Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 16:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe
-
Size
486KB
-
MD5
8133d47aa7b7f964e65ca9926287eed1
-
SHA1
abd91fde1a821d805735ffed5fe14187ce85761e
-
SHA256
00053ac18090e0eb73ed79afc1b103a95583a54ffd46137329cacb3001c2d8f6
-
SHA512
9c9cf50000c9291c72084cfad37f07d51e468bbe513e1acba945715e9d292891418ce1401c340fe7577c5239d5570d776bf0ac52c3c1f3529c2d81de0bdead13
-
SSDEEP
12288:oU5rCOTeiDUMrA5CAqY9ZckH53JjX5pO8T3NZ:oUQOJDBrA5CjY9ZznN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2804 5203.tmp 2308 56E5.tmp 2444 5C06.tmp 1064 5CF0.tmp 4380 5FBF.tmp 876 6136.tmp 1044 6230.tmp 2836 62FB.tmp 2332 64B0.tmp 4604 656C.tmp 2412 6647.tmp 2116 66F2.tmp 4364 67AE.tmp 1156 6925.tmp 1928 6ADA.tmp 2100 6CAF.tmp 1020 6EA3.tmp 1908 6F30.tmp 1412 7039.tmp 5040 71EF.tmp 4260 7421.tmp 2380 749E.tmp 1984 76C1.tmp 1552 7848.tmp 1968 78C5.tmp 4292 7961.tmp 4536 7A5B.tmp 4120 7D0B.tmp 2156 7D88.tmp 4808 7EFF.tmp 3504 7FCA.tmp 2844 8076.tmp 572 83A2.tmp 3508 841F.tmp 4352 849C.tmp 4896 8587.tmp 3520 8681.tmp 4844 8826.tmp 3904 897E.tmp 4968 8A88.tmp 3552 8B63.tmp 4492 8C2E.tmp 3756 8E31.tmp 1596 911F.tmp 2556 91CB.tmp 4628 9248.tmp 1464 92C5.tmp 436 93EE.tmp 3256 946B.tmp 564 9584.tmp 832 9601.tmp 4360 967E.tmp 4284 98FF.tmp 3712 99CA.tmp 5096 9A47.tmp 4420 9AC4.tmp 2296 9B51.tmp 4440 9CA8.tmp 4152 9EEB.tmp 1536 9F87.tmp 4872 A013.tmp 4916 A2C3.tmp 1064 A350.tmp 820 A3DC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2804 1740 NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe 84 PID 1740 wrote to memory of 2804 1740 NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe 84 PID 1740 wrote to memory of 2804 1740 NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe 84 PID 2804 wrote to memory of 2308 2804 5203.tmp 85 PID 2804 wrote to memory of 2308 2804 5203.tmp 85 PID 2804 wrote to memory of 2308 2804 5203.tmp 85 PID 2308 wrote to memory of 2444 2308 56E5.tmp 86 PID 2308 wrote to memory of 2444 2308 56E5.tmp 86 PID 2308 wrote to memory of 2444 2308 56E5.tmp 86 PID 2444 wrote to memory of 1064 2444 5C06.tmp 87 PID 2444 wrote to memory of 1064 2444 5C06.tmp 87 PID 2444 wrote to memory of 1064 2444 5C06.tmp 87 PID 1064 wrote to memory of 4380 1064 5CF0.tmp 88 PID 1064 wrote to memory of 4380 1064 5CF0.tmp 88 PID 1064 wrote to memory of 4380 1064 5CF0.tmp 88 PID 4380 wrote to memory of 876 4380 5FBF.tmp 89 PID 4380 wrote to memory of 876 4380 5FBF.tmp 89 PID 4380 wrote to memory of 876 4380 5FBF.tmp 89 PID 876 wrote to memory of 1044 876 6136.tmp 90 PID 876 wrote to memory of 1044 876 6136.tmp 90 PID 876 wrote to memory of 1044 876 6136.tmp 90 PID 1044 wrote to memory of 2836 1044 6230.tmp 91 PID 1044 wrote to memory of 2836 1044 6230.tmp 91 PID 1044 wrote to memory of 2836 1044 6230.tmp 91 PID 2836 wrote to memory of 2332 2836 62FB.tmp 92 PID 2836 wrote to memory of 2332 2836 62FB.tmp 92 PID 2836 wrote to memory of 2332 2836 62FB.tmp 92 PID 2332 wrote to memory of 4604 2332 64B0.tmp 93 PID 2332 wrote to memory of 4604 2332 64B0.tmp 93 PID 2332 wrote to memory of 4604 2332 64B0.tmp 93 PID 4604 wrote to memory of 2412 4604 656C.tmp 94 PID 4604 wrote to memory of 2412 4604 656C.tmp 94 PID 4604 wrote to memory of 2412 4604 656C.tmp 94 PID 2412 wrote to memory of 2116 2412 6647.tmp 95 PID 2412 wrote to memory of 2116 2412 6647.tmp 95 PID 2412 wrote to memory of 2116 2412 6647.tmp 95 PID 2116 wrote to memory of 4364 2116 66F2.tmp 96 PID 2116 wrote to memory of 4364 2116 66F2.tmp 96 PID 2116 wrote to memory of 4364 2116 66F2.tmp 96 PID 4364 wrote to memory of 1156 4364 67AE.tmp 97 PID 4364 wrote to memory of 1156 4364 67AE.tmp 97 PID 4364 wrote to memory of 1156 4364 67AE.tmp 97 PID 1156 wrote to memory of 1928 1156 6925.tmp 98 PID 1156 wrote to memory of 1928 1156 6925.tmp 98 PID 1156 wrote to memory of 1928 1156 6925.tmp 98 PID 1928 wrote to memory of 2100 1928 6ADA.tmp 99 PID 1928 wrote to memory of 2100 1928 6ADA.tmp 99 PID 1928 wrote to memory of 2100 1928 6ADA.tmp 99 PID 2100 wrote to memory of 1020 2100 6CAF.tmp 100 PID 2100 wrote to memory of 1020 2100 6CAF.tmp 100 PID 2100 wrote to memory of 1020 2100 6CAF.tmp 100 PID 1020 wrote to memory of 1908 1020 6EA3.tmp 101 PID 1020 wrote to memory of 1908 1020 6EA3.tmp 101 PID 1020 wrote to memory of 1908 1020 6EA3.tmp 101 PID 1908 wrote to memory of 1412 1908 6F30.tmp 102 PID 1908 wrote to memory of 1412 1908 6F30.tmp 102 PID 1908 wrote to memory of 1412 1908 6F30.tmp 102 PID 1412 wrote to memory of 5040 1412 7039.tmp 103 PID 1412 wrote to memory of 5040 1412 7039.tmp 103 PID 1412 wrote to memory of 5040 1412 7039.tmp 103 PID 5040 wrote to memory of 4260 5040 71EF.tmp 104 PID 5040 wrote to memory of 4260 5040 71EF.tmp 104 PID 5040 wrote to memory of 4260 5040 71EF.tmp 104 PID 4260 wrote to memory of 2380 4260 7421.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_8133d47aa7b7f964e65ca9926287eed1_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\5C06.tmp"C:\Users\Admin\AppData\Local\Temp\5C06.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\64B0.tmp"C:\Users\Admin\AppData\Local\Temp\64B0.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\656C.tmp"C:\Users\Admin\AppData\Local\Temp\656C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\6647.tmp"C:\Users\Admin\AppData\Local\Temp\6647.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\66F2.tmp"C:\Users\Admin\AppData\Local\Temp\66F2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\6925.tmp"C:\Users\Admin\AppData\Local\Temp\6925.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\6EA3.tmp"C:\Users\Admin\AppData\Local\Temp\6EA3.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\6F30.tmp"C:\Users\Admin\AppData\Local\Temp\6F30.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\7039.tmp"C:\Users\Admin\AppData\Local\Temp\7039.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\71EF.tmp"C:\Users\Admin\AppData\Local\Temp\71EF.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\7421.tmp"C:\Users\Admin\AppData\Local\Temp\7421.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\749E.tmp"C:\Users\Admin\AppData\Local\Temp\749E.tmp"23⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\76C1.tmp"C:\Users\Admin\AppData\Local\Temp\76C1.tmp"24⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\7848.tmp"C:\Users\Admin\AppData\Local\Temp\7848.tmp"25⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\78C5.tmp"C:\Users\Admin\AppData\Local\Temp\78C5.tmp"26⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\7961.tmp"C:\Users\Admin\AppData\Local\Temp\7961.tmp"27⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\7A5B.tmp"C:\Users\Admin\AppData\Local\Temp\7A5B.tmp"28⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"C:\Users\Admin\AppData\Local\Temp\7D0B.tmp"29⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"30⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"31⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"32⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\8076.tmp"C:\Users\Admin\AppData\Local\Temp\8076.tmp"33⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\83A2.tmp"C:\Users\Admin\AppData\Local\Temp\83A2.tmp"34⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"35⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\849C.tmp"C:\Users\Admin\AppData\Local\Temp\849C.tmp"36⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\8587.tmp"C:\Users\Admin\AppData\Local\Temp\8587.tmp"37⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\8681.tmp"C:\Users\Admin\AppData\Local\Temp\8681.tmp"38⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\8826.tmp"C:\Users\Admin\AppData\Local\Temp\8826.tmp"39⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\897E.tmp"C:\Users\Admin\AppData\Local\Temp\897E.tmp"40⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\8A88.tmp"C:\Users\Admin\AppData\Local\Temp\8A88.tmp"41⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\8B63.tmp"C:\Users\Admin\AppData\Local\Temp\8B63.tmp"42⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"43⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\8E31.tmp"C:\Users\Admin\AppData\Local\Temp\8E31.tmp"44⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\911F.tmp"C:\Users\Admin\AppData\Local\Temp\911F.tmp"45⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\91CB.tmp"C:\Users\Admin\AppData\Local\Temp\91CB.tmp"46⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\9248.tmp"C:\Users\Admin\AppData\Local\Temp\9248.tmp"47⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\92C5.tmp"C:\Users\Admin\AppData\Local\Temp\92C5.tmp"48⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\93EE.tmp"C:\Users\Admin\AppData\Local\Temp\93EE.tmp"49⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\946B.tmp"C:\Users\Admin\AppData\Local\Temp\946B.tmp"50⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\9584.tmp"C:\Users\Admin\AppData\Local\Temp\9584.tmp"51⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\9601.tmp"C:\Users\Admin\AppData\Local\Temp\9601.tmp"52⤵
- Executes dropped EXE
PID:832 -
C:\Users\Admin\AppData\Local\Temp\967E.tmp"C:\Users\Admin\AppData\Local\Temp\967E.tmp"53⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\98FF.tmp"C:\Users\Admin\AppData\Local\Temp\98FF.tmp"54⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\99CA.tmp"C:\Users\Admin\AppData\Local\Temp\99CA.tmp"55⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\9A47.tmp"C:\Users\Admin\AppData\Local\Temp\9A47.tmp"56⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"57⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\9B51.tmp"C:\Users\Admin\AppData\Local\Temp\9B51.tmp"58⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\9CA8.tmp"C:\Users\Admin\AppData\Local\Temp\9CA8.tmp"59⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\9EEB.tmp"C:\Users\Admin\AppData\Local\Temp\9EEB.tmp"60⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\9F87.tmp"C:\Users\Admin\AppData\Local\Temp\9F87.tmp"61⤵
- Executes dropped EXE
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\A013.tmp"C:\Users\Admin\AppData\Local\Temp\A013.tmp"62⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\A2C3.tmp"C:\Users\Admin\AppData\Local\Temp\A2C3.tmp"63⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\A350.tmp"C:\Users\Admin\AppData\Local\Temp\A350.tmp"64⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\A3DC.tmp"C:\Users\Admin\AppData\Local\Temp\A3DC.tmp"65⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\A5D0.tmp"C:\Users\Admin\AppData\Local\Temp\A5D0.tmp"66⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\A6AB.tmp"C:\Users\Admin\AppData\Local\Temp\A6AB.tmp"67⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\A738.tmp"C:\Users\Admin\AppData\Local\Temp\A738.tmp"68⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\A7E3.tmp"C:\Users\Admin\AppData\Local\Temp\A7E3.tmp"69⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\AA74.tmp"C:\Users\Admin\AppData\Local\Temp\AA74.tmp"70⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\AB2F.tmp"C:\Users\Admin\AppData\Local\Temp\AB2F.tmp"71⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"72⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\AD71.tmp"C:\Users\Admin\AppData\Local\Temp\AD71.tmp"73⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\AE1D.tmp"C:\Users\Admin\AppData\Local\Temp\AE1D.tmp"74⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\AEB9.tmp"C:\Users\Admin\AppData\Local\Temp\AEB9.tmp"75⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\AF46.tmp"C:\Users\Admin\AppData\Local\Temp\AF46.tmp"76⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\B05F.tmp"C:\Users\Admin\AppData\Local\Temp\B05F.tmp"77⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\B14A.tmp"C:\Users\Admin\AppData\Local\Temp\B14A.tmp"78⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\B1B7.tmp"C:\Users\Admin\AppData\Local\Temp\B1B7.tmp"79⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\B35D.tmp"C:\Users\Admin\AppData\Local\Temp\B35D.tmp"80⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\B409.tmp"C:\Users\Admin\AppData\Local\Temp\B409.tmp"81⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"C:\Users\Admin\AppData\Local\Temp\B4A5.tmp"82⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\B541.tmp"C:\Users\Admin\AppData\Local\Temp\B541.tmp"83⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\B64B.tmp"C:\Users\Admin\AppData\Local\Temp\B64B.tmp"84⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"85⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\B755.tmp"C:\Users\Admin\AppData\Local\Temp\B755.tmp"86⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\B7E1.tmp"C:\Users\Admin\AppData\Local\Temp\B7E1.tmp"87⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\B8AC.tmp"C:\Users\Admin\AppData\Local\Temp\B8AC.tmp"88⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\B939.tmp"C:\Users\Admin\AppData\Local\Temp\B939.tmp"89⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"90⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\BBC9.tmp"C:\Users\Admin\AppData\Local\Temp\BBC9.tmp"91⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\BC37.tmp"C:\Users\Admin\AppData\Local\Temp\BC37.tmp"92⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"93⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"94⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\BF44.tmp"C:\Users\Admin\AppData\Local\Temp\BF44.tmp"95⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"96⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\C1F3.tmp"C:\Users\Admin\AppData\Local\Temp\C1F3.tmp"97⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\C2BE.tmp"C:\Users\Admin\AppData\Local\Temp\C2BE.tmp"98⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\C35B.tmp"C:\Users\Admin\AppData\Local\Temp\C35B.tmp"99⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\C54F.tmp"C:\Users\Admin\AppData\Local\Temp\C54F.tmp"100⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\C743.tmp"C:\Users\Admin\AppData\Local\Temp\C743.tmp"101⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\CABD.tmp"C:\Users\Admin\AppData\Local\Temp\CABD.tmp"102⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"103⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\CBC7.tmp"C:\Users\Admin\AppData\Local\Temp\CBC7.tmp"104⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\CC34.tmp"C:\Users\Admin\AppData\Local\Temp\CC34.tmp"105⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\CCFF.tmp"C:\Users\Admin\AppData\Local\Temp\CCFF.tmp"106⤵PID:496
-
C:\Users\Admin\AppData\Local\Temp\CF70.tmp"C:\Users\Admin\AppData\Local\Temp\CF70.tmp"107⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\CFED.tmp"C:\Users\Admin\AppData\Local\Temp\CFED.tmp"108⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\D116.tmp"C:\Users\Admin\AppData\Local\Temp\D116.tmp"109⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\D201.tmp"C:\Users\Admin\AppData\Local\Temp\D201.tmp"110⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\D29D.tmp"C:\Users\Admin\AppData\Local\Temp\D29D.tmp"111⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\D339.tmp"C:\Users\Admin\AppData\Local\Temp\D339.tmp"112⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\D3C6.tmp"C:\Users\Admin\AppData\Local\Temp\D3C6.tmp"113⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\D462.tmp"C:\Users\Admin\AppData\Local\Temp\D462.tmp"114⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\D712.tmp"C:\Users\Admin\AppData\Local\Temp\D712.tmp"115⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\D7FC.tmp"C:\Users\Admin\AppData\Local\Temp\D7FC.tmp"116⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\D915.tmp"C:\Users\Admin\AppData\Local\Temp\D915.tmp"117⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\D9A2.tmp"C:\Users\Admin\AppData\Local\Temp\D9A2.tmp"118⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\DA1F.tmp"C:\Users\Admin\AppData\Local\Temp\DA1F.tmp"119⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\DAAB.tmp"C:\Users\Admin\AppData\Local\Temp\DAAB.tmp"120⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\DB28.tmp"C:\Users\Admin\AppData\Local\Temp\DB28.tmp"121⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\DCCE.tmp"C:\Users\Admin\AppData\Local\Temp\DCCE.tmp"122⤵PID:3348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-