Analysis
-
max time kernel
157s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 16:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe
-
Size
520KB
-
MD5
5aa742aa305092b0fe9f9923ece0e758
-
SHA1
729fbabf386444aaa879b076ce62bb4fa6c215c4
-
SHA256
b239aad9a548ea61795399e86b02dfdd976d4c3f42d1f4792ae7b0da1843236f
-
SHA512
d2d8f7d2a549ff53b76d2e405276fe8865a1e7d1dad9b973570bd7d9f5ad07eb6165b7509827213621eb8744ba287717aa3f07287949e5ac8009f41abd12c15c
-
SSDEEP
12288:YcRnG07aWibcJUIL9kePdEGHSdGPTWi6NZ:YcI0BibcJP5PdAAD6N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2904 3F94.tmp 3476 42D0.tmp 4288 43CA.tmp 4156 44A5.tmp 4632 4513.tmp 3416 45ED.tmp 1260 466A.tmp 3460 4735.tmp 1212 49D5.tmp 1504 4B1D.tmp 1928 4C94.tmp 2728 4D31.tmp 3972 4EF6.tmp 3928 4FF0.tmp 1452 50BB.tmp 4152 5213.tmp 2548 533C.tmp 2256 5416.tmp 4004 5510.tmp 1192 55CC.tmp 552 5781.tmp 3872 5937.tmp 1952 5A02.tmp 228 5AAE.tmp 3692 5B79.tmp 3996 5C92.tmp 2652 5D6D.tmp 1900 5E86.tmp 2800 5F61.tmp 3712 604B.tmp 1248 6145.tmp 1460 6210.tmp 4608 62EB.tmp 1648 63E5.tmp 2068 6472.tmp 1968 64DF.tmp 4324 657B.tmp 4796 6637.tmp 2844 66B4.tmp 3760 6750.tmp 3276 67FC.tmp 3632 6889.tmp 4188 6906.tmp 3944 6992.tmp 756 6A5D.tmp 4812 6C13.tmp 4416 6CDE.tmp 3048 6D6B.tmp 1896 6DE8.tmp 4132 6E65.tmp 1732 6F7E.tmp 4180 7143.tmp 2984 71EF.tmp 1252 72D9.tmp 3644 7654.tmp 3448 76C1.tmp 4816 775E.tmp 3620 7A8A.tmp 3476 7BE2.tmp 3936 7C6E.tmp 1916 7CFB.tmp 436 7D68.tmp 1676 8047.tmp 4632 80D3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 2904 4100 NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe 84 PID 4100 wrote to memory of 2904 4100 NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe 84 PID 4100 wrote to memory of 2904 4100 NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe 84 PID 2904 wrote to memory of 3476 2904 3F94.tmp 85 PID 2904 wrote to memory of 3476 2904 3F94.tmp 85 PID 2904 wrote to memory of 3476 2904 3F94.tmp 85 PID 3476 wrote to memory of 4288 3476 42D0.tmp 86 PID 3476 wrote to memory of 4288 3476 42D0.tmp 86 PID 3476 wrote to memory of 4288 3476 42D0.tmp 86 PID 4288 wrote to memory of 4156 4288 43CA.tmp 87 PID 4288 wrote to memory of 4156 4288 43CA.tmp 87 PID 4288 wrote to memory of 4156 4288 43CA.tmp 87 PID 4156 wrote to memory of 4632 4156 44A5.tmp 88 PID 4156 wrote to memory of 4632 4156 44A5.tmp 88 PID 4156 wrote to memory of 4632 4156 44A5.tmp 88 PID 4632 wrote to memory of 3416 4632 4513.tmp 89 PID 4632 wrote to memory of 3416 4632 4513.tmp 89 PID 4632 wrote to memory of 3416 4632 4513.tmp 89 PID 3416 wrote to memory of 1260 3416 45ED.tmp 90 PID 3416 wrote to memory of 1260 3416 45ED.tmp 90 PID 3416 wrote to memory of 1260 3416 45ED.tmp 90 PID 1260 wrote to memory of 3460 1260 466A.tmp 91 PID 1260 wrote to memory of 3460 1260 466A.tmp 91 PID 1260 wrote to memory of 3460 1260 466A.tmp 91 PID 3460 wrote to memory of 1212 3460 4735.tmp 92 PID 3460 wrote to memory of 1212 3460 4735.tmp 92 PID 3460 wrote to memory of 1212 3460 4735.tmp 92 PID 1212 wrote to memory of 1504 1212 49D5.tmp 93 PID 1212 wrote to memory of 1504 1212 49D5.tmp 93 PID 1212 wrote to memory of 1504 1212 49D5.tmp 93 PID 1504 wrote to memory of 1928 1504 4B1D.tmp 94 PID 1504 wrote to memory of 1928 1504 4B1D.tmp 94 PID 1504 wrote to memory of 1928 1504 4B1D.tmp 94 PID 1928 wrote to memory of 2728 1928 4C94.tmp 95 PID 1928 wrote to memory of 2728 1928 4C94.tmp 95 PID 1928 wrote to memory of 2728 1928 4C94.tmp 95 PID 2728 wrote to memory of 3972 2728 4D31.tmp 96 PID 2728 wrote to memory of 3972 2728 4D31.tmp 96 PID 2728 wrote to memory of 3972 2728 4D31.tmp 96 PID 3972 wrote to memory of 3928 3972 4EF6.tmp 97 PID 3972 wrote to memory of 3928 3972 4EF6.tmp 97 PID 3972 wrote to memory of 3928 3972 4EF6.tmp 97 PID 3928 wrote to memory of 1452 3928 4FF0.tmp 98 PID 3928 wrote to memory of 1452 3928 4FF0.tmp 98 PID 3928 wrote to memory of 1452 3928 4FF0.tmp 98 PID 1452 wrote to memory of 4152 1452 50BB.tmp 99 PID 1452 wrote to memory of 4152 1452 50BB.tmp 99 PID 1452 wrote to memory of 4152 1452 50BB.tmp 99 PID 4152 wrote to memory of 2548 4152 5213.tmp 100 PID 4152 wrote to memory of 2548 4152 5213.tmp 100 PID 4152 wrote to memory of 2548 4152 5213.tmp 100 PID 2548 wrote to memory of 2256 2548 533C.tmp 101 PID 2548 wrote to memory of 2256 2548 533C.tmp 101 PID 2548 wrote to memory of 2256 2548 533C.tmp 101 PID 2256 wrote to memory of 4004 2256 5416.tmp 102 PID 2256 wrote to memory of 4004 2256 5416.tmp 102 PID 2256 wrote to memory of 4004 2256 5416.tmp 102 PID 4004 wrote to memory of 1192 4004 5510.tmp 103 PID 4004 wrote to memory of 1192 4004 5510.tmp 103 PID 4004 wrote to memory of 1192 4004 5510.tmp 103 PID 1192 wrote to memory of 552 1192 55CC.tmp 104 PID 1192 wrote to memory of 552 1192 55CC.tmp 104 PID 1192 wrote to memory of 552 1192 55CC.tmp 104 PID 552 wrote to memory of 3872 552 5781.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_5aa742aa305092b0fe9f9923ece0e758_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\3F94.tmp"C:\Users\Admin\AppData\Local\Temp\3F94.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\42D0.tmp"C:\Users\Admin\AppData\Local\Temp\42D0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\43CA.tmp"C:\Users\Admin\AppData\Local\Temp\43CA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\44A5.tmp"C:\Users\Admin\AppData\Local\Temp\44A5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\4513.tmp"C:\Users\Admin\AppData\Local\Temp\4513.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\45ED.tmp"C:\Users\Admin\AppData\Local\Temp\45ED.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\4735.tmp"C:\Users\Admin\AppData\Local\Temp\4735.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\49D5.tmp"C:\Users\Admin\AppData\Local\Temp\49D5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"C:\Users\Admin\AppData\Local\Temp\4B1D.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\4C94.tmp"C:\Users\Admin\AppData\Local\Temp\4C94.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\50BB.tmp"C:\Users\Admin\AppData\Local\Temp\50BB.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\5416.tmp"C:\Users\Admin\AppData\Local\Temp\5416.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"23⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"24⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"25⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"26⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"27⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"28⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\5E86.tmp"C:\Users\Admin\AppData\Local\Temp\5E86.tmp"29⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\5F61.tmp"C:\Users\Admin\AppData\Local\Temp\5F61.tmp"30⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\604B.tmp"C:\Users\Admin\AppData\Local\Temp\604B.tmp"31⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"32⤵
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\6210.tmp"C:\Users\Admin\AppData\Local\Temp\6210.tmp"33⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\62EB.tmp"C:\Users\Admin\AppData\Local\Temp\62EB.tmp"34⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\63E5.tmp"C:\Users\Admin\AppData\Local\Temp\63E5.tmp"35⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\6472.tmp"C:\Users\Admin\AppData\Local\Temp\6472.tmp"36⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"37⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\657B.tmp"C:\Users\Admin\AppData\Local\Temp\657B.tmp"38⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\6637.tmp"C:\Users\Admin\AppData\Local\Temp\6637.tmp"39⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\66B4.tmp"C:\Users\Admin\AppData\Local\Temp\66B4.tmp"40⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\6750.tmp"C:\Users\Admin\AppData\Local\Temp\6750.tmp"41⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\67FC.tmp"C:\Users\Admin\AppData\Local\Temp\67FC.tmp"42⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\6889.tmp"C:\Users\Admin\AppData\Local\Temp\6889.tmp"43⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"44⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\6992.tmp"C:\Users\Admin\AppData\Local\Temp\6992.tmp"45⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"46⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\6C13.tmp"C:\Users\Admin\AppData\Local\Temp\6C13.tmp"47⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"48⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"49⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"50⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\6E65.tmp"C:\Users\Admin\AppData\Local\Temp\6E65.tmp"51⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\6F7E.tmp"C:\Users\Admin\AppData\Local\Temp\6F7E.tmp"52⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7143.tmp"C:\Users\Admin\AppData\Local\Temp\7143.tmp"53⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\71EF.tmp"C:\Users\Admin\AppData\Local\Temp\71EF.tmp"54⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\726C.tmp"C:\Users\Admin\AppData\Local\Temp\726C.tmp"55⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\72D9.tmp"C:\Users\Admin\AppData\Local\Temp\72D9.tmp"56⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\7654.tmp"C:\Users\Admin\AppData\Local\Temp\7654.tmp"57⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\76C1.tmp"C:\Users\Admin\AppData\Local\Temp\76C1.tmp"58⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\775E.tmp"C:\Users\Admin\AppData\Local\Temp\775E.tmp"59⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"60⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"61⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"62⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\7CFB.tmp"C:\Users\Admin\AppData\Local\Temp\7CFB.tmp"63⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\7D68.tmp"C:\Users\Admin\AppData\Local\Temp\7D68.tmp"64⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\8047.tmp"C:\Users\Admin\AppData\Local\Temp\8047.tmp"65⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\80D3.tmp"C:\Users\Admin\AppData\Local\Temp\80D3.tmp"66⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\823B.tmp"C:\Users\Admin\AppData\Local\Temp\823B.tmp"67⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\8316.tmp"C:\Users\Admin\AppData\Local\Temp\8316.tmp"68⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\83A2.tmp"C:\Users\Admin\AppData\Local\Temp\83A2.tmp"69⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\8410.tmp"C:\Users\Admin\AppData\Local\Temp\8410.tmp"70⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\847D.tmp"C:\Users\Admin\AppData\Local\Temp\847D.tmp"71⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\86A0.tmp"C:\Users\Admin\AppData\Local\Temp\86A0.tmp"72⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\873C.tmp"C:\Users\Admin\AppData\Local\Temp\873C.tmp"73⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\87C9.tmp"C:\Users\Admin\AppData\Local\Temp\87C9.tmp"74⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\8855.tmp"C:\Users\Admin\AppData\Local\Temp\8855.tmp"75⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\88E2.tmp"C:\Users\Admin\AppData\Local\Temp\88E2.tmp"76⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\895F.tmp"C:\Users\Admin\AppData\Local\Temp\895F.tmp"77⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\89DC.tmp"C:\Users\Admin\AppData\Local\Temp\89DC.tmp"78⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\8AA7.tmp"C:\Users\Admin\AppData\Local\Temp\8AA7.tmp"79⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\8B43.tmp"C:\Users\Admin\AppData\Local\Temp\8B43.tmp"80⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"81⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"C:\Users\Admin\AppData\Local\Temp\8C5D.tmp"82⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\8CF9.tmp"C:\Users\Admin\AppData\Local\Temp\8CF9.tmp"83⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\8D66.tmp"C:\Users\Admin\AppData\Local\Temp\8D66.tmp"84⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\8DD4.tmp"C:\Users\Admin\AppData\Local\Temp\8DD4.tmp"85⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"86⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\8FD7.tmp"C:\Users\Admin\AppData\Local\Temp\8FD7.tmp"87⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\90D1.tmp"C:\Users\Admin\AppData\Local\Temp\90D1.tmp"88⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\915E.tmp"C:\Users\Admin\AppData\Local\Temp\915E.tmp"89⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\9219.tmp"C:\Users\Admin\AppData\Local\Temp\9219.tmp"90⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\92C5.tmp"C:\Users\Admin\AppData\Local\Temp\92C5.tmp"91⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\9342.tmp"C:\Users\Admin\AppData\Local\Temp\9342.tmp"92⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\93B0.tmp"C:\Users\Admin\AppData\Local\Temp\93B0.tmp"93⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\942D.tmp"C:\Users\Admin\AppData\Local\Temp\942D.tmp"94⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\94AA.tmp"C:\Users\Admin\AppData\Local\Temp\94AA.tmp"95⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\9555.tmp"C:\Users\Admin\AppData\Local\Temp\9555.tmp"96⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\95D2.tmp"C:\Users\Admin\AppData\Local\Temp\95D2.tmp"97⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\972A.tmp"C:\Users\Admin\AppData\Local\Temp\972A.tmp"98⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\9815.tmp"C:\Users\Admin\AppData\Local\Temp\9815.tmp"99⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\9882.tmp"C:\Users\Admin\AppData\Local\Temp\9882.tmp"100⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\990F.tmp"C:\Users\Admin\AppData\Local\Temp\990F.tmp"101⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\999B.tmp"C:\Users\Admin\AppData\Local\Temp\999B.tmp"102⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\9A37.tmp"C:\Users\Admin\AppData\Local\Temp\9A37.tmp"103⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\9AD4.tmp"C:\Users\Admin\AppData\Local\Temp\9AD4.tmp"104⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\9B70.tmp"C:\Users\Admin\AppData\Local\Temp\9B70.tmp"105⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\9C0C.tmp"C:\Users\Admin\AppData\Local\Temp\9C0C.tmp"106⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\9C89.tmp"C:\Users\Admin\AppData\Local\Temp\9C89.tmp"107⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\9D45.tmp"C:\Users\Admin\AppData\Local\Temp\9D45.tmp"108⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\9DE1.tmp"C:\Users\Admin\AppData\Local\Temp\9DE1.tmp"109⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\9E4E.tmp"C:\Users\Admin\AppData\Local\Temp\9E4E.tmp"110⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\9FB6.tmp"C:\Users\Admin\AppData\Local\Temp\9FB6.tmp"111⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\A042.tmp"C:\Users\Admin\AppData\Local\Temp\A042.tmp"112⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\A0CF.tmp"C:\Users\Admin\AppData\Local\Temp\A0CF.tmp"113⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\A16B.tmp"C:\Users\Admin\AppData\Local\Temp\A16B.tmp"114⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\A227.tmp"C:\Users\Admin\AppData\Local\Temp\A227.tmp"115⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\A294.tmp"C:\Users\Admin\AppData\Local\Temp\A294.tmp"116⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\A311.tmp"C:\Users\Admin\AppData\Local\Temp\A311.tmp"117⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\A38E.tmp"C:\Users\Admin\AppData\Local\Temp\A38E.tmp"118⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\A43A.tmp"C:\Users\Admin\AppData\Local\Temp\A43A.tmp"119⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\A4D6.tmp"C:\Users\Admin\AppData\Local\Temp\A4D6.tmp"120⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\A5D0.tmp"C:\Users\Admin\AppData\Local\Temp\A5D0.tmp"121⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\A63E.tmp"C:\Users\Admin\AppData\Local\Temp\A63E.tmp"122⤵PID:916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-