Analysis
-
max time kernel
154s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 18:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe
Resource
win7-20231023-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe
-
Size
486KB
-
MD5
60068c630aca3c8341d7feed69248c8a
-
SHA1
20ed1defb48b4e82c224b626e0a07f3f2223f174
-
SHA256
8b861e621fc834b5d00c23dd3582def62670f1409943be2f297d8cce54d8af07
-
SHA512
7f1ff9f2c03fa96b5769077493e517f9a5432aa02117188a5db8a8c4515c7292cfbdd51ad2cc4aaaa989a24de1c9c688bd2c06662bb76043852c2e3cd6e1a904
-
SSDEEP
12288:/U5rCOTeiDR6przQwPvRAVBhbUxGjy95zD+skLmroVrF3PNZ:/UQOJDodzBUBh6X5ziskLRhfN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4288 5B4A.tmp 3408 5F51.tmp 1656 600D.tmp 2368 6136.tmp 2412 625F.tmp 3872 632A.tmp 2972 63C6.tmp 3796 64C0.tmp 1460 65CA.tmp 4088 677F.tmp 4388 6935.tmp 1436 6A5D.tmp 3284 6B67.tmp 1692 6CCE.tmp 4200 6DB9.tmp 3084 6F9D.tmp 4132 70C6.tmp 1344 71C0.tmp 1172 73B4.tmp 2440 74AE.tmp 4416 75F6.tmp 3080 76D1.tmp 3844 77BB.tmp 220 78D5.tmp 1744 7A1D.tmp 4644 7B36.tmp 4560 7C7E.tmp 1324 7D88.tmp 896 7EEF.tmp 372 7FCA.tmp 4160 8095.tmp 4412 818F.tmp 1048 8354.tmp 3724 84CB.tmp 2252 85C5.tmp 3272 8681.tmp 852 86FE.tmp 2996 87B9.tmp 3836 8875.tmp 4068 88F2.tmp 3540 8AB7.tmp 4796 8B34.tmp 4896 8BC0.tmp 4064 8E02.tmp 4908 8E8F.tmp 908 8F3B.tmp 964 91EA.tmp 4312 9267.tmp 928 941D.tmp 4244 9536.tmp 4232 95C3.tmp 4784 965F.tmp 2124 96DC.tmp 3400 97D6.tmp 3496 9872.tmp 4028 991E.tmp 4324 99DA.tmp 2276 9A86.tmp 1680 9C89.tmp 3408 9D25.tmp 3384 9DE1.tmp 2952 9E4E.tmp 656 9EDB.tmp 3520 A052.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4288 2516 NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe 84 PID 2516 wrote to memory of 4288 2516 NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe 84 PID 2516 wrote to memory of 4288 2516 NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe 84 PID 4288 wrote to memory of 3408 4288 5B4A.tmp 85 PID 4288 wrote to memory of 3408 4288 5B4A.tmp 85 PID 4288 wrote to memory of 3408 4288 5B4A.tmp 85 PID 3408 wrote to memory of 1656 3408 5F51.tmp 86 PID 3408 wrote to memory of 1656 3408 5F51.tmp 86 PID 3408 wrote to memory of 1656 3408 5F51.tmp 86 PID 1656 wrote to memory of 2368 1656 600D.tmp 87 PID 1656 wrote to memory of 2368 1656 600D.tmp 87 PID 1656 wrote to memory of 2368 1656 600D.tmp 87 PID 2368 wrote to memory of 2412 2368 6136.tmp 88 PID 2368 wrote to memory of 2412 2368 6136.tmp 88 PID 2368 wrote to memory of 2412 2368 6136.tmp 88 PID 2412 wrote to memory of 3872 2412 625F.tmp 89 PID 2412 wrote to memory of 3872 2412 625F.tmp 89 PID 2412 wrote to memory of 3872 2412 625F.tmp 89 PID 3872 wrote to memory of 2972 3872 632A.tmp 90 PID 3872 wrote to memory of 2972 3872 632A.tmp 90 PID 3872 wrote to memory of 2972 3872 632A.tmp 90 PID 2972 wrote to memory of 3796 2972 63C6.tmp 91 PID 2972 wrote to memory of 3796 2972 63C6.tmp 91 PID 2972 wrote to memory of 3796 2972 63C6.tmp 91 PID 3796 wrote to memory of 1460 3796 64C0.tmp 92 PID 3796 wrote to memory of 1460 3796 64C0.tmp 92 PID 3796 wrote to memory of 1460 3796 64C0.tmp 92 PID 1460 wrote to memory of 4088 1460 65CA.tmp 93 PID 1460 wrote to memory of 4088 1460 65CA.tmp 93 PID 1460 wrote to memory of 4088 1460 65CA.tmp 93 PID 4088 wrote to memory of 4388 4088 677F.tmp 94 PID 4088 wrote to memory of 4388 4088 677F.tmp 94 PID 4088 wrote to memory of 4388 4088 677F.tmp 94 PID 4388 wrote to memory of 1436 4388 6935.tmp 95 PID 4388 wrote to memory of 1436 4388 6935.tmp 95 PID 4388 wrote to memory of 1436 4388 6935.tmp 95 PID 1436 wrote to memory of 3284 1436 6A5D.tmp 96 PID 1436 wrote to memory of 3284 1436 6A5D.tmp 96 PID 1436 wrote to memory of 3284 1436 6A5D.tmp 96 PID 3284 wrote to memory of 1692 3284 6B67.tmp 97 PID 3284 wrote to memory of 1692 3284 6B67.tmp 97 PID 3284 wrote to memory of 1692 3284 6B67.tmp 97 PID 1692 wrote to memory of 4200 1692 6CCE.tmp 98 PID 1692 wrote to memory of 4200 1692 6CCE.tmp 98 PID 1692 wrote to memory of 4200 1692 6CCE.tmp 98 PID 4200 wrote to memory of 3084 4200 6DB9.tmp 99 PID 4200 wrote to memory of 3084 4200 6DB9.tmp 99 PID 4200 wrote to memory of 3084 4200 6DB9.tmp 99 PID 3084 wrote to memory of 4132 3084 6F9D.tmp 100 PID 3084 wrote to memory of 4132 3084 6F9D.tmp 100 PID 3084 wrote to memory of 4132 3084 6F9D.tmp 100 PID 4132 wrote to memory of 1344 4132 70C6.tmp 101 PID 4132 wrote to memory of 1344 4132 70C6.tmp 101 PID 4132 wrote to memory of 1344 4132 70C6.tmp 101 PID 1344 wrote to memory of 1172 1344 71C0.tmp 102 PID 1344 wrote to memory of 1172 1344 71C0.tmp 102 PID 1344 wrote to memory of 1172 1344 71C0.tmp 102 PID 1172 wrote to memory of 2440 1172 73B4.tmp 103 PID 1172 wrote to memory of 2440 1172 73B4.tmp 103 PID 1172 wrote to memory of 2440 1172 73B4.tmp 103 PID 2440 wrote to memory of 4416 2440 74AE.tmp 104 PID 2440 wrote to memory of 4416 2440 74AE.tmp 104 PID 2440 wrote to memory of 4416 2440 74AE.tmp 104 PID 4416 wrote to memory of 3080 4416 75F6.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_60068c630aca3c8341d7feed69248c8a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\600D.tmp"C:\Users\Admin\AppData\Local\Temp\600D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\625F.tmp"C:\Users\Admin\AppData\Local\Temp\625F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\632A.tmp"C:\Users\Admin\AppData\Local\Temp\632A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\63C6.tmp"C:\Users\Admin\AppData\Local\Temp\63C6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\65CA.tmp"C:\Users\Admin\AppData\Local\Temp\65CA.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\677F.tmp"C:\Users\Admin\AppData\Local\Temp\677F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\6B67.tmp"C:\Users\Admin\AppData\Local\Temp\6B67.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\6DB9.tmp"C:\Users\Admin\AppData\Local\Temp\6DB9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\70C6.tmp"C:\Users\Admin\AppData\Local\Temp\70C6.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\73B4.tmp"C:\Users\Admin\AppData\Local\Temp\73B4.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\74AE.tmp"C:\Users\Admin\AppData\Local\Temp\74AE.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\75F6.tmp"C:\Users\Admin\AppData\Local\Temp\75F6.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\76D1.tmp"C:\Users\Admin\AppData\Local\Temp\76D1.tmp"23⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\77BB.tmp"C:\Users\Admin\AppData\Local\Temp\77BB.tmp"24⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\78D5.tmp"C:\Users\Admin\AppData\Local\Temp\78D5.tmp"25⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"26⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\7B36.tmp"C:\Users\Admin\AppData\Local\Temp\7B36.tmp"27⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\7C7E.tmp"C:\Users\Admin\AppData\Local\Temp\7C7E.tmp"28⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"29⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\7EEF.tmp"C:\Users\Admin\AppData\Local\Temp\7EEF.tmp"30⤵
- Executes dropped EXE
PID:896 -
C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"C:\Users\Admin\AppData\Local\Temp\7FCA.tmp"31⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\8095.tmp"C:\Users\Admin\AppData\Local\Temp\8095.tmp"32⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\818F.tmp"C:\Users\Admin\AppData\Local\Temp\818F.tmp"33⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\8354.tmp"C:\Users\Admin\AppData\Local\Temp\8354.tmp"34⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\84CB.tmp"C:\Users\Admin\AppData\Local\Temp\84CB.tmp"35⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\85C5.tmp"C:\Users\Admin\AppData\Local\Temp\85C5.tmp"36⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\8681.tmp"C:\Users\Admin\AppData\Local\Temp\8681.tmp"37⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\86FE.tmp"C:\Users\Admin\AppData\Local\Temp\86FE.tmp"38⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\87B9.tmp"C:\Users\Admin\AppData\Local\Temp\87B9.tmp"39⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\8875.tmp"C:\Users\Admin\AppData\Local\Temp\8875.tmp"40⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\88F2.tmp"C:\Users\Admin\AppData\Local\Temp\88F2.tmp"41⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\8AB7.tmp"C:\Users\Admin\AppData\Local\Temp\8AB7.tmp"42⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\8B34.tmp"C:\Users\Admin\AppData\Local\Temp\8B34.tmp"43⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\8BC0.tmp"C:\Users\Admin\AppData\Local\Temp\8BC0.tmp"44⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\8E02.tmp"C:\Users\Admin\AppData\Local\Temp\8E02.tmp"45⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"46⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\8F3B.tmp"C:\Users\Admin\AppData\Local\Temp\8F3B.tmp"47⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\91EA.tmp"C:\Users\Admin\AppData\Local\Temp\91EA.tmp"48⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\9267.tmp"C:\Users\Admin\AppData\Local\Temp\9267.tmp"49⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\941D.tmp"C:\Users\Admin\AppData\Local\Temp\941D.tmp"50⤵
- Executes dropped EXE
PID:928 -
C:\Users\Admin\AppData\Local\Temp\9536.tmp"C:\Users\Admin\AppData\Local\Temp\9536.tmp"51⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\95C3.tmp"C:\Users\Admin\AppData\Local\Temp\95C3.tmp"52⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\965F.tmp"C:\Users\Admin\AppData\Local\Temp\965F.tmp"53⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\96DC.tmp"C:\Users\Admin\AppData\Local\Temp\96DC.tmp"54⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\97D6.tmp"C:\Users\Admin\AppData\Local\Temp\97D6.tmp"55⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\9872.tmp"C:\Users\Admin\AppData\Local\Temp\9872.tmp"56⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\991E.tmp"C:\Users\Admin\AppData\Local\Temp\991E.tmp"57⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\99DA.tmp"C:\Users\Admin\AppData\Local\Temp\99DA.tmp"58⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\9A86.tmp"C:\Users\Admin\AppData\Local\Temp\9A86.tmp"59⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\9C89.tmp"C:\Users\Admin\AppData\Local\Temp\9C89.tmp"60⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\9D25.tmp"C:\Users\Admin\AppData\Local\Temp\9D25.tmp"61⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\9DE1.tmp"C:\Users\Admin\AppData\Local\Temp\9DE1.tmp"62⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\9E4E.tmp"C:\Users\Admin\AppData\Local\Temp\9E4E.tmp"63⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\9EDB.tmp"C:\Users\Admin\AppData\Local\Temp\9EDB.tmp"64⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\A052.tmp"C:\Users\Admin\AppData\Local\Temp\A052.tmp"65⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\A11D.tmp"C:\Users\Admin\AppData\Local\Temp\A11D.tmp"66⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\A1AA.tmp"C:\Users\Admin\AppData\Local\Temp\A1AA.tmp"67⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\A236.tmp"C:\Users\Admin\AppData\Local\Temp\A236.tmp"68⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\A301.tmp"C:\Users\Admin\AppData\Local\Temp\A301.tmp"69⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\A3DC.tmp"C:\Users\Admin\AppData\Local\Temp\A3DC.tmp"70⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\A534.tmp"C:\Users\Admin\AppData\Local\Temp\A534.tmp"71⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\A5D0.tmp"C:\Users\Admin\AppData\Local\Temp\A5D0.tmp"72⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\A66C.tmp"C:\Users\Admin\AppData\Local\Temp\A66C.tmp"73⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\A718.tmp"C:\Users\Admin\AppData\Local\Temp\A718.tmp"74⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\A7A5.tmp"C:\Users\Admin\AppData\Local\Temp\A7A5.tmp"75⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\A822.tmp"C:\Users\Admin\AppData\Local\Temp\A822.tmp"76⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\A8ED.tmp"C:\Users\Admin\AppData\Local\Temp\A8ED.tmp"77⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\A97A.tmp"C:\Users\Admin\AppData\Local\Temp\A97A.tmp"78⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\AA45.tmp"C:\Users\Admin\AppData\Local\Temp\AA45.tmp"79⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\AAC2.tmp"C:\Users\Admin\AppData\Local\Temp\AAC2.tmp"80⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\AB3F.tmp"C:\Users\Admin\AppData\Local\Temp\AB3F.tmp"81⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\AC29.tmp"C:\Users\Admin\AppData\Local\Temp\AC29.tmp"82⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\ACB6.tmp"C:\Users\Admin\AppData\Local\Temp\ACB6.tmp"83⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\ADB0.tmp"C:\Users\Admin\AppData\Local\Temp\ADB0.tmp"84⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\AE4C.tmp"C:\Users\Admin\AppData\Local\Temp\AE4C.tmp"85⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\AEC9.tmp"C:\Users\Admin\AppData\Local\Temp\AEC9.tmp"86⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\AF75.tmp"C:\Users\Admin\AppData\Local\Temp\AF75.tmp"87⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\B021.tmp"C:\Users\Admin\AppData\Local\Temp\B021.tmp"88⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"89⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\B169.tmp"C:\Users\Admin\AppData\Local\Temp\B169.tmp"90⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\B205.tmp"C:\Users\Admin\AppData\Local\Temp\B205.tmp"91⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"92⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\B39B.tmp"C:\Users\Admin\AppData\Local\Temp\B39B.tmp"93⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\B447.tmp"C:\Users\Admin\AppData\Local\Temp\B447.tmp"94⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\B5ED.tmp"C:\Users\Admin\AppData\Local\Temp\B5ED.tmp"95⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\B67A.tmp"C:\Users\Admin\AppData\Local\Temp\B67A.tmp"96⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\B716.tmp"C:\Users\Admin\AppData\Local\Temp\B716.tmp"97⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\B783.tmp"C:\Users\Admin\AppData\Local\Temp\B783.tmp"98⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\B9B6.tmp"C:\Users\Admin\AppData\Local\Temp\B9B6.tmp"99⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\BA43.tmp"C:\Users\Admin\AppData\Local\Temp\BA43.tmp"100⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"101⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\BC46.tmp"C:\Users\Admin\AppData\Local\Temp\BC46.tmp"102⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"103⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\BD7F.tmp"C:\Users\Admin\AppData\Local\Temp\BD7F.tmp"104⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\BE98.tmp"C:\Users\Admin\AppData\Local\Temp\BE98.tmp"105⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\BF34.tmp"C:\Users\Admin\AppData\Local\Temp\BF34.tmp"106⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\C04D.tmp"C:\Users\Admin\AppData\Local\Temp\C04D.tmp"107⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\C176.tmp"C:\Users\Admin\AppData\Local\Temp\C176.tmp"108⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\C203.tmp"C:\Users\Admin\AppData\Local\Temp\C203.tmp"109⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\C29F.tmp"C:\Users\Admin\AppData\Local\Temp\C29F.tmp"110⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\C32C.tmp"C:\Users\Admin\AppData\Local\Temp\C32C.tmp"111⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\C484.tmp"C:\Users\Admin\AppData\Local\Temp\C484.tmp"112⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\C54F.tmp"C:\Users\Admin\AppData\Local\Temp\C54F.tmp"113⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\C733.tmp"C:\Users\Admin\AppData\Local\Temp\C733.tmp"114⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\C7DF.tmp"C:\Users\Admin\AppData\Local\Temp\C7DF.tmp"115⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\C86C.tmp"C:\Users\Admin\AppData\Local\Temp\C86C.tmp"116⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\C917.tmp"C:\Users\Admin\AppData\Local\Temp\C917.tmp"117⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\CA02.tmp"C:\Users\Admin\AppData\Local\Temp\CA02.tmp"118⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\CBB7.tmp"C:\Users\Admin\AppData\Local\Temp\CBB7.tmp"119⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\CC44.tmp"C:\Users\Admin\AppData\Local\Temp\CC44.tmp"120⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\CCE0.tmp"C:\Users\Admin\AppData\Local\Temp\CCE0.tmp"121⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\CD8C.tmp"C:\Users\Admin\AppData\Local\Temp\CD8C.tmp"122⤵PID:5096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-