Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 19:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe
Resource
win7-20231023-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe
-
Size
520KB
-
MD5
74a42a162dc8eaadf899366b49596f5f
-
SHA1
bc421f09cbf9d6843347fd9d96a09fa3820a3516
-
SHA256
3854236488fd1b639805646cf82785569c97017fc2ba6b33e3521efc3abf1a12
-
SHA512
bb3f749a21da364391f67d8690e20989ff5ae71d2aef612c180cb93e109b9aa4e1c2df19f8ecdcc5fcea2a7acef3e4fe0de6d955afa5888e74ecdba725542a04
-
SSDEEP
12288:roRXOQjmOyUuao7G9PskLL3Fryh8xz9bNZ:rogQ9yaY+P5LxFxBbN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3408 1A69.tmp 1244 1B34.tmp 3740 1C3D.tmp 1584 1D28.tmp 3080 1E03.tmp 4860 1EFD.tmp 4464 1FC8.tmp 1448 20E1.tmp 1424 219C.tmp 1432 2287.tmp 3016 2381.tmp 3828 242D.tmp 1616 2546.tmp 3148 2621.tmp 692 2892.tmp 2440 297C.tmp 1080 2EBC.tmp 3112 2F68.tmp 1160 3042.tmp 4524 312D.tmp 2868 31E8.tmp 5100 32B3.tmp 1728 33AD.tmp 4636 34C7.tmp 1720 35D0.tmp 1764 36AB.tmp 1120 3757.tmp 68 3822.tmp 1280 38DE.tmp 3088 39B8.tmp 3560 3AA3.tmp 3372 3B4F.tmp 1112 3C0A.tmp 3704 3CA6.tmp 2192 3D43.tmp 3804 3DEE.tmp 2148 3E8B.tmp 4936 3F17.tmp 4064 3FC3.tmp 900 4050.tmp 4248 40CD.tmp 3288 4169.tmp 2328 41D6.tmp 4864 4253.tmp 4180 42E0.tmp 2524 436D.tmp 4796 4419.tmp 1832 44C4.tmp 3768 4580.tmp 2920 462C.tmp 768 46B8.tmp 3920 4755.tmp 4560 47F1.tmp 3764 486E.tmp 2636 490A.tmp 2060 4987.tmp 1912 4A23.tmp 816 4AA0.tmp 4088 4B4C.tmp 4028 4BE9.tmp 1796 4C66.tmp 5072 4D11.tmp 1860 4DAE.tmp 1468 4E4A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 364 wrote to memory of 3408 364 NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe 84 PID 364 wrote to memory of 3408 364 NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe 84 PID 364 wrote to memory of 3408 364 NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe 84 PID 3408 wrote to memory of 1244 3408 1A69.tmp 85 PID 3408 wrote to memory of 1244 3408 1A69.tmp 85 PID 3408 wrote to memory of 1244 3408 1A69.tmp 85 PID 1244 wrote to memory of 3740 1244 1B34.tmp 86 PID 1244 wrote to memory of 3740 1244 1B34.tmp 86 PID 1244 wrote to memory of 3740 1244 1B34.tmp 86 PID 3740 wrote to memory of 1584 3740 1C3D.tmp 87 PID 3740 wrote to memory of 1584 3740 1C3D.tmp 87 PID 3740 wrote to memory of 1584 3740 1C3D.tmp 87 PID 1584 wrote to memory of 3080 1584 1D28.tmp 88 PID 1584 wrote to memory of 3080 1584 1D28.tmp 88 PID 1584 wrote to memory of 3080 1584 1D28.tmp 88 PID 3080 wrote to memory of 4860 3080 1E03.tmp 89 PID 3080 wrote to memory of 4860 3080 1E03.tmp 89 PID 3080 wrote to memory of 4860 3080 1E03.tmp 89 PID 4860 wrote to memory of 4464 4860 1EFD.tmp 90 PID 4860 wrote to memory of 4464 4860 1EFD.tmp 90 PID 4860 wrote to memory of 4464 4860 1EFD.tmp 90 PID 4464 wrote to memory of 1448 4464 1FC8.tmp 91 PID 4464 wrote to memory of 1448 4464 1FC8.tmp 91 PID 4464 wrote to memory of 1448 4464 1FC8.tmp 91 PID 1448 wrote to memory of 1424 1448 20E1.tmp 92 PID 1448 wrote to memory of 1424 1448 20E1.tmp 92 PID 1448 wrote to memory of 1424 1448 20E1.tmp 92 PID 1424 wrote to memory of 1432 1424 219C.tmp 93 PID 1424 wrote to memory of 1432 1424 219C.tmp 93 PID 1424 wrote to memory of 1432 1424 219C.tmp 93 PID 1432 wrote to memory of 3016 1432 2287.tmp 94 PID 1432 wrote to memory of 3016 1432 2287.tmp 94 PID 1432 wrote to memory of 3016 1432 2287.tmp 94 PID 3016 wrote to memory of 3828 3016 2381.tmp 95 PID 3016 wrote to memory of 3828 3016 2381.tmp 95 PID 3016 wrote to memory of 3828 3016 2381.tmp 95 PID 3828 wrote to memory of 1616 3828 242D.tmp 96 PID 3828 wrote to memory of 1616 3828 242D.tmp 96 PID 3828 wrote to memory of 1616 3828 242D.tmp 96 PID 1616 wrote to memory of 3148 1616 2546.tmp 97 PID 1616 wrote to memory of 3148 1616 2546.tmp 97 PID 1616 wrote to memory of 3148 1616 2546.tmp 97 PID 3148 wrote to memory of 692 3148 2621.tmp 98 PID 3148 wrote to memory of 692 3148 2621.tmp 98 PID 3148 wrote to memory of 692 3148 2621.tmp 98 PID 692 wrote to memory of 2440 692 2892.tmp 99 PID 692 wrote to memory of 2440 692 2892.tmp 99 PID 692 wrote to memory of 2440 692 2892.tmp 99 PID 2440 wrote to memory of 1080 2440 297C.tmp 100 PID 2440 wrote to memory of 1080 2440 297C.tmp 100 PID 2440 wrote to memory of 1080 2440 297C.tmp 100 PID 1080 wrote to memory of 3112 1080 2EBC.tmp 101 PID 1080 wrote to memory of 3112 1080 2EBC.tmp 101 PID 1080 wrote to memory of 3112 1080 2EBC.tmp 101 PID 3112 wrote to memory of 1160 3112 2F68.tmp 102 PID 3112 wrote to memory of 1160 3112 2F68.tmp 102 PID 3112 wrote to memory of 1160 3112 2F68.tmp 102 PID 1160 wrote to memory of 4524 1160 3042.tmp 103 PID 1160 wrote to memory of 4524 1160 3042.tmp 103 PID 1160 wrote to memory of 4524 1160 3042.tmp 103 PID 4524 wrote to memory of 2868 4524 312D.tmp 104 PID 4524 wrote to memory of 2868 4524 312D.tmp 104 PID 4524 wrote to memory of 2868 4524 312D.tmp 104 PID 2868 wrote to memory of 5100 2868 31E8.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_74a42a162dc8eaadf899366b49596f5f_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\1B34.tmp"C:\Users\Admin\AppData\Local\Temp\1B34.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\1EFD.tmp"C:\Users\Admin\AppData\Local\Temp\1EFD.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\2287.tmp"C:\Users\Admin\AppData\Local\Temp\2287.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\2546.tmp"C:\Users\Admin\AppData\Local\Temp\2546.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\297C.tmp"C:\Users\Admin\AppData\Local\Temp\297C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\2F68.tmp"C:\Users\Admin\AppData\Local\Temp\2F68.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\31E8.tmp"C:\Users\Admin\AppData\Local\Temp\31E8.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\32B3.tmp"C:\Users\Admin\AppData\Local\Temp\32B3.tmp"23⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"24⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"25⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"26⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"27⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3757.tmp"C:\Users\Admin\AppData\Local\Temp\3757.tmp"28⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3822.tmp"C:\Users\Admin\AppData\Local\Temp\3822.tmp"29⤵
- Executes dropped EXE
PID:68 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"30⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"31⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"32⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"C:\Users\Admin\AppData\Local\Temp\3B4F.tmp"33⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"34⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"35⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"36⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"37⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"38⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"39⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"40⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"41⤵
- Executes dropped EXE
PID:900 -
C:\Users\Admin\AppData\Local\Temp\40CD.tmp"C:\Users\Admin\AppData\Local\Temp\40CD.tmp"42⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"43⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\41D6.tmp"C:\Users\Admin\AppData\Local\Temp\41D6.tmp"44⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"45⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"46⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"47⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\4419.tmp"C:\Users\Admin\AppData\Local\Temp\4419.tmp"48⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\44C4.tmp"C:\Users\Admin\AppData\Local\Temp\44C4.tmp"49⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\4580.tmp"C:\Users\Admin\AppData\Local\Temp\4580.tmp"50⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"51⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\46B8.tmp"C:\Users\Admin\AppData\Local\Temp\46B8.tmp"52⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"53⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"54⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"55⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"56⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"57⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"58⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"59⤵
- Executes dropped EXE
PID:816 -
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"60⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"61⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"62⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"63⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"64⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\4E4A.tmp"C:\Users\Admin\AppData\Local\Temp\4E4A.tmp"65⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\4EB7.tmp"C:\Users\Admin\AppData\Local\Temp\4EB7.tmp"66⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\4F63.tmp"C:\Users\Admin\AppData\Local\Temp\4F63.tmp"67⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"C:\Users\Admin\AppData\Local\Temp\4FFF.tmp"68⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\50AB.tmp"C:\Users\Admin\AppData\Local\Temp\50AB.tmp"69⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"70⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"71⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\529F.tmp"C:\Users\Admin\AppData\Local\Temp\529F.tmp"72⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"73⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\53A9.tmp"C:\Users\Admin\AppData\Local\Temp\53A9.tmp"74⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"75⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\54E1.tmp"C:\Users\Admin\AppData\Local\Temp\54E1.tmp"76⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\558D.tmp"C:\Users\Admin\AppData\Local\Temp\558D.tmp"77⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\562A.tmp"C:\Users\Admin\AppData\Local\Temp\562A.tmp"78⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\56B6.tmp"C:\Users\Admin\AppData\Local\Temp\56B6.tmp"79⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"80⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\581E.tmp"C:\Users\Admin\AppData\Local\Temp\581E.tmp"81⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\58AA.tmp"C:\Users\Admin\AppData\Local\Temp\58AA.tmp"82⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"83⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\59C3.tmp"C:\Users\Admin\AppData\Local\Temp\59C3.tmp"84⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\5A50.tmp"C:\Users\Admin\AppData\Local\Temp\5A50.tmp"85⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"86⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\5B69.tmp"C:\Users\Admin\AppData\Local\Temp\5B69.tmp"87⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\5C06.tmp"C:\Users\Admin\AppData\Local\Temp\5C06.tmp"88⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\5C83.tmp"C:\Users\Admin\AppData\Local\Temp\5C83.tmp"89⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"90⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\5DAB.tmp"C:\Users\Admin\AppData\Local\Temp\5DAB.tmp"91⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"92⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"93⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"94⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"95⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\607A.tmp"C:\Users\Admin\AppData\Local\Temp\607A.tmp"96⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\60E8.tmp"C:\Users\Admin\AppData\Local\Temp\60E8.tmp"97⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\6174.tmp"C:\Users\Admin\AppData\Local\Temp\6174.tmp"98⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\61F1.tmp"C:\Users\Admin\AppData\Local\Temp\61F1.tmp"99⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\627E.tmp"C:\Users\Admin\AppData\Local\Temp\627E.tmp"100⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\632A.tmp"C:\Users\Admin\AppData\Local\Temp\632A.tmp"101⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\6397.tmp"C:\Users\Admin\AppData\Local\Temp\6397.tmp"102⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"103⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"104⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\656C.tmp"C:\Users\Admin\AppData\Local\Temp\656C.tmp"105⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\6608.tmp"C:\Users\Admin\AppData\Local\Temp\6608.tmp"106⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\66B4.tmp"C:\Users\Admin\AppData\Local\Temp\66B4.tmp"107⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\6750.tmp"C:\Users\Admin\AppData\Local\Temp\6750.tmp"108⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\67EC.tmp"C:\Users\Admin\AppData\Local\Temp\67EC.tmp"109⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\68E6.tmp"C:\Users\Admin\AppData\Local\Temp\68E6.tmp"110⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\69B2.tmp"C:\Users\Admin\AppData\Local\Temp\69B2.tmp"111⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"C:\Users\Admin\AppData\Local\Temp\6A5D.tmp"112⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"113⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\6B96.tmp"C:\Users\Admin\AppData\Local\Temp\6B96.tmp"114⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\6C71.tmp"C:\Users\Admin\AppData\Local\Temp\6C71.tmp"115⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"116⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\6E07.tmp"C:\Users\Admin\AppData\Local\Temp\6E07.tmp"117⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"118⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"119⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\7059.tmp"C:\Users\Admin\AppData\Local\Temp\7059.tmp"120⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"121⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\7191.tmp"C:\Users\Admin\AppData\Local\Temp\7191.tmp"122⤵PID:4424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-