Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 10:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe
-
Size
486KB
-
MD5
16ca16c4da34200014c9e113d11f257b
-
SHA1
47dd5d9aa0c2f29833eaaea0940bc4045ed92d44
-
SHA256
5d4fdc6817e43f9c59fa09d54383b64bd37b0da99f3738554605985ae4ef2d02
-
SHA512
2ea92b412df5b98ae648a0d5d8bd897e8967d0f976e4932fb24f506240ad87f1eb74bc4dce052ad95aa139eb9123fabe98244ec7878e82e985b7fe306f75443d
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7lfOuzBPho3D9FcfzhRkhTMmSlbX6/NLsH3dZ:/U5rCOTeiDlfDBZy5FclREYmSBiwNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2744 CA35.tmp 1128 CB01.tmp 3960 CBCC.tmp 5116 CCE5.tmp 3104 CD81.tmp 1596 CE5C.tmp 652 CEF8.tmp 1584 CFC3.tmp 4824 D050.tmp 1624 D0EC.tmp 2208 D1A8.tmp 3984 D244.tmp 1904 D2FF.tmp 1536 D4D4.tmp 3928 D580.tmp 4644 D61C.tmp 3580 D6B9.tmp 4572 D726.tmp 2188 D7E1.tmp 3448 D87E.tmp 3712 D91A.tmp 1564 D9D5.tmp 3660 DA81.tmp 2848 DB3D.tmp 2424 DBF8.tmp 4480 DC85.tmp 3016 DD21.tmp 4552 DDDD.tmp 3276 DE69.tmp 4172 DF25.tmp 1464 DFC1.tmp 3636 E05D.tmp 1460 E0EA.tmp 1196 E167.tmp 3544 E203.tmp 3968 E280.tmp 2776 E2FD.tmp 4304 E36B.tmp 684 E3F7.tmp 4268 E465.tmp 1724 E4F1.tmp 316 E56E.tmp 2864 E5EB.tmp 3944 E668.tmp 4116 E6E5.tmp 2696 E762.tmp 3816 E7DF.tmp 4072 EAFC.tmp 2008 EB69.tmp 5112 EBF6.tmp 1836 EC73.tmp 4852 ECF0.tmp 5028 ED6D.tmp 2148 EDFA.tmp 412 EE86.tmp 4980 EF23.tmp 976 EFBF.tmp 1904 F06B.tmp 3740 F107.tmp 1104 F1B3.tmp 1700 F24F.tmp 2224 F339.tmp 4640 F3D6.tmp 2468 F482.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2744 1428 NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe 85 PID 1428 wrote to memory of 2744 1428 NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe 85 PID 1428 wrote to memory of 2744 1428 NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe 85 PID 2744 wrote to memory of 1128 2744 CA35.tmp 86 PID 2744 wrote to memory of 1128 2744 CA35.tmp 86 PID 2744 wrote to memory of 1128 2744 CA35.tmp 86 PID 1128 wrote to memory of 3960 1128 CB01.tmp 87 PID 1128 wrote to memory of 3960 1128 CB01.tmp 87 PID 1128 wrote to memory of 3960 1128 CB01.tmp 87 PID 3960 wrote to memory of 5116 3960 CBCC.tmp 88 PID 3960 wrote to memory of 5116 3960 CBCC.tmp 88 PID 3960 wrote to memory of 5116 3960 CBCC.tmp 88 PID 5116 wrote to memory of 3104 5116 CCE5.tmp 89 PID 5116 wrote to memory of 3104 5116 CCE5.tmp 89 PID 5116 wrote to memory of 3104 5116 CCE5.tmp 89 PID 3104 wrote to memory of 1596 3104 CD81.tmp 91 PID 3104 wrote to memory of 1596 3104 CD81.tmp 91 PID 3104 wrote to memory of 1596 3104 CD81.tmp 91 PID 1596 wrote to memory of 652 1596 CE5C.tmp 92 PID 1596 wrote to memory of 652 1596 CE5C.tmp 92 PID 1596 wrote to memory of 652 1596 CE5C.tmp 92 PID 652 wrote to memory of 1584 652 CEF8.tmp 93 PID 652 wrote to memory of 1584 652 CEF8.tmp 93 PID 652 wrote to memory of 1584 652 CEF8.tmp 93 PID 1584 wrote to memory of 4824 1584 CFC3.tmp 94 PID 1584 wrote to memory of 4824 1584 CFC3.tmp 94 PID 1584 wrote to memory of 4824 1584 CFC3.tmp 94 PID 4824 wrote to memory of 1624 4824 D050.tmp 95 PID 4824 wrote to memory of 1624 4824 D050.tmp 95 PID 4824 wrote to memory of 1624 4824 D050.tmp 95 PID 1624 wrote to memory of 2208 1624 D0EC.tmp 96 PID 1624 wrote to memory of 2208 1624 D0EC.tmp 96 PID 1624 wrote to memory of 2208 1624 D0EC.tmp 96 PID 2208 wrote to memory of 3984 2208 D1A8.tmp 97 PID 2208 wrote to memory of 3984 2208 D1A8.tmp 97 PID 2208 wrote to memory of 3984 2208 D1A8.tmp 97 PID 3984 wrote to memory of 1904 3984 D244.tmp 98 PID 3984 wrote to memory of 1904 3984 D244.tmp 98 PID 3984 wrote to memory of 1904 3984 D244.tmp 98 PID 1904 wrote to memory of 1536 1904 D2FF.tmp 99 PID 1904 wrote to memory of 1536 1904 D2FF.tmp 99 PID 1904 wrote to memory of 1536 1904 D2FF.tmp 99 PID 1536 wrote to memory of 3928 1536 D4D4.tmp 100 PID 1536 wrote to memory of 3928 1536 D4D4.tmp 100 PID 1536 wrote to memory of 3928 1536 D4D4.tmp 100 PID 3928 wrote to memory of 4644 3928 D580.tmp 101 PID 3928 wrote to memory of 4644 3928 D580.tmp 101 PID 3928 wrote to memory of 4644 3928 D580.tmp 101 PID 4644 wrote to memory of 3580 4644 D61C.tmp 102 PID 4644 wrote to memory of 3580 4644 D61C.tmp 102 PID 4644 wrote to memory of 3580 4644 D61C.tmp 102 PID 3580 wrote to memory of 4572 3580 D6B9.tmp 103 PID 3580 wrote to memory of 4572 3580 D6B9.tmp 103 PID 3580 wrote to memory of 4572 3580 D6B9.tmp 103 PID 4572 wrote to memory of 2188 4572 D726.tmp 104 PID 4572 wrote to memory of 2188 4572 D726.tmp 104 PID 4572 wrote to memory of 2188 4572 D726.tmp 104 PID 2188 wrote to memory of 3448 2188 D7E1.tmp 105 PID 2188 wrote to memory of 3448 2188 D7E1.tmp 105 PID 2188 wrote to memory of 3448 2188 D7E1.tmp 105 PID 3448 wrote to memory of 3712 3448 D87E.tmp 107 PID 3448 wrote to memory of 3712 3448 D87E.tmp 107 PID 3448 wrote to memory of 3712 3448 D87E.tmp 107 PID 3712 wrote to memory of 1564 3712 D91A.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-09_16ca16c4da34200014c9e113d11f257b_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\CB01.tmp"C:\Users\Admin\AppData\Local\Temp\CB01.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\CD81.tmp"C:\Users\Admin\AppData\Local\Temp\CD81.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\D050.tmp"C:\Users\Admin\AppData\Local\Temp\D050.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\D726.tmp"C:\Users\Admin\AppData\Local\Temp\D726.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"23⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\DA81.tmp"C:\Users\Admin\AppData\Local\Temp\DA81.tmp"24⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"25⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"26⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"27⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"28⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"29⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"30⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"31⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"32⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"33⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"34⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"35⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"36⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"37⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\E2FD.tmp"C:\Users\Admin\AppData\Local\Temp\E2FD.tmp"38⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"39⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"40⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"41⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"42⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"43⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"44⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\E668.tmp"C:\Users\Admin\AppData\Local\Temp\E668.tmp"45⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"46⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"47⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"48⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"49⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\EB69.tmp"C:\Users\Admin\AppData\Local\Temp\EB69.tmp"50⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"51⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"52⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"53⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"54⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"55⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"56⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"57⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"C:\Users\Admin\AppData\Local\Temp\EFBF.tmp"58⤵
- Executes dropped EXE
PID:976 -
C:\Users\Admin\AppData\Local\Temp\F06B.tmp"C:\Users\Admin\AppData\Local\Temp\F06B.tmp"59⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\F107.tmp"C:\Users\Admin\AppData\Local\Temp\F107.tmp"60⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"61⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\F24F.tmp"C:\Users\Admin\AppData\Local\Temp\F24F.tmp"62⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"63⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"64⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"65⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\F647.tmp"C:\Users\Admin\AppData\Local\Temp\F647.tmp"66⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\F741.tmp"C:\Users\Admin\AppData\Local\Temp\F741.tmp"67⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"68⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\F84A.tmp"C:\Users\Admin\AppData\Local\Temp\F84A.tmp"69⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"70⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"71⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"72⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\FB19.tmp"C:\Users\Admin\AppData\Local\Temp\FB19.tmp"73⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\FC03.tmp"C:\Users\Admin\AppData\Local\Temp\FC03.tmp"74⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"75⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"76⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"77⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"78⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\FF20.tmp"C:\Users\Admin\AppData\Local\Temp\FF20.tmp"79⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"80⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"81⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\114.tmp"C:\Users\Admin\AppData\Local\Temp\114.tmp"82⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\1A1.tmp"C:\Users\Admin\AppData\Local\Temp\1A1.tmp"83⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\25C.tmp"C:\Users\Admin\AppData\Local\Temp\25C.tmp"84⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\2CA.tmp"C:\Users\Admin\AppData\Local\Temp\2CA.tmp"85⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"86⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\3E3.tmp"C:\Users\Admin\AppData\Local\Temp\3E3.tmp"87⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"88⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\579.tmp"C:\Users\Admin\AppData\Local\Temp\579.tmp"89⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\635.tmp"C:\Users\Admin\AppData\Local\Temp\635.tmp"90⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"91⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\75E.tmp"C:\Users\Admin\AppData\Local\Temp\75E.tmp"92⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\7DB.tmp"C:\Users\Admin\AppData\Local\Temp\7DB.tmp"93⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\858.tmp"C:\Users\Admin\AppData\Local\Temp\858.tmp"94⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"95⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"96⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"97⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\AC9.tmp"C:\Users\Admin\AppData\Local\Temp\AC9.tmp"98⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\B65.tmp"C:\Users\Admin\AppData\Local\Temp\B65.tmp"99⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\BE2.tmp"C:\Users\Admin\AppData\Local\Temp\BE2.tmp"100⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"101⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\CFB.tmp"C:\Users\Admin\AppData\Local\Temp\CFB.tmp"102⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\D88.tmp"C:\Users\Admin\AppData\Local\Temp\D88.tmp"103⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"104⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\EEF.tmp"C:\Users\Admin\AppData\Local\Temp\EEF.tmp"105⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"106⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"107⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"108⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"109⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"110⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\12E7.tmp"C:\Users\Admin\AppData\Local\Temp\12E7.tmp"111⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"112⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"113⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"114⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"115⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\1652.tmp"C:\Users\Admin\AppData\Local\Temp\1652.tmp"116⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"117⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\178A.tmp"C:\Users\Admin\AppData\Local\Temp\178A.tmp"118⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"119⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"120⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"121⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\1A0B.tmp"C:\Users\Admin\AppData\Local\Temp\1A0B.tmp"122⤵PID:2132
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-