Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 19:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe
-
Size
486KB
-
MD5
0fbaa10b2e626eb48423f9c1a7d27785
-
SHA1
ea5a4ee76a8ade9258bc7c7e9e47035bc7962ac6
-
SHA256
b5a39237cbca9f3ba53f81cadc5199ec1d54f097e40981aac11c9159c70e44d5
-
SHA512
22de92a54b9e7c899d1435191e04d7ee9ff07d4eef1910cd8e0b7df501082c1dab8004a9345c8a9bb3a51189a1bb712004c297adcf45b44750cca2a9a0912acc
-
SSDEEP
12288:UU5rCOTeiDj0krbv9OOlJetgM5oqTgg98CN6/PuZdJNZ:UUQOJDwklOO8oq0ynsPAJN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3076 CBAC.tmp 2972 CFE3.tmp 2992 D0AE.tmp 180 D15A.tmp 4516 D215.tmp 2800 D292.tmp 4412 D2FF.tmp 1520 D37C.tmp 3820 D3F9.tmp 212 D476.tmp 3840 D522.tmp 2408 D590.tmp 820 D62C.tmp 4968 D6B9.tmp 1472 D745.tmp 3008 D7C2.tmp 4828 D85E.tmp 3760 D978.tmp 4284 DA43.tmp 4788 DB0E.tmp 4868 DB8B.tmp 2912 DC27.tmp 1380 DCC3.tmp 4964 DD7F.tmp 4636 DE4A.tmp 2796 DF06.tmp 4256 DFB1.tmp 4472 E0DA.tmp 4880 E167.tmp 2416 E261.tmp 2292 E30D.tmp 5004 E3E8.tmp 4952 E484.tmp 4248 E520.tmp 2312 E59D.tmp 2320 E62A.tmp 3748 E6A7.tmp 1872 E743.tmp 1404 E7B0.tmp 2976 E84D.tmp 1420 E8F8.tmp 4124 E995.tmp 1220 EA12.tmp 2744 EA8F.tmp 1252 EB0C.tmp 1360 EBB8.tmp 3316 EC63.tmp 2820 ECF0.tmp 1700 ED6D.tmp 3028 EDFA.tmp 4812 EE86.tmp 1988 EF03.tmp 2800 EFA0.tmp 4712 F04B.tmp 5088 F0C8.tmp 4440 F145.tmp 1240 F1B3.tmp 3096 F24F.tmp 1460 F2CC.tmp 400 F359.tmp 2824 F3D6.tmp 496 F443.tmp 4888 F4D0.tmp 4960 F56C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3076 3440 NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe 87 PID 3440 wrote to memory of 3076 3440 NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe 87 PID 3440 wrote to memory of 3076 3440 NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe 87 PID 3076 wrote to memory of 2972 3076 CBAC.tmp 88 PID 3076 wrote to memory of 2972 3076 CBAC.tmp 88 PID 3076 wrote to memory of 2972 3076 CBAC.tmp 88 PID 2972 wrote to memory of 2992 2972 CFE3.tmp 90 PID 2972 wrote to memory of 2992 2972 CFE3.tmp 90 PID 2972 wrote to memory of 2992 2972 CFE3.tmp 90 PID 2992 wrote to memory of 180 2992 D0AE.tmp 91 PID 2992 wrote to memory of 180 2992 D0AE.tmp 91 PID 2992 wrote to memory of 180 2992 D0AE.tmp 91 PID 180 wrote to memory of 4516 180 D15A.tmp 92 PID 180 wrote to memory of 4516 180 D15A.tmp 92 PID 180 wrote to memory of 4516 180 D15A.tmp 92 PID 4516 wrote to memory of 2800 4516 D215.tmp 93 PID 4516 wrote to memory of 2800 4516 D215.tmp 93 PID 4516 wrote to memory of 2800 4516 D215.tmp 93 PID 2800 wrote to memory of 4412 2800 D292.tmp 94 PID 2800 wrote to memory of 4412 2800 D292.tmp 94 PID 2800 wrote to memory of 4412 2800 D292.tmp 94 PID 4412 wrote to memory of 1520 4412 D2FF.tmp 95 PID 4412 wrote to memory of 1520 4412 D2FF.tmp 95 PID 4412 wrote to memory of 1520 4412 D2FF.tmp 95 PID 1520 wrote to memory of 3820 1520 D37C.tmp 96 PID 1520 wrote to memory of 3820 1520 D37C.tmp 96 PID 1520 wrote to memory of 3820 1520 D37C.tmp 96 PID 3820 wrote to memory of 212 3820 D3F9.tmp 97 PID 3820 wrote to memory of 212 3820 D3F9.tmp 97 PID 3820 wrote to memory of 212 3820 D3F9.tmp 97 PID 212 wrote to memory of 3840 212 D476.tmp 98 PID 212 wrote to memory of 3840 212 D476.tmp 98 PID 212 wrote to memory of 3840 212 D476.tmp 98 PID 3840 wrote to memory of 2408 3840 D522.tmp 99 PID 3840 wrote to memory of 2408 3840 D522.tmp 99 PID 3840 wrote to memory of 2408 3840 D522.tmp 99 PID 2408 wrote to memory of 820 2408 D590.tmp 100 PID 2408 wrote to memory of 820 2408 D590.tmp 100 PID 2408 wrote to memory of 820 2408 D590.tmp 100 PID 820 wrote to memory of 4968 820 D62C.tmp 101 PID 820 wrote to memory of 4968 820 D62C.tmp 101 PID 820 wrote to memory of 4968 820 D62C.tmp 101 PID 4968 wrote to memory of 1472 4968 D6B9.tmp 102 PID 4968 wrote to memory of 1472 4968 D6B9.tmp 102 PID 4968 wrote to memory of 1472 4968 D6B9.tmp 102 PID 1472 wrote to memory of 3008 1472 D745.tmp 103 PID 1472 wrote to memory of 3008 1472 D745.tmp 103 PID 1472 wrote to memory of 3008 1472 D745.tmp 103 PID 3008 wrote to memory of 4828 3008 D7C2.tmp 104 PID 3008 wrote to memory of 4828 3008 D7C2.tmp 104 PID 3008 wrote to memory of 4828 3008 D7C2.tmp 104 PID 4828 wrote to memory of 3760 4828 D85E.tmp 106 PID 4828 wrote to memory of 3760 4828 D85E.tmp 106 PID 4828 wrote to memory of 3760 4828 D85E.tmp 106 PID 3760 wrote to memory of 4284 3760 D978.tmp 107 PID 3760 wrote to memory of 4284 3760 D978.tmp 107 PID 3760 wrote to memory of 4284 3760 D978.tmp 107 PID 4284 wrote to memory of 4788 4284 DA43.tmp 108 PID 4284 wrote to memory of 4788 4284 DA43.tmp 108 PID 4284 wrote to memory of 4788 4284 DA43.tmp 108 PID 4788 wrote to memory of 4868 4788 DB0E.tmp 109 PID 4788 wrote to memory of 4868 4788 DB0E.tmp 109 PID 4788 wrote to memory of 4868 4788 DB0E.tmp 109 PID 4868 wrote to memory of 2912 4868 DB8B.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_0fbaa10b2e626eb48423f9c1a7d27785_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\D15A.tmp"C:\Users\Admin\AppData\Local\Temp\D15A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\Temp\D215.tmp"C:\Users\Admin\AppData\Local\Temp\D215.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\D37C.tmp"C:\Users\Admin\AppData\Local\Temp\D37C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\D745.tmp"C:\Users\Admin\AppData\Local\Temp\D745.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\DA43.tmp"C:\Users\Admin\AppData\Local\Temp\DA43.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\DC27.tmp"C:\Users\Admin\AppData\Local\Temp\DC27.tmp"23⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"24⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"25⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"26⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\DF06.tmp"C:\Users\Admin\AppData\Local\Temp\DF06.tmp"27⤵
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"28⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"29⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"30⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\E261.tmp"C:\Users\Admin\AppData\Local\Temp\E261.tmp"31⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\E30D.tmp"C:\Users\Admin\AppData\Local\Temp\E30D.tmp"32⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"33⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\E484.tmp"C:\Users\Admin\AppData\Local\Temp\E484.tmp"34⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\E520.tmp"C:\Users\Admin\AppData\Local\Temp\E520.tmp"35⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\E59D.tmp"C:\Users\Admin\AppData\Local\Temp\E59D.tmp"36⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\E62A.tmp"C:\Users\Admin\AppData\Local\Temp\E62A.tmp"37⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"38⤵
- Executes dropped EXE
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"39⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"C:\Users\Admin\AppData\Local\Temp\E7B0.tmp"40⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\E84D.tmp"C:\Users\Admin\AppData\Local\Temp\E84D.tmp"41⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"42⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"43⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\EA12.tmp"C:\Users\Admin\AppData\Local\Temp\EA12.tmp"44⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"45⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"46⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"47⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"48⤵
- Executes dropped EXE
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"49⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"50⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"51⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"52⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\EF03.tmp"C:\Users\Admin\AppData\Local\Temp\EF03.tmp"53⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"54⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"55⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"56⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"57⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"C:\Users\Admin\AppData\Local\Temp\F1B3.tmp"58⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\F24F.tmp"C:\Users\Admin\AppData\Local\Temp\F24F.tmp"59⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"60⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\F359.tmp"C:\Users\Admin\AppData\Local\Temp\F359.tmp"61⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"62⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\F443.tmp"C:\Users\Admin\AppData\Local\Temp\F443.tmp"63⤵
- Executes dropped EXE
PID:496 -
C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"64⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"65⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"66⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"67⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"68⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\F78F.tmp"C:\Users\Admin\AppData\Local\Temp\F78F.tmp"69⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"70⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"71⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"72⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"73⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"74⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"75⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"76⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"77⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"78⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"79⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"80⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"81⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"82⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\FED2.tmp"C:\Users\Admin\AppData\Local\Temp\FED2.tmp"83⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"84⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"85⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"86⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"87⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\172.tmp"C:\Users\Admin\AppData\Local\Temp\172.tmp"88⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"89⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"90⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"91⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\3D3.tmp"C:\Users\Admin\AppData\Local\Temp\3D3.tmp"92⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\460.tmp"C:\Users\Admin\AppData\Local\Temp\460.tmp"93⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"94⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\579.tmp"C:\Users\Admin\AppData\Local\Temp\579.tmp"95⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"96⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"97⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"98⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\7DB.tmp"C:\Users\Admin\AppData\Local\Temp\7DB.tmp"99⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"100⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\904.tmp"C:\Users\Admin\AppData\Local\Temp\904.tmp"101⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"102⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"103⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\A8A.tmp"C:\Users\Admin\AppData\Local\Temp\A8A.tmp"104⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\B46.tmp"C:\Users\Admin\AppData\Local\Temp\B46.tmp"105⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"106⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"107⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"108⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"109⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\E43.tmp"C:\Users\Admin\AppData\Local\Temp\E43.tmp"110⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"111⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\F2E.tmp"C:\Users\Admin\AppData\Local\Temp\F2E.tmp"112⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\FAB.tmp"C:\Users\Admin\AppData\Local\Temp\FAB.tmp"113⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"114⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\10C4.tmp"C:\Users\Admin\AppData\Local\Temp\10C4.tmp"115⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\1151.tmp"C:\Users\Admin\AppData\Local\Temp\1151.tmp"116⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"117⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\1279.tmp"C:\Users\Admin\AppData\Local\Temp\1279.tmp"118⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\1316.tmp"C:\Users\Admin\AppData\Local\Temp\1316.tmp"119⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"120⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\143F.tmp"C:\Users\Admin\AppData\Local\Temp\143F.tmp"121⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\14CB.tmp"C:\Users\Admin\AppData\Local\Temp\14CB.tmp"122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-