Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 23:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe
Resource
win7-20231023-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe
-
Size
520KB
-
MD5
60a8b0e54ed265a8498b627a266b94b4
-
SHA1
13c375c4f8c77a112d9c3de5f2932c43f7674afe
-
SHA256
244400344ea06afac815f184412c51be26fc9323c823cc1f22755dabd534176f
-
SHA512
509b71f429a7505198996cf3dc285825eb5ab2af563756633276a61b86048e66ea9aea9a730f91fa01037aa060f48ac779d9fe35b0fea0e42f1e8d5411ebc4fd
-
SSDEEP
12288:xVBxW3Xdhml5A3ttw/hA5ZCrGkkGiFR5OlxhNZ:xVq3Wl5ww/hWxkeFDOlxhN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4548 F359.tmp 2568 F472.tmp 2240 FDD8.tmp 4272 FE94.tmp 2112 1A.tmp 4040 153.tmp 4400 24D.tmp 3860 318.tmp 5108 47F.tmp 3472 51C.tmp 1796 5E7.tmp 4504 6C1.tmp 4856 79C.tmp 1508 8C5.tmp 1080 961.tmp 676 A7B.tmp 1320 B17.tmp 2308 BE2.tmp 4812 C7E.tmp 3372 D0B.tmp 2032 E14.tmp 4172 EC0.tmp 2808 F7C.tmp 232 1057.tmp 3388 10E3.tmp 2856 11AE.tmp 1116 1299.tmp 2052 1383.tmp 4480 143F.tmp 436 1529.tmp 2228 1604.tmp 548 171D.tmp 1676 17B9.tmp 2272 18A4.tmp 1068 1921.tmp 5084 199E.tmp 408 1A2A.tmp 1920 1A98.tmp 4576 1B05.tmp 1656 1BC0.tmp 3528 1C3D.tmp 2732 1CCA.tmp 3588 1D47.tmp 3336 1E22.tmp 1244 1ECE.tmp 1620 1F5A.tmp 2456 1FE7.tmp 3472 20B2.tmp 4004 216E.tmp 1464 220A.tmp 1276 22B6.tmp 4856 2352.tmp 952 240D.tmp 2396 248A.tmp 4932 2507.tmp 4500 25A4.tmp 4916 2630.tmp 2908 26EC.tmp 1632 2798.tmp 1516 2824.tmp 2032 28C1.tmp 3592 294D.tmp 228 2A09.tmp 3920 2AA5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4548 3412 NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe 88 PID 3412 wrote to memory of 4548 3412 NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe 88 PID 3412 wrote to memory of 4548 3412 NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe 88 PID 4548 wrote to memory of 2568 4548 F359.tmp 90 PID 4548 wrote to memory of 2568 4548 F359.tmp 90 PID 4548 wrote to memory of 2568 4548 F359.tmp 90 PID 2568 wrote to memory of 2240 2568 F472.tmp 91 PID 2568 wrote to memory of 2240 2568 F472.tmp 91 PID 2568 wrote to memory of 2240 2568 F472.tmp 91 PID 2240 wrote to memory of 4272 2240 FDD8.tmp 93 PID 2240 wrote to memory of 4272 2240 FDD8.tmp 93 PID 2240 wrote to memory of 4272 2240 FDD8.tmp 93 PID 4272 wrote to memory of 2112 4272 FE94.tmp 94 PID 4272 wrote to memory of 2112 4272 FE94.tmp 94 PID 4272 wrote to memory of 2112 4272 FE94.tmp 94 PID 2112 wrote to memory of 4040 2112 1A.tmp 96 PID 2112 wrote to memory of 4040 2112 1A.tmp 96 PID 2112 wrote to memory of 4040 2112 1A.tmp 96 PID 4040 wrote to memory of 4400 4040 153.tmp 97 PID 4040 wrote to memory of 4400 4040 153.tmp 97 PID 4040 wrote to memory of 4400 4040 153.tmp 97 PID 4400 wrote to memory of 3860 4400 24D.tmp 98 PID 4400 wrote to memory of 3860 4400 24D.tmp 98 PID 4400 wrote to memory of 3860 4400 24D.tmp 98 PID 3860 wrote to memory of 5108 3860 318.tmp 99 PID 3860 wrote to memory of 5108 3860 318.tmp 99 PID 3860 wrote to memory of 5108 3860 318.tmp 99 PID 5108 wrote to memory of 3472 5108 47F.tmp 100 PID 5108 wrote to memory of 3472 5108 47F.tmp 100 PID 5108 wrote to memory of 3472 5108 47F.tmp 100 PID 3472 wrote to memory of 1796 3472 51C.tmp 101 PID 3472 wrote to memory of 1796 3472 51C.tmp 101 PID 3472 wrote to memory of 1796 3472 51C.tmp 101 PID 1796 wrote to memory of 4504 1796 5E7.tmp 102 PID 1796 wrote to memory of 4504 1796 5E7.tmp 102 PID 1796 wrote to memory of 4504 1796 5E7.tmp 102 PID 4504 wrote to memory of 4856 4504 6C1.tmp 103 PID 4504 wrote to memory of 4856 4504 6C1.tmp 103 PID 4504 wrote to memory of 4856 4504 6C1.tmp 103 PID 4856 wrote to memory of 1508 4856 79C.tmp 104 PID 4856 wrote to memory of 1508 4856 79C.tmp 104 PID 4856 wrote to memory of 1508 4856 79C.tmp 104 PID 1508 wrote to memory of 1080 1508 8C5.tmp 105 PID 1508 wrote to memory of 1080 1508 8C5.tmp 105 PID 1508 wrote to memory of 1080 1508 8C5.tmp 105 PID 1080 wrote to memory of 676 1080 961.tmp 106 PID 1080 wrote to memory of 676 1080 961.tmp 106 PID 1080 wrote to memory of 676 1080 961.tmp 106 PID 676 wrote to memory of 1320 676 A7B.tmp 107 PID 676 wrote to memory of 1320 676 A7B.tmp 107 PID 676 wrote to memory of 1320 676 A7B.tmp 107 PID 1320 wrote to memory of 2308 1320 B17.tmp 108 PID 1320 wrote to memory of 2308 1320 B17.tmp 108 PID 1320 wrote to memory of 2308 1320 B17.tmp 108 PID 2308 wrote to memory of 4812 2308 BE2.tmp 109 PID 2308 wrote to memory of 4812 2308 BE2.tmp 109 PID 2308 wrote to memory of 4812 2308 BE2.tmp 109 PID 4812 wrote to memory of 3372 4812 C7E.tmp 110 PID 4812 wrote to memory of 3372 4812 C7E.tmp 110 PID 4812 wrote to memory of 3372 4812 C7E.tmp 110 PID 3372 wrote to memory of 2032 3372 D0B.tmp 111 PID 3372 wrote to memory of 2032 3372 D0B.tmp 111 PID 3372 wrote to memory of 2032 3372 D0B.tmp 111 PID 2032 wrote to memory of 4172 2032 E14.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_60a8b0e54ed265a8498b627a266b94b4_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\F359.tmp"C:\Users\Admin\AppData\Local\Temp\F359.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\153.tmp"C:\Users\Admin\AppData\Local\Temp\153.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\24D.tmp"C:\Users\Admin\AppData\Local\Temp\24D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\318.tmp"C:\Users\Admin\AppData\Local\Temp\318.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\5E7.tmp"C:\Users\Admin\AppData\Local\Temp\5E7.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\6C1.tmp"C:\Users\Admin\AppData\Local\Temp\6C1.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\79C.tmp"C:\Users\Admin\AppData\Local\Temp\79C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\8C5.tmp"C:\Users\Admin\AppData\Local\Temp\8C5.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\B17.tmp"C:\Users\Admin\AppData\Local\Temp\B17.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\BE2.tmp"C:\Users\Admin\AppData\Local\Temp\BE2.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"23⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"24⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"25⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\10E3.tmp"C:\Users\Admin\AppData\Local\Temp\10E3.tmp"26⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"27⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\1299.tmp"C:\Users\Admin\AppData\Local\Temp\1299.tmp"28⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\1383.tmp"C:\Users\Admin\AppData\Local\Temp\1383.tmp"29⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\143F.tmp"C:\Users\Admin\AppData\Local\Temp\143F.tmp"30⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\1529.tmp"C:\Users\Admin\AppData\Local\Temp\1529.tmp"31⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"32⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"33⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"34⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"35⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\1921.tmp"C:\Users\Admin\AppData\Local\Temp\1921.tmp"36⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\199E.tmp"C:\Users\Admin\AppData\Local\Temp\199E.tmp"37⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"38⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"39⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"40⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"41⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"42⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"C:\Users\Admin\AppData\Local\Temp\1CCA.tmp"43⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"44⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\1E22.tmp"C:\Users\Admin\AppData\Local\Temp\1E22.tmp"45⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"46⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"47⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"48⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\20B2.tmp"C:\Users\Admin\AppData\Local\Temp\20B2.tmp"49⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"50⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"51⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\22B6.tmp"C:\Users\Admin\AppData\Local\Temp\22B6.tmp"52⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\2352.tmp"C:\Users\Admin\AppData\Local\Temp\2352.tmp"53⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"54⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\248A.tmp"C:\Users\Admin\AppData\Local\Temp\248A.tmp"55⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"56⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\25A4.tmp"C:\Users\Admin\AppData\Local\Temp\25A4.tmp"57⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\2630.tmp"C:\Users\Admin\AppData\Local\Temp\2630.tmp"58⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\26EC.tmp"C:\Users\Admin\AppData\Local\Temp\26EC.tmp"59⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\2798.tmp"C:\Users\Admin\AppData\Local\Temp\2798.tmp"60⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"61⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"62⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"63⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\2A09.tmp"C:\Users\Admin\AppData\Local\Temp\2A09.tmp"64⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"65⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"66⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"67⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"68⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2CC8.tmp"C:\Users\Admin\AppData\Local\Temp\2CC8.tmp"69⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\2D93.tmp"C:\Users\Admin\AppData\Local\Temp\2D93.tmp"70⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"71⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"72⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"73⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"74⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\310E.tmp"C:\Users\Admin\AppData\Local\Temp\310E.tmp"75⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"76⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"77⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"78⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"79⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"80⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"81⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"82⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\35B1.tmp"C:\Users\Admin\AppData\Local\Temp\35B1.tmp"83⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\363E.tmp"C:\Users\Admin\AppData\Local\Temp\363E.tmp"84⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"85⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"86⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"87⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\388F.tmp"C:\Users\Admin\AppData\Local\Temp\388F.tmp"88⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"89⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"90⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\3A93.tmp"C:\Users\Admin\AppData\Local\Temp\3A93.tmp"91⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"92⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"93⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"94⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"C:\Users\Admin\AppData\Local\Temp\3CC6.tmp"95⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"96⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"97⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"98⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\3F56.tmp"C:\Users\Admin\AppData\Local\Temp\3F56.tmp"99⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"100⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\406F.tmp"C:\Users\Admin\AppData\Local\Temp\406F.tmp"101⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\413A.tmp"C:\Users\Admin\AppData\Local\Temp\413A.tmp"102⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"103⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"104⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"105⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"106⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"107⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"108⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"109⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"110⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"111⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\464B.tmp"C:\Users\Admin\AppData\Local\Temp\464B.tmp"112⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\46B8.tmp"C:\Users\Admin\AppData\Local\Temp\46B8.tmp"113⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\4755.tmp"C:\Users\Admin\AppData\Local\Temp\4755.tmp"114⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"115⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\488D.tmp"C:\Users\Admin\AppData\Local\Temp\488D.tmp"116⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\491A.tmp"C:\Users\Admin\AppData\Local\Temp\491A.tmp"117⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"118⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\4A33.tmp"C:\Users\Admin\AppData\Local\Temp\4A33.tmp"119⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"120⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"121⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"122⤵PID:1576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-