Analysis
-
max time kernel
159s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 23:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe
Resource
win7-20231023-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe
-
Size
486KB
-
MD5
9e80fd5bd304efe7a2fccde724b632f5
-
SHA1
c7a9e9bd6c06168eb980ba2b92438cf12db9813c
-
SHA256
b1708504b60aaf0400eb56376689d33678bb3b0f02c9f936b3dfbf61fca42d21
-
SHA512
4f0223f5a88c929fc6259871b89a5d3bb5fcb4ef462fcf3b8bc814337d5f27a19d8af161dd68c15a2af825b52525a690e9ba74008553417b91e880bb0025a228
-
SSDEEP
12288:/U5rCOTeiD9XxadVpFflNwtgeqQZ/jgJM6duuaP8QNZ:/UQOJDBAVpFvdeqo/jgJvk38QN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2100 5D3E.tmp 1188 5FEE.tmp 2460 6107.tmp 4056 623F.tmp 3576 63E5.tmp 116 65AA.tmp 4628 6666.tmp 1952 6741.tmp 228 680C.tmp 2536 68D7.tmp 2060 6ACB.tmp 4692 6CA0.tmp 3552 6E45.tmp 4840 6F4F.tmp 3436 7039.tmp 4776 7191.tmp 4468 727C.tmp 2068 7376.tmp 5068 7470.tmp 1472 754A.tmp 4392 76D1.tmp 3760 779C.tmp 3548 79BF.tmp 3600 7A7A.tmp 4428 7B84.tmp 4828 7C5F.tmp 2596 7DD6.tmp 684 7FE9.tmp 1700 8085.tmp 4180 81ED.tmp 4992 82C7.tmp 4824 8373.tmp 2728 843E.tmp 3216 84CB.tmp 2904 8596.tmp 4880 8671.tmp 2344 86EE.tmp 3908 87B9.tmp 1728 8826.tmp 4004 88C3.tmp 4864 894F.tmp 4008 8A3A.tmp 1616 8B24.tmp 776 8BB1.tmp 1924 8C2E.tmp 1952 8D18.tmp 1932 8D95.tmp 4760 8E22.tmp 3876 8E8F.tmp 5000 8F5A.tmp 2832 8FC8.tmp 4680 9083.tmp 2280 9110.tmp 1244 91BC.tmp 3552 9277.tmp 3892 9313.tmp 1424 93A0.tmp 1948 941D.tmp 5008 949A.tmp 4368 95B3.tmp 1508 968E.tmp 2936 970B.tmp 2928 9798.tmp 1884 9834.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2100 2904 NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe 91 PID 2904 wrote to memory of 2100 2904 NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe 91 PID 2904 wrote to memory of 2100 2904 NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe 91 PID 2100 wrote to memory of 1188 2100 5D3E.tmp 92 PID 2100 wrote to memory of 1188 2100 5D3E.tmp 92 PID 2100 wrote to memory of 1188 2100 5D3E.tmp 92 PID 1188 wrote to memory of 2460 1188 5FEE.tmp 93 PID 1188 wrote to memory of 2460 1188 5FEE.tmp 93 PID 1188 wrote to memory of 2460 1188 5FEE.tmp 93 PID 2460 wrote to memory of 4056 2460 6107.tmp 94 PID 2460 wrote to memory of 4056 2460 6107.tmp 94 PID 2460 wrote to memory of 4056 2460 6107.tmp 94 PID 4056 wrote to memory of 3576 4056 623F.tmp 95 PID 4056 wrote to memory of 3576 4056 623F.tmp 95 PID 4056 wrote to memory of 3576 4056 623F.tmp 95 PID 3576 wrote to memory of 116 3576 63E5.tmp 96 PID 3576 wrote to memory of 116 3576 63E5.tmp 96 PID 3576 wrote to memory of 116 3576 63E5.tmp 96 PID 116 wrote to memory of 4628 116 65AA.tmp 97 PID 116 wrote to memory of 4628 116 65AA.tmp 97 PID 116 wrote to memory of 4628 116 65AA.tmp 97 PID 4628 wrote to memory of 1952 4628 6666.tmp 98 PID 4628 wrote to memory of 1952 4628 6666.tmp 98 PID 4628 wrote to memory of 1952 4628 6666.tmp 98 PID 1952 wrote to memory of 228 1952 6741.tmp 99 PID 1952 wrote to memory of 228 1952 6741.tmp 99 PID 1952 wrote to memory of 228 1952 6741.tmp 99 PID 228 wrote to memory of 2536 228 680C.tmp 100 PID 228 wrote to memory of 2536 228 680C.tmp 100 PID 228 wrote to memory of 2536 228 680C.tmp 100 PID 2536 wrote to memory of 2060 2536 68D7.tmp 101 PID 2536 wrote to memory of 2060 2536 68D7.tmp 101 PID 2536 wrote to memory of 2060 2536 68D7.tmp 101 PID 2060 wrote to memory of 4692 2060 6ACB.tmp 102 PID 2060 wrote to memory of 4692 2060 6ACB.tmp 102 PID 2060 wrote to memory of 4692 2060 6ACB.tmp 102 PID 4692 wrote to memory of 3552 4692 6CA0.tmp 103 PID 4692 wrote to memory of 3552 4692 6CA0.tmp 103 PID 4692 wrote to memory of 3552 4692 6CA0.tmp 103 PID 3552 wrote to memory of 4840 3552 6E45.tmp 104 PID 3552 wrote to memory of 4840 3552 6E45.tmp 104 PID 3552 wrote to memory of 4840 3552 6E45.tmp 104 PID 4840 wrote to memory of 3436 4840 6F4F.tmp 105 PID 4840 wrote to memory of 3436 4840 6F4F.tmp 105 PID 4840 wrote to memory of 3436 4840 6F4F.tmp 105 PID 3436 wrote to memory of 4776 3436 7039.tmp 106 PID 3436 wrote to memory of 4776 3436 7039.tmp 106 PID 3436 wrote to memory of 4776 3436 7039.tmp 106 PID 4776 wrote to memory of 4468 4776 7191.tmp 107 PID 4776 wrote to memory of 4468 4776 7191.tmp 107 PID 4776 wrote to memory of 4468 4776 7191.tmp 107 PID 4468 wrote to memory of 2068 4468 727C.tmp 108 PID 4468 wrote to memory of 2068 4468 727C.tmp 108 PID 4468 wrote to memory of 2068 4468 727C.tmp 108 PID 2068 wrote to memory of 5068 2068 7376.tmp 109 PID 2068 wrote to memory of 5068 2068 7376.tmp 109 PID 2068 wrote to memory of 5068 2068 7376.tmp 109 PID 5068 wrote to memory of 1472 5068 7470.tmp 110 PID 5068 wrote to memory of 1472 5068 7470.tmp 110 PID 5068 wrote to memory of 1472 5068 7470.tmp 110 PID 1472 wrote to memory of 4392 1472 754A.tmp 111 PID 1472 wrote to memory of 4392 1472 754A.tmp 111 PID 1472 wrote to memory of 4392 1472 754A.tmp 111 PID 4392 wrote to memory of 3760 4392 76D1.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_9e80fd5bd304efe7a2fccde724b632f5_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\6107.tmp"C:\Users\Admin\AppData\Local\Temp\6107.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\623F.tmp"C:\Users\Admin\AppData\Local\Temp\623F.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\63E5.tmp"C:\Users\Admin\AppData\Local\Temp\63E5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\65AA.tmp"C:\Users\Admin\AppData\Local\Temp\65AA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\6741.tmp"C:\Users\Admin\AppData\Local\Temp\6741.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\680C.tmp"C:\Users\Admin\AppData\Local\Temp\680C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\68D7.tmp"C:\Users\Admin\AppData\Local\Temp\68D7.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\6E45.tmp"C:\Users\Admin\AppData\Local\Temp\6E45.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\7039.tmp"C:\Users\Admin\AppData\Local\Temp\7039.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\7191.tmp"C:\Users\Admin\AppData\Local\Temp\7191.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\727C.tmp"C:\Users\Admin\AppData\Local\Temp\727C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\7376.tmp"C:\Users\Admin\AppData\Local\Temp\7376.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\7470.tmp"C:\Users\Admin\AppData\Local\Temp\7470.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\754A.tmp"C:\Users\Admin\AppData\Local\Temp\754A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\76D1.tmp"C:\Users\Admin\AppData\Local\Temp\76D1.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\779C.tmp"C:\Users\Admin\AppData\Local\Temp\779C.tmp"23⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\79BF.tmp"C:\Users\Admin\AppData\Local\Temp\79BF.tmp"24⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"25⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\7B84.tmp"C:\Users\Admin\AppData\Local\Temp\7B84.tmp"26⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"C:\Users\Admin\AppData\Local\Temp\7C5F.tmp"27⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"28⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"29⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\Temp\8085.tmp"C:\Users\Admin\AppData\Local\Temp\8085.tmp"30⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\81ED.tmp"C:\Users\Admin\AppData\Local\Temp\81ED.tmp"31⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\82C7.tmp"C:\Users\Admin\AppData\Local\Temp\82C7.tmp"32⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\8373.tmp"C:\Users\Admin\AppData\Local\Temp\8373.tmp"33⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\843E.tmp"C:\Users\Admin\AppData\Local\Temp\843E.tmp"34⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\84CB.tmp"C:\Users\Admin\AppData\Local\Temp\84CB.tmp"35⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\8596.tmp"C:\Users\Admin\AppData\Local\Temp\8596.tmp"36⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\8671.tmp"C:\Users\Admin\AppData\Local\Temp\8671.tmp"37⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\86EE.tmp"C:\Users\Admin\AppData\Local\Temp\86EE.tmp"38⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\87B9.tmp"C:\Users\Admin\AppData\Local\Temp\87B9.tmp"39⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\8826.tmp"C:\Users\Admin\AppData\Local\Temp\8826.tmp"40⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\88C3.tmp"C:\Users\Admin\AppData\Local\Temp\88C3.tmp"41⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\894F.tmp"C:\Users\Admin\AppData\Local\Temp\894F.tmp"42⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\8A3A.tmp"C:\Users\Admin\AppData\Local\Temp\8A3A.tmp"43⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\8B24.tmp"C:\Users\Admin\AppData\Local\Temp\8B24.tmp"44⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"45⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"46⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\8D18.tmp"C:\Users\Admin\AppData\Local\Temp\8D18.tmp"47⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\8D95.tmp"C:\Users\Admin\AppData\Local\Temp\8D95.tmp"48⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\8E22.tmp"C:\Users\Admin\AppData\Local\Temp\8E22.tmp"49⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"50⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\8F5A.tmp"C:\Users\Admin\AppData\Local\Temp\8F5A.tmp"51⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\8FC8.tmp"C:\Users\Admin\AppData\Local\Temp\8FC8.tmp"52⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\9083.tmp"C:\Users\Admin\AppData\Local\Temp\9083.tmp"53⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\9110.tmp"C:\Users\Admin\AppData\Local\Temp\9110.tmp"54⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\91BC.tmp"C:\Users\Admin\AppData\Local\Temp\91BC.tmp"55⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\9277.tmp"C:\Users\Admin\AppData\Local\Temp\9277.tmp"56⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\9313.tmp"C:\Users\Admin\AppData\Local\Temp\9313.tmp"57⤵
- Executes dropped EXE
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\93A0.tmp"C:\Users\Admin\AppData\Local\Temp\93A0.tmp"58⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\941D.tmp"C:\Users\Admin\AppData\Local\Temp\941D.tmp"59⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\949A.tmp"C:\Users\Admin\AppData\Local\Temp\949A.tmp"60⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\95B3.tmp"C:\Users\Admin\AppData\Local\Temp\95B3.tmp"61⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\968E.tmp"C:\Users\Admin\AppData\Local\Temp\968E.tmp"62⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\970B.tmp"C:\Users\Admin\AppData\Local\Temp\970B.tmp"63⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\9798.tmp"C:\Users\Admin\AppData\Local\Temp\9798.tmp"64⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\9834.tmp"C:\Users\Admin\AppData\Local\Temp\9834.tmp"65⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\995D.tmp"C:\Users\Admin\AppData\Local\Temp\995D.tmp"66⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\9A37.tmp"C:\Users\Admin\AppData\Local\Temp\9A37.tmp"67⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"68⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\9B51.tmp"C:\Users\Admin\AppData\Local\Temp\9B51.tmp"69⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"70⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\9C5A.tmp"C:\Users\Admin\AppData\Local\Temp\9C5A.tmp"71⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\9D25.tmp"C:\Users\Admin\AppData\Local\Temp\9D25.tmp"72⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\9D93.tmp"C:\Users\Admin\AppData\Local\Temp\9D93.tmp"73⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\9E2F.tmp"C:\Users\Admin\AppData\Local\Temp\9E2F.tmp"74⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\9EBC.tmp"C:\Users\Admin\AppData\Local\Temp\9EBC.tmp"75⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\9F48.tmp"C:\Users\Admin\AppData\Local\Temp\9F48.tmp"76⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\9FD5.tmp"C:\Users\Admin\AppData\Local\Temp\9FD5.tmp"77⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\A081.tmp"C:\Users\Admin\AppData\Local\Temp\A081.tmp"78⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\A10D.tmp"C:\Users\Admin\AppData\Local\Temp\A10D.tmp"79⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"C:\Users\Admin\AppData\Local\Temp\A1B9.tmp"80⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\A284.tmp"C:\Users\Admin\AppData\Local\Temp\A284.tmp"81⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\A340.tmp"C:\Users\Admin\AppData\Local\Temp\A340.tmp"82⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"C:\Users\Admin\AppData\Local\Temp\A3BD.tmp"83⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\A478.tmp"C:\Users\Admin\AppData\Local\Temp\A478.tmp"84⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\A4F5.tmp"C:\Users\Admin\AppData\Local\Temp\A4F5.tmp"85⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\A563.tmp"C:\Users\Admin\AppData\Local\Temp\A563.tmp"86⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\A60F.tmp"C:\Users\Admin\AppData\Local\Temp\A60F.tmp"87⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\A68C.tmp"C:\Users\Admin\AppData\Local\Temp\A68C.tmp"88⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\A738.tmp"C:\Users\Admin\AppData\Local\Temp\A738.tmp"89⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\A7D4.tmp"C:\Users\Admin\AppData\Local\Temp\A7D4.tmp"90⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\A88F.tmp"C:\Users\Admin\AppData\Local\Temp\A88F.tmp"91⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\A92C.tmp"C:\Users\Admin\AppData\Local\Temp\A92C.tmp"92⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\A9B8.tmp"C:\Users\Admin\AppData\Local\Temp\A9B8.tmp"93⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\AA83.tmp"C:\Users\Admin\AppData\Local\Temp\AA83.tmp"94⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\AB10.tmp"C:\Users\Admin\AppData\Local\Temp\AB10.tmp"95⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\AB7D.tmp"C:\Users\Admin\AppData\Local\Temp\AB7D.tmp"96⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\AC58.tmp"C:\Users\Admin\AppData\Local\Temp\AC58.tmp"97⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"C:\Users\Admin\AppData\Local\Temp\ACE5.tmp"98⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\AD81.tmp"C:\Users\Admin\AppData\Local\Temp\AD81.tmp"99⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\ADEE.tmp"C:\Users\Admin\AppData\Local\Temp\ADEE.tmp"100⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\AEAA.tmp"C:\Users\Admin\AppData\Local\Temp\AEAA.tmp"101⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\AF46.tmp"C:\Users\Admin\AppData\Local\Temp\AF46.tmp"102⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"C:\Users\Admin\AppData\Local\Temp\AFE2.tmp"103⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\B07F.tmp"C:\Users\Admin\AppData\Local\Temp\B07F.tmp"104⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\B10B.tmp"C:\Users\Admin\AppData\Local\Temp\B10B.tmp"105⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\B1A7.tmp"C:\Users\Admin\AppData\Local\Temp\B1A7.tmp"106⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\B234.tmp"C:\Users\Admin\AppData\Local\Temp\B234.tmp"107⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"108⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\B31E.tmp"C:\Users\Admin\AppData\Local\Temp\B31E.tmp"109⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\B3AB.tmp"C:\Users\Admin\AppData\Local\Temp\B3AB.tmp"110⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\B467.tmp"C:\Users\Admin\AppData\Local\Temp\B467.tmp"111⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\B512.tmp"C:\Users\Admin\AppData\Local\Temp\B512.tmp"112⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\B58F.tmp"C:\Users\Admin\AppData\Local\Temp\B58F.tmp"113⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\B60C.tmp"C:\Users\Admin\AppData\Local\Temp\B60C.tmp"114⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\B67A.tmp"C:\Users\Admin\AppData\Local\Temp\B67A.tmp"115⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\B735.tmp"C:\Users\Admin\AppData\Local\Temp\B735.tmp"116⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\B810.tmp"C:\Users\Admin\AppData\Local\Temp\B810.tmp"117⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\B87D.tmp"C:\Users\Admin\AppData\Local\Temp\B87D.tmp"118⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\B90A.tmp"C:\Users\Admin\AppData\Local\Temp\B90A.tmp"119⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\B997.tmp"C:\Users\Admin\AppData\Local\Temp\B997.tmp"120⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\BA52.tmp"C:\Users\Admin\AppData\Local\Temp\BA52.tmp"121⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\BADF.tmp"C:\Users\Admin\AppData\Local\Temp\BADF.tmp"122⤵PID:3168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-