Analysis
-
max time kernel
156s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 19:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe
-
Size
487KB
-
MD5
fb387e13dc4df1090eb2544c5e87f883
-
SHA1
8be8c6b2e786bc8824f4936748bfcf252afbbb5c
-
SHA256
c59e8a052eb1964e42ff7057ad8ab59f1f55a2b5ff34a185da94ba99d4656801
-
SHA512
ad8b4316a18273eb8e262db82851e7b8935fe67709f4cbbc92fc4da4b777b0a38d5ae25e5434e3baa0398fe05a38b75b523ae3b1a16ee702ec57788447331262
-
SSDEEP
12288:yU5rCOTeiN/D6PIkN+kvKMO2dVuQbLHbZ:yUQOJN+PiIKMO2dpDb
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1852 1122.tmp 3608 13A2.tmp 4872 14FA.tmp 3036 1642.tmp 3504 17B9.tmp 4588 18F2.tmp 4488 1B15.tmp 4016 1E03.tmp 4136 1FC8.tmp 4832 211F.tmp 2832 21CB.tmp 1392 22F4.tmp 408 243C.tmp 2536 2556.tmp 4836 2778.tmp 4320 2815.tmp 1656 28E0.tmp 672 299B.tmp 1776 2A76.tmp 4292 2B32.tmp 4992 2BFD.tmp 5108 2C89.tmp 3472 2E3F.tmp 2432 2F0A.tmp 4440 3023.tmp 5064 312D.tmp 1276 31F8.tmp 2176 3302.tmp 4860 33DC.tmp 2996 34E6.tmp 4472 35B1.tmp 4332 368C.tmp 4916 37A5.tmp 1632 3851.tmp 3500 38ED.tmp 368 3999.tmp 1516 3A26.tmp 1220 3B2F.tmp 2400 3BCC.tmp 1368 3C49.tmp 5080 3CF4.tmp 3520 3ED9.tmp 3376 3F75.tmp 824 4021.tmp 2856 409E.tmp 5028 4205.tmp 3540 4282.tmp 3532 42FF.tmp 848 437C.tmp 1136 44D4.tmp 1156 4561.tmp 4480 45DE.tmp 3096 468A.tmp 4528 47B2.tmp 4244 48DB.tmp 2228 4978.tmp 932 49F5.tmp 5044 4B6C.tmp 4344 4C08.tmp 2252 4CA4.tmp 3488 4D50.tmp 1828 4DFC.tmp 3988 4FFF.tmp 4892 5128.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1852 3024 NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe 83 PID 3024 wrote to memory of 1852 3024 NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe 83 PID 3024 wrote to memory of 1852 3024 NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe 83 PID 1852 wrote to memory of 3608 1852 1122.tmp 84 PID 1852 wrote to memory of 3608 1852 1122.tmp 84 PID 1852 wrote to memory of 3608 1852 1122.tmp 84 PID 3608 wrote to memory of 4872 3608 13A2.tmp 86 PID 3608 wrote to memory of 4872 3608 13A2.tmp 86 PID 3608 wrote to memory of 4872 3608 13A2.tmp 86 PID 4872 wrote to memory of 3036 4872 14FA.tmp 87 PID 4872 wrote to memory of 3036 4872 14FA.tmp 87 PID 4872 wrote to memory of 3036 4872 14FA.tmp 87 PID 3036 wrote to memory of 3504 3036 1642.tmp 88 PID 3036 wrote to memory of 3504 3036 1642.tmp 88 PID 3036 wrote to memory of 3504 3036 1642.tmp 88 PID 3504 wrote to memory of 4588 3504 17B9.tmp 89 PID 3504 wrote to memory of 4588 3504 17B9.tmp 89 PID 3504 wrote to memory of 4588 3504 17B9.tmp 89 PID 4588 wrote to memory of 4488 4588 18F2.tmp 90 PID 4588 wrote to memory of 4488 4588 18F2.tmp 90 PID 4588 wrote to memory of 4488 4588 18F2.tmp 90 PID 4488 wrote to memory of 4016 4488 1B15.tmp 91 PID 4488 wrote to memory of 4016 4488 1B15.tmp 91 PID 4488 wrote to memory of 4016 4488 1B15.tmp 91 PID 4016 wrote to memory of 4136 4016 1E03.tmp 92 PID 4016 wrote to memory of 4136 4016 1E03.tmp 92 PID 4016 wrote to memory of 4136 4016 1E03.tmp 92 PID 4136 wrote to memory of 4832 4136 1FC8.tmp 93 PID 4136 wrote to memory of 4832 4136 1FC8.tmp 93 PID 4136 wrote to memory of 4832 4136 1FC8.tmp 93 PID 4832 wrote to memory of 2832 4832 211F.tmp 94 PID 4832 wrote to memory of 2832 4832 211F.tmp 94 PID 4832 wrote to memory of 2832 4832 211F.tmp 94 PID 2832 wrote to memory of 1392 2832 21CB.tmp 95 PID 2832 wrote to memory of 1392 2832 21CB.tmp 95 PID 2832 wrote to memory of 1392 2832 21CB.tmp 95 PID 1392 wrote to memory of 408 1392 22F4.tmp 96 PID 1392 wrote to memory of 408 1392 22F4.tmp 96 PID 1392 wrote to memory of 408 1392 22F4.tmp 96 PID 408 wrote to memory of 2536 408 243C.tmp 97 PID 408 wrote to memory of 2536 408 243C.tmp 97 PID 408 wrote to memory of 2536 408 243C.tmp 97 PID 2536 wrote to memory of 4836 2536 2556.tmp 98 PID 2536 wrote to memory of 4836 2536 2556.tmp 98 PID 2536 wrote to memory of 4836 2536 2556.tmp 98 PID 4836 wrote to memory of 4320 4836 2778.tmp 99 PID 4836 wrote to memory of 4320 4836 2778.tmp 99 PID 4836 wrote to memory of 4320 4836 2778.tmp 99 PID 4320 wrote to memory of 1656 4320 2815.tmp 100 PID 4320 wrote to memory of 1656 4320 2815.tmp 100 PID 4320 wrote to memory of 1656 4320 2815.tmp 100 PID 1656 wrote to memory of 672 1656 28E0.tmp 101 PID 1656 wrote to memory of 672 1656 28E0.tmp 101 PID 1656 wrote to memory of 672 1656 28E0.tmp 101 PID 672 wrote to memory of 1776 672 299B.tmp 102 PID 672 wrote to memory of 1776 672 299B.tmp 102 PID 672 wrote to memory of 1776 672 299B.tmp 102 PID 1776 wrote to memory of 4292 1776 2A76.tmp 103 PID 1776 wrote to memory of 4292 1776 2A76.tmp 103 PID 1776 wrote to memory of 4292 1776 2A76.tmp 103 PID 4292 wrote to memory of 4992 4292 2B32.tmp 104 PID 4292 wrote to memory of 4992 4292 2B32.tmp 104 PID 4292 wrote to memory of 4992 4292 2B32.tmp 104 PID 4992 wrote to memory of 5108 4992 2BFD.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_fb387e13dc4df1090eb2544c5e87f883_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\1642.tmp"C:\Users\Admin\AppData\Local\Temp\1642.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\211F.tmp"C:\Users\Admin\AppData\Local\Temp\211F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\21CB.tmp"C:\Users\Admin\AppData\Local\Temp\21CB.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\22F4.tmp"C:\Users\Admin\AppData\Local\Temp\22F4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\243C.tmp"C:\Users\Admin\AppData\Local\Temp\243C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\2556.tmp"C:\Users\Admin\AppData\Local\Temp\2556.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\2815.tmp"C:\Users\Admin\AppData\Local\Temp\2815.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\299B.tmp"C:\Users\Admin\AppData\Local\Temp\299B.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\2A76.tmp"C:\Users\Admin\AppData\Local\Temp\2A76.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\2C89.tmp"C:\Users\Admin\AppData\Local\Temp\2C89.tmp"23⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"24⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"25⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3023.tmp"C:\Users\Admin\AppData\Local\Temp\3023.tmp"26⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"27⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"28⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"29⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"30⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"31⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\35B1.tmp"C:\Users\Admin\AppData\Local\Temp\35B1.tmp"32⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"33⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\37A5.tmp"C:\Users\Admin\AppData\Local\Temp\37A5.tmp"34⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"35⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"36⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"37⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\3A26.tmp"C:\Users\Admin\AppData\Local\Temp\3A26.tmp"38⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"39⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"40⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\3C49.tmp"C:\Users\Admin\AppData\Local\Temp\3C49.tmp"41⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"42⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"43⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"44⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"45⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"46⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\4205.tmp"C:\Users\Admin\AppData\Local\Temp\4205.tmp"47⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\4282.tmp"C:\Users\Admin\AppData\Local\Temp\4282.tmp"48⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\42FF.tmp"C:\Users\Admin\AppData\Local\Temp\42FF.tmp"49⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\437C.tmp"C:\Users\Admin\AppData\Local\Temp\437C.tmp"50⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\44D4.tmp"C:\Users\Admin\AppData\Local\Temp\44D4.tmp"51⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\4561.tmp"C:\Users\Admin\AppData\Local\Temp\4561.tmp"52⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"53⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"54⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"55⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\48DB.tmp"C:\Users\Admin\AppData\Local\Temp\48DB.tmp"56⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"57⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"58⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"59⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\4C08.tmp"C:\Users\Admin\AppData\Local\Temp\4C08.tmp"60⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"61⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\4D50.tmp"C:\Users\Admin\AppData\Local\Temp\4D50.tmp"62⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"C:\Users\Admin\AppData\Local\Temp\4DFC.tmp"63⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"64⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\5128.tmp"C:\Users\Admin\AppData\Local\Temp\5128.tmp"65⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\51B5.tmp"C:\Users\Admin\AppData\Local\Temp\51B5.tmp"66⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"67⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\52AF.tmp"C:\Users\Admin\AppData\Local\Temp\52AF.tmp"68⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\5436.tmp"C:\Users\Admin\AppData\Local\Temp\5436.tmp"69⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\54B3.tmp"C:\Users\Admin\AppData\Local\Temp\54B3.tmp"70⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\555E.tmp"C:\Users\Admin\AppData\Local\Temp\555E.tmp"71⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\55FB.tmp"C:\Users\Admin\AppData\Local\Temp\55FB.tmp"72⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"73⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\580E.tmp"C:\Users\Admin\AppData\Local\Temp\580E.tmp"74⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"75⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"76⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"77⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"C:\Users\Admin\AppData\Local\Temp\5A6F.tmp"78⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"79⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\5B98.tmp"C:\Users\Admin\AppData\Local\Temp\5B98.tmp"80⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"81⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"82⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"C:\Users\Admin\AppData\Local\Temp\5D4E.tmp"83⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\5E19.tmp"C:\Users\Admin\AppData\Local\Temp\5E19.tmp"84⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"85⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\5F22.tmp"C:\Users\Admin\AppData\Local\Temp\5F22.tmp"86⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"C:\Users\Admin\AppData\Local\Temp\5FAF.tmp"87⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\601C.tmp"C:\Users\Admin\AppData\Local\Temp\601C.tmp"88⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"89⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\6165.tmp"C:\Users\Admin\AppData\Local\Temp\6165.tmp"90⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\61E2.tmp"C:\Users\Admin\AppData\Local\Temp\61E2.tmp"91⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\627E.tmp"C:\Users\Admin\AppData\Local\Temp\627E.tmp"92⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\632A.tmp"C:\Users\Admin\AppData\Local\Temp\632A.tmp"93⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\63E5.tmp"C:\Users\Admin\AppData\Local\Temp\63E5.tmp"94⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\64B0.tmp"C:\Users\Admin\AppData\Local\Temp\64B0.tmp"95⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\654D.tmp"C:\Users\Admin\AppData\Local\Temp\654D.tmp"96⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"97⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\6656.tmp"C:\Users\Admin\AppData\Local\Temp\6656.tmp"98⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\66E3.tmp"C:\Users\Admin\AppData\Local\Temp\66E3.tmp"99⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\679E.tmp"C:\Users\Admin\AppData\Local\Temp\679E.tmp"100⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\680C.tmp"C:\Users\Admin\AppData\Local\Temp\680C.tmp"101⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\6898.tmp"C:\Users\Admin\AppData\Local\Temp\6898.tmp"102⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"103⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\69A2.tmp"C:\Users\Admin\AppData\Local\Temp\69A2.tmp"104⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"105⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"106⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\6B96.tmp"C:\Users\Admin\AppData\Local\Temp\6B96.tmp"107⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\6C13.tmp"C:\Users\Admin\AppData\Local\Temp\6C13.tmp"108⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"109⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"110⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"111⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"112⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\6F01.tmp"C:\Users\Admin\AppData\Local\Temp\6F01.tmp"113⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\6F8E.tmp"C:\Users\Admin\AppData\Local\Temp\6F8E.tmp"114⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"115⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\7078.tmp"C:\Users\Admin\AppData\Local\Temp\7078.tmp"116⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\7105.tmp"C:\Users\Admin\AppData\Local\Temp\7105.tmp"117⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"118⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"119⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\7644.tmp"C:\Users\Admin\AppData\Local\Temp\7644.tmp"120⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\76D1.tmp"C:\Users\Admin\AppData\Local\Temp\76D1.tmp"121⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"122⤵PID:4032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-