Analysis
-
max time kernel
158s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 17:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe
-
Size
486KB
-
MD5
464575d0aa1afa1fbd08d59be7cc5997
-
SHA1
f59a7596a8b1f7423dfed653409f2f8ad2dfd90d
-
SHA256
06fe14b03b40522fce8f3668afeb00c104411928a3005622aaa69f3bf46fb1e4
-
SHA512
e6c8b037bdf1c2d7c8d2de1f7191a0fed83ffd32e7d352d37958b6c1210fc07ff8f7fe3d5a6ada34e2079b1842925b6e4519652884c1026422a4b73a1bbb7268
-
SSDEEP
12288:oU5rCOTeiDEqRNtERzHOXOxG9LEarmZOBqNZ:oUQOJDpbtEpHKn9Yar+N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1084 296C.tmp 2372 2B41.tmp 1116 2D35.tmp 2756 312D.tmp 1032 32A4.tmp 3748 336F.tmp 208 35B1.tmp 1044 3803.tmp 4720 38CE.tmp 3876 39F7.tmp 4388 3AB2.tmp 3592 3BDB.tmp 3024 3CC6.tmp 4748 3E7B.tmp 3280 4050.tmp 3116 412B.tmp 3716 41C7.tmp 4484 435D.tmp 4844 4457.tmp 1676 4561.tmp 972 462C.tmp 1988 46A9.tmp 3576 4784.tmp 3452 487E.tmp 956 4997.tmp 2528 4A43.tmp 2556 4BC9.tmp 4312 4C85.tmp 4572 4D21.tmp 4716 4F54.tmp 2752 5138.tmp 1292 5242.tmp 3888 533C.tmp 1736 53D8.tmp 764 5501.tmp 4224 55BC.tmp 2320 56D5.tmp 1772 5772.tmp 4404 57FE.tmp 636 588B.tmp 3008 5927.tmp 1860 59B4.tmp 1664 5A60.tmp 3840 5B1B.tmp 3868 5BA8.tmp 3856 5C44.tmp 1396 5CD1.tmp 1900 5D6D.tmp 4860 5DFA.tmp 2484 5EB5.tmp 3564 5F32.tmp 4816 5FBF.tmp 400 605B.tmp 1924 61B3.tmp 4088 631A.tmp 1792 64EF.tmp 3216 65E9.tmp 2664 66E3.tmp 3784 67AE.tmp 1208 6889.tmp 5076 6925.tmp 1452 6A0F.tmp 868 6B09.tmp 3748 6BA6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1084 4536 NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe 83 PID 4536 wrote to memory of 1084 4536 NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe 83 PID 4536 wrote to memory of 1084 4536 NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe 83 PID 1084 wrote to memory of 2372 1084 296C.tmp 85 PID 1084 wrote to memory of 2372 1084 296C.tmp 85 PID 1084 wrote to memory of 2372 1084 296C.tmp 85 PID 2372 wrote to memory of 1116 2372 2B41.tmp 86 PID 2372 wrote to memory of 1116 2372 2B41.tmp 86 PID 2372 wrote to memory of 1116 2372 2B41.tmp 86 PID 1116 wrote to memory of 2756 1116 2D35.tmp 87 PID 1116 wrote to memory of 2756 1116 2D35.tmp 87 PID 1116 wrote to memory of 2756 1116 2D35.tmp 87 PID 2756 wrote to memory of 1032 2756 312D.tmp 88 PID 2756 wrote to memory of 1032 2756 312D.tmp 88 PID 2756 wrote to memory of 1032 2756 312D.tmp 88 PID 1032 wrote to memory of 3748 1032 32A4.tmp 89 PID 1032 wrote to memory of 3748 1032 32A4.tmp 89 PID 1032 wrote to memory of 3748 1032 32A4.tmp 89 PID 3748 wrote to memory of 208 3748 336F.tmp 90 PID 3748 wrote to memory of 208 3748 336F.tmp 90 PID 3748 wrote to memory of 208 3748 336F.tmp 90 PID 208 wrote to memory of 1044 208 35B1.tmp 91 PID 208 wrote to memory of 1044 208 35B1.tmp 91 PID 208 wrote to memory of 1044 208 35B1.tmp 91 PID 1044 wrote to memory of 4720 1044 3803.tmp 92 PID 1044 wrote to memory of 4720 1044 3803.tmp 92 PID 1044 wrote to memory of 4720 1044 3803.tmp 92 PID 4720 wrote to memory of 3876 4720 38CE.tmp 93 PID 4720 wrote to memory of 3876 4720 38CE.tmp 93 PID 4720 wrote to memory of 3876 4720 38CE.tmp 93 PID 3876 wrote to memory of 4388 3876 39F7.tmp 94 PID 3876 wrote to memory of 4388 3876 39F7.tmp 94 PID 3876 wrote to memory of 4388 3876 39F7.tmp 94 PID 4388 wrote to memory of 3592 4388 3AB2.tmp 95 PID 4388 wrote to memory of 3592 4388 3AB2.tmp 95 PID 4388 wrote to memory of 3592 4388 3AB2.tmp 95 PID 3592 wrote to memory of 3024 3592 3BDB.tmp 96 PID 3592 wrote to memory of 3024 3592 3BDB.tmp 96 PID 3592 wrote to memory of 3024 3592 3BDB.tmp 96 PID 3024 wrote to memory of 4748 3024 3CC6.tmp 97 PID 3024 wrote to memory of 4748 3024 3CC6.tmp 97 PID 3024 wrote to memory of 4748 3024 3CC6.tmp 97 PID 4748 wrote to memory of 3280 4748 3E7B.tmp 98 PID 4748 wrote to memory of 3280 4748 3E7B.tmp 98 PID 4748 wrote to memory of 3280 4748 3E7B.tmp 98 PID 3280 wrote to memory of 3116 3280 4050.tmp 99 PID 3280 wrote to memory of 3116 3280 4050.tmp 99 PID 3280 wrote to memory of 3116 3280 4050.tmp 99 PID 3116 wrote to memory of 3716 3116 412B.tmp 100 PID 3116 wrote to memory of 3716 3116 412B.tmp 100 PID 3116 wrote to memory of 3716 3116 412B.tmp 100 PID 3716 wrote to memory of 4484 3716 41C7.tmp 101 PID 3716 wrote to memory of 4484 3716 41C7.tmp 101 PID 3716 wrote to memory of 4484 3716 41C7.tmp 101 PID 4484 wrote to memory of 4844 4484 435D.tmp 102 PID 4484 wrote to memory of 4844 4484 435D.tmp 102 PID 4484 wrote to memory of 4844 4484 435D.tmp 102 PID 4844 wrote to memory of 1676 4844 4457.tmp 103 PID 4844 wrote to memory of 1676 4844 4457.tmp 103 PID 4844 wrote to memory of 1676 4844 4457.tmp 103 PID 1676 wrote to memory of 972 1676 4561.tmp 104 PID 1676 wrote to memory of 972 1676 4561.tmp 104 PID 1676 wrote to memory of 972 1676 4561.tmp 104 PID 972 wrote to memory of 1988 972 462C.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_464575d0aa1afa1fbd08d59be7cc5997_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\35B1.tmp"C:\Users\Admin\AppData\Local\Temp\35B1.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\38CE.tmp"C:\Users\Admin\AppData\Local\Temp\38CE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\39F7.tmp"C:\Users\Admin\AppData\Local\Temp\39F7.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\435D.tmp"C:\Users\Admin\AppData\Local\Temp\435D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\4457.tmp"C:\Users\Admin\AppData\Local\Temp\4457.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\4561.tmp"C:\Users\Admin\AppData\Local\Temp\4561.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\46A9.tmp"C:\Users\Admin\AppData\Local\Temp\46A9.tmp"23⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"24⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"25⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\4997.tmp"C:\Users\Admin\AppData\Local\Temp\4997.tmp"26⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\4A43.tmp"C:\Users\Admin\AppData\Local\Temp\4A43.tmp"27⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"28⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\4C85.tmp"C:\Users\Admin\AppData\Local\Temp\4C85.tmp"29⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\4D21.tmp"C:\Users\Admin\AppData\Local\Temp\4D21.tmp"30⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\4F54.tmp"C:\Users\Admin\AppData\Local\Temp\4F54.tmp"31⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\5138.tmp"C:\Users\Admin\AppData\Local\Temp\5138.tmp"32⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"33⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"34⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"35⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\5501.tmp"C:\Users\Admin\AppData\Local\Temp\5501.tmp"36⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\55BC.tmp"C:\Users\Admin\AppData\Local\Temp\55BC.tmp"37⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\56D5.tmp"C:\Users\Admin\AppData\Local\Temp\56D5.tmp"38⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"39⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\57FE.tmp"C:\Users\Admin\AppData\Local\Temp\57FE.tmp"40⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\588B.tmp"C:\Users\Admin\AppData\Local\Temp\588B.tmp"41⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\5927.tmp"C:\Users\Admin\AppData\Local\Temp\5927.tmp"42⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\59B4.tmp"C:\Users\Admin\AppData\Local\Temp\59B4.tmp"43⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\5A60.tmp"C:\Users\Admin\AppData\Local\Temp\5A60.tmp"44⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"45⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"46⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\5C44.tmp"C:\Users\Admin\AppData\Local\Temp\5C44.tmp"47⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\5CD1.tmp"C:\Users\Admin\AppData\Local\Temp\5CD1.tmp"48⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"49⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\5DFA.tmp"C:\Users\Admin\AppData\Local\Temp\5DFA.tmp"50⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"51⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\5F32.tmp"C:\Users\Admin\AppData\Local\Temp\5F32.tmp"52⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"53⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"54⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"55⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\631A.tmp"C:\Users\Admin\AppData\Local\Temp\631A.tmp"56⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"57⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"58⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\66E3.tmp"C:\Users\Admin\AppData\Local\Temp\66E3.tmp"59⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"60⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\6889.tmp"C:\Users\Admin\AppData\Local\Temp\6889.tmp"61⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\6925.tmp"C:\Users\Admin\AppData\Local\Temp\6925.tmp"62⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"63⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"64⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\6BA6.tmp"C:\Users\Admin\AppData\Local\Temp\6BA6.tmp"65⤵
- Executes dropped EXE
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\6C90.tmp"C:\Users\Admin\AppData\Local\Temp\6C90.tmp"66⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"67⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"68⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\6E84.tmp"C:\Users\Admin\AppData\Local\Temp\6E84.tmp"69⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\6F11.tmp"C:\Users\Admin\AppData\Local\Temp\6F11.tmp"70⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"71⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\70A7.tmp"C:\Users\Admin\AppData\Local\Temp\70A7.tmp"72⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\7133.tmp"C:\Users\Admin\AppData\Local\Temp\7133.tmp"73⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"74⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\728B.tmp"C:\Users\Admin\AppData\Local\Temp\728B.tmp"75⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"76⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\74DD.tmp"C:\Users\Admin\AppData\Local\Temp\74DD.tmp"77⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\7579.tmp"C:\Users\Admin\AppData\Local\Temp\7579.tmp"78⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\7829.tmp"C:\Users\Admin\AppData\Local\Temp\7829.tmp"79⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\78C5.tmp"C:\Users\Admin\AppData\Local\Temp\78C5.tmp"80⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\7952.tmp"C:\Users\Admin\AppData\Local\Temp\7952.tmp"81⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"82⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\7AD8.tmp"C:\Users\Admin\AppData\Local\Temp\7AD8.tmp"83⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\7B65.tmp"C:\Users\Admin\AppData\Local\Temp\7B65.tmp"84⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"C:\Users\Admin\AppData\Local\Temp\7BE2.tmp"85⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\7C7E.tmp"C:\Users\Admin\AppData\Local\Temp\7C7E.tmp"86⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\7D78.tmp"C:\Users\Admin\AppData\Local\Temp\7D78.tmp"87⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\7E14.tmp"C:\Users\Admin\AppData\Local\Temp\7E14.tmp"88⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"89⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"90⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\8037.tmp"C:\Users\Admin\AppData\Local\Temp\8037.tmp"91⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\80C4.tmp"C:\Users\Admin\AppData\Local\Temp\80C4.tmp"92⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\8170.tmp"C:\Users\Admin\AppData\Local\Temp\8170.tmp"93⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\81ED.tmp"C:\Users\Admin\AppData\Local\Temp\81ED.tmp"94⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\825A.tmp"C:\Users\Admin\AppData\Local\Temp\825A.tmp"95⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\82D7.tmp"C:\Users\Admin\AppData\Local\Temp\82D7.tmp"96⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\842F.tmp"C:\Users\Admin\AppData\Local\Temp\842F.tmp"97⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\84CB.tmp"C:\Users\Admin\AppData\Local\Temp\84CB.tmp"98⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\8567.tmp"C:\Users\Admin\AppData\Local\Temp\8567.tmp"99⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\8661.tmp"C:\Users\Admin\AppData\Local\Temp\8661.tmp"100⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\879A.tmp"C:\Users\Admin\AppData\Local\Temp\879A.tmp"101⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\88A3.tmp"C:\Users\Admin\AppData\Local\Temp\88A3.tmp"102⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\894F.tmp"C:\Users\Admin\AppData\Local\Temp\894F.tmp"103⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\89DC.tmp"C:\Users\Admin\AppData\Local\Temp\89DC.tmp"104⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\8A78.tmp"C:\Users\Admin\AppData\Local\Temp\8A78.tmp"105⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"C:\Users\Admin\AppData\Local\Temp\8CAB.tmp"106⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\8F0C.tmp"C:\Users\Admin\AppData\Local\Temp\8F0C.tmp"107⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\8FA8.tmp"C:\Users\Admin\AppData\Local\Temp\8FA8.tmp"108⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\916D.tmp"C:\Users\Admin\AppData\Local\Temp\916D.tmp"109⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\9296.tmp"C:\Users\Admin\AppData\Local\Temp\9296.tmp"110⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\9333.tmp"C:\Users\Admin\AppData\Local\Temp\9333.tmp"111⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\93B0.tmp"C:\Users\Admin\AppData\Local\Temp\93B0.tmp"112⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\942D.tmp"C:\Users\Admin\AppData\Local\Temp\942D.tmp"113⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\9601.tmp"C:\Users\Admin\AppData\Local\Temp\9601.tmp"114⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\968E.tmp"C:\Users\Admin\AppData\Local\Temp\968E.tmp"115⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\973A.tmp"C:\Users\Admin\AppData\Local\Temp\973A.tmp"116⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\99F9.tmp"C:\Users\Admin\AppData\Local\Temp\99F9.tmp"117⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\9A86.tmp"C:\Users\Admin\AppData\Local\Temp\9A86.tmp"118⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\9AF3.tmp"C:\Users\Admin\AppData\Local\Temp\9AF3.tmp"119⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\9BED.tmp"C:\Users\Admin\AppData\Local\Temp\9BED.tmp"120⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\9C99.tmp"C:\Users\Admin\AppData\Local\Temp\9C99.tmp"121⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\9D45.tmp"C:\Users\Admin\AppData\Local\Temp\9D45.tmp"122⤵PID:180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-