID 2952 wrote to memory of 4972 2952 8230.tmp 94 PID 4972 wrote to memory of 4520 4972 830B.tmp 95 PID 4972 wrote to memory of 4520 4972 830B.tmp 95 PID 4972 wrote to memory of 4520 4972 830B.tmp 95 PID 4520 wrote to memory of 3168 4520 83C6.tmp 96 PID 4520 wrote to memory of 3168 4520 83C6.tmp 96 PID 4520 wrote to memory of 3168 4520 83C6.tmp 96 PID 3168 wrote to memory of 468 3168 8472.tmp 97 PID 3168 wrote to memory of 468 3168 8472.tmp 97 PID 3168 wrote to memory of 468 3168 8472.tmp 97 PID 468 wrote to memory of 2912 468 851E.tmp 98 PID 468 wrote to memory of 2912 468 851E.tmp 98 PID 468 wrote to memory of 2912 468 851E.tmp 98 PID 2912 wrote to memory of 2464 2912 85AB.tmp 99 PID 2912 wrote to memory of 2464 2912 85AB.tmp 99 PID 2912 wrote to memory of 2464 2912 85AB.tmp 99 PID 2464 wrote to memory of 3744 2464 8656.tmp 100 PID 2464 wrote to memory of 3744 2464 8656.tmp 100 PID 2464 wrote to memory of 3744 2464 8656.tmp 100 PID 3744 wrote to memory of 3588 3744 86F3.tmp 101 PID 3744 wrote to memory of 3588 3744 86F3.tmp 101 PID 3744 wrote to memory of 3588 3744 86F3.tmp 101 PID 3588 wrote to memory of 3132 3588 87BE.tmp 102 PID 3588 wrote to memory of 3132 3588 87BE.tmp 102 PID 3588 wrote to memory of 3132 3588 87BE.tmp 102 PID 3132 wrote to memory of 4168 3132 88E7.tmp 103 PID 3132 wrote to memory of 4168 3132 88E7.tmp 103 PID 3132 wrote to memory of 4168 3132 88E7.tmp 103 PID 4168 wrote to memory of 3336 4168 8983.tmp 104 PID 4168 wrote to memory of 3336 4168 8983.tmp 104 PID 4168 wrote to memory of 3336 4168 8983.tmp 104 PID 3336 wrote to memory of 1936 3336 8A1F.tmp 105 PID 3336 wrote to memory of 1936 3336 8A1F.tmp 105 PID 3336 wrote to memory of 1936 3336 8A1F.tmp 105 PID 1936 wrote to memory of 4000 1936 8ADB.tmp 107 PID 1936 wrote to memory of 4000 1936 8ADB.tmp 107 PID 1936 wrote to memory of 4000 1936 8ADB.tmp 107 PID 4000 wrote to memory of 2144 4000 8B77.tmp 108 PID 4000 wrote to memory of 2144 4000 8B77.tmp 108 PID 4000 wrote to memory of 2144 4000 8B77.tmp 108 PID 2144 wrote to memory of 1212 2144 8BE4.tmp 109 PID 2144 wrote to memory of 1212 2144 8BE4.tmp 109 PID 2144 wrote to memory of 1212 2144 8BE4.tmp 109 PID 1212 wrote to memory of 1660 1212 8E36.tmp 110 PID 1212 wrote to memory of 1660 1212 8E36.tmp 110 PID 1212 wrote to memory of 1660 1212 8E36.tmp 110 PID 1660 wrote to memory of 880 1660 8ED2.tmp 112 PID 1660 wrote to memory of 880 1660 8ED2.tmp 112 PID 1660 wrote to memory of 880 1660 8ED2.tmp 112 PID 880 wrote to memory of 1924 880 8F5F.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_b9f12906afb58c3176b2a4f97f5efa49_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"C:\Users\Admin\AppData\Local\Temp\7FCF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\80A9.tmp"C:\Users\Admin\AppData\Local\Temp\80A9.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\8230.tmp"C:\Users\Admin\AppData\Local\Temp\8230.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\83C6.tmp"C:\Users\Admin\AppData\Local\Temp\83C6.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\8472.tmp"C:\Users\Admin\AppData\Local\Temp\8472.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\851E.tmp"C:\Users\Admin\AppData\Local\Temp\851E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\85AB.tmp"C:\Users\Admin\AppData\Local\Temp\85AB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\87BE.tmp"C:\Users\Admin\AppData\Local\Temp\87BE.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\88E7.tmp"C:\Users\Admin\AppData\Local\Temp\88E7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\8983.tmp"C:\Users\Admin\AppData\Local\Temp\8983.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"C:\Users\Admin\AppData\Local\Temp\8A1F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\8B77.tmp"C:\Users\Admin\AppData\Local\Temp\8B77.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\8ED2.tmp"C:\Users\Admin\AppData\Local\Temp\8ED2.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"23⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\90B7.tmp"C:\Users\Admin\AppData\Local\Temp\90B7.tmp"24⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\9172.tmp"C:\Users\Admin\AppData\Local\Temp\9172.tmp"25⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\923D.tmp"C:\Users\Admin\AppData\Local\Temp\923D.tmp"26⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"27⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\93B4.tmp"C:\Users\Admin\AppData\Local\Temp\93B4.tmp"28⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\9451.tmp"C:\Users\Admin\AppData\Local\Temp\9451.tmp"29⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\951C.tmp"C:\Users\Admin\AppData\Local\Temp\951C.tmp"30⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\95D7.tmp"C:\Users\Admin\AppData\Local\Temp\95D7.tmp"31⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\9693.tmp"C:\Users\Admin\AppData\Local\Temp\9693.tmp"32⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\971F.tmp"C:\Users\Admin\AppData\Local\Temp\971F.tmp"33⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"34⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\98B6.tmp"C:\Users\Admin\AppData\Local\Temp\98B6.tmp"35⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"36⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\99DE.tmp"C:\Users\Admin\AppData\Local\Temp\99DE.tmp"37⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"38⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"39⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"40⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"41⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"42⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\9DB7.tmp"C:\Users\Admin\AppData\Local\Temp\9DB7.tmp"43⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\9E53.tmp"C:\Users\Admin\AppData\Local\Temp\9E53.tmp"44⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"45⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"46⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"47⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"48⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"49⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"50⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"51⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\A345.tmp"C:\Users\Admin\AppData\Local\Temp\A345.tmp"52⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"53⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"54⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"55⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\A568.tmp"C:\Users\Admin\AppData\Local\Temp\A568.tmp"56⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"57⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"58⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"59⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\A75C.tmp"C:\Users\Admin\AppData\Local\Temp\A75C.tmp"60⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"61⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"62⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\A97E.tmp"C:\Users\Admin\AppData\Local\Temp\A97E.tmp"63⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\AA0B.tmp"C:\Users\Admin\AppData\Local\Temp\AA0B.tmp"64⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"65⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\AB34.tmp"C:\Users\Admin\AppData\Local\Temp\AB34.tmp"66⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\ABD0.tmp"C:\Users\Admin\AppData\Local\Temp\ABD0.tmp"67⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\AC6C.tmp"C:\Users\Admin\AppData\Local\Temp\AC6C.tmp"68⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"69⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"70⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\AE70.tmp"C:\Users\Admin\AppData\Local\Temp\AE70.tmp"71⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"72⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"73⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\B006.tmp"C:\Users\Admin\AppData\Local\Temp\B006.tmp"74⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\B093.tmp"C:\Users\Admin\AppData\Local\Temp\B093.tmp"75⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\B110.tmp"C:\Users\Admin\AppData\Local\Temp\B110.tmp"76⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"77⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\B20A.tmp"C:\Users\Admin\AppData\Local\Temp\B20A.tmp"78⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\B287.tmp"C:\Users\Admin\AppData\Local\Temp\B287.tmp"79⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"80⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"81⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"82⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"83⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"84⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\B565.tmp"C:\Users\Admin\AppData\Local\Temp\B565.tmp"85⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"86⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"87⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"88⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"89⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"C:\Users\Admin\AppData\Local\Temp\B7C7.tmp"90⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"91⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"92⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\B93E.tmp"C:\Users\Admin\AppData\Local\Temp\B93E.tmp"93⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"94⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\BA38.tmp"C:\Users\Admin\AppData\Local\Temp\BA38.tmp"95⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"96⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"97⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"98⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"99⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"100⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\BD93.tmp"C:\Users\Admin\AppData\Local\Temp\BD93.tmp"101⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"102⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"103⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"104⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"105⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"106⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"107⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"108⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"109⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\C285.tmp"C:\Users\Admin\AppData\Local\Temp\C285.tmp"110⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"111⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\D15A.tmp"C:\Users\Admin\AppData\Local\Temp\D15A.tmp"112⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"113⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"114⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"115⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"116⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"117⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\DA81.tmp"C:\Users\Admin\AppData\Local\Temp\DA81.tmp"118⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"119⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"120⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"121⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"122⤵PID:3900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-