Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe
-
Size
486KB
-
MD5
94fd6782b85bd1fb33c998aa3a18d5c6
-
SHA1
fe457aff26ee1a767da48a932004bcd387e0ac3b
-
SHA256
9127ddaf03fad4b5bc1845fd465a8c70aa68a9048ba165f890f37f3b993b8eb5
-
SHA512
045a54cdf16224e6bfe5673af8c1b6a475f6a4f38d96e31b03dc98b277363e32a11eb6a119fd5fe5c11f852e662ff10c86cdaaf640145e779864c84642137f8c
-
SSDEEP
12288:/U5rCOTeiDhmrYsC/T4grQVGjkbdYgeqCGNZ:/UQOJDhmrYsC/TDrQsj2dY3qCGN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4616 2A28.tmp 1272 2B41.tmp 2312 2BFD.tmp 1680 2D26.tmp 1608 2E4E.tmp 636 2F29.tmp 3140 3014.tmp 2396 30DF.tmp 3480 3A16.tmp 2344 3B00.tmp 2352 3BEB.tmp 3928 3C87.tmp 2156 3D62.tmp 4772 3E5C.tmp 2764 3F75.tmp 1816 405F.tmp 4524 411B.tmp 2992 41B7.tmp 3824 42A2.tmp 1000 434D.tmp 3680 4428.tmp 3960 4513.tmp 5096 45AF.tmp 1408 466A.tmp 5004 4726.tmp 1340 47C2.tmp 3488 485E.tmp 4800 490A.tmp 4288 49C6.tmp 2584 4A91.tmp 4956 4BD9.tmp 5084 4D11.tmp 3936 4DCD.tmp 4252 4E98.tmp 4932 4F82.tmp 2244 507C.tmp 4884 5148.tmp 1756 51B5.tmp 3780 5242.tmp 1072 52ED.tmp 4208 536A.tmp 4344 53E7.tmp 2264 5484.tmp 3004 5510.tmp 3724 55CC.tmp 3984 5649.tmp 3816 56E5.tmp 2992 5762.tmp 4456 57DF.tmp 2940 587B.tmp 872 58E9.tmp 3680 5966.tmp 3960 5A12.tmp 4804 5ACD.tmp 920 5B5A.tmp 4008 5BF6.tmp 4984 5C92.tmp 5104 5D0F.tmp 3444 5DBB.tmp 4320 5E57.tmp 4200 5F03.tmp 4800 605B.tmp 4288 60D8.tmp 4624 6165.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4616 4296 NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe 91 PID 4296 wrote to memory of 4616 4296 NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe 91 PID 4296 wrote to memory of 4616 4296 NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe 91 PID 4616 wrote to memory of 1272 4616 2A28.tmp 93 PID 4616 wrote to memory of 1272 4616 2A28.tmp 93 PID 4616 wrote to memory of 1272 4616 2A28.tmp 93 PID 1272 wrote to memory of 2312 1272 2B41.tmp 94 PID 1272 wrote to memory of 2312 1272 2B41.tmp 94 PID 1272 wrote to memory of 2312 1272 2B41.tmp 94 PID 2312 wrote to memory of 1680 2312 2BFD.tmp 95 PID 2312 wrote to memory of 1680 2312 2BFD.tmp 95 PID 2312 wrote to memory of 1680 2312 2BFD.tmp 95 PID 1680 wrote to memory of 1608 1680 2D26.tmp 96 PID 1680 wrote to memory of 1608 1680 2D26.tmp 96 PID 1680 wrote to memory of 1608 1680 2D26.tmp 96 PID 1608 wrote to memory of 636 1608 2E4E.tmp 98 PID 1608 wrote to memory of 636 1608 2E4E.tmp 98 PID 1608 wrote to memory of 636 1608 2E4E.tmp 98 PID 636 wrote to memory of 3140 636 2F29.tmp 99 PID 636 wrote to memory of 3140 636 2F29.tmp 99 PID 636 wrote to memory of 3140 636 2F29.tmp 99 PID 3140 wrote to memory of 2396 3140 3014.tmp 100 PID 3140 wrote to memory of 2396 3140 3014.tmp 100 PID 3140 wrote to memory of 2396 3140 3014.tmp 100 PID 2396 wrote to memory of 3480 2396 30DF.tmp 101 PID 2396 wrote to memory of 3480 2396 30DF.tmp 101 PID 2396 wrote to memory of 3480 2396 30DF.tmp 101 PID 3480 wrote to memory of 2344 3480 3A16.tmp 102 PID 3480 wrote to memory of 2344 3480 3A16.tmp 102 PID 3480 wrote to memory of 2344 3480 3A16.tmp 102 PID 2344 wrote to memory of 2352 2344 3B00.tmp 103 PID 2344 wrote to memory of 2352 2344 3B00.tmp 103 PID 2344 wrote to memory of 2352 2344 3B00.tmp 103 PID 2352 wrote to memory of 3928 2352 3BEB.tmp 104 PID 2352 wrote to memory of 3928 2352 3BEB.tmp 104 PID 2352 wrote to memory of 3928 2352 3BEB.tmp 104 PID 3928 wrote to memory of 2156 3928 3C87.tmp 105 PID 3928 wrote to memory of 2156 3928 3C87.tmp 105 PID 3928 wrote to memory of 2156 3928 3C87.tmp 105 PID 2156 wrote to memory of 4772 2156 3D62.tmp 106 PID 2156 wrote to memory of 4772 2156 3D62.tmp 106 PID 2156 wrote to memory of 4772 2156 3D62.tmp 106 PID 4772 wrote to memory of 2764 4772 3E5C.tmp 107 PID 4772 wrote to memory of 2764 4772 3E5C.tmp 107 PID 4772 wrote to memory of 2764 4772 3E5C.tmp 107 PID 2764 wrote to memory of 1816 2764 3F75.tmp 109 PID 2764 wrote to memory of 1816 2764 3F75.tmp 109 PID 2764 wrote to memory of 1816 2764 3F75.tmp 109 PID 1816 wrote to memory of 4524 1816 405F.tmp 110 PID 1816 wrote to memory of 4524 1816 405F.tmp 110 PID 1816 wrote to memory of 4524 1816 405F.tmp 110 PID 4524 wrote to memory of 2992 4524 411B.tmp 111 PID 4524 wrote to memory of 2992 4524 411B.tmp 111 PID 4524 wrote to memory of 2992 4524 411B.tmp 111 PID 2992 wrote to memory of 3824 2992 41B7.tmp 112 PID 2992 wrote to memory of 3824 2992 41B7.tmp 112 PID 2992 wrote to memory of 3824 2992 41B7.tmp 112 PID 3824 wrote to memory of 1000 3824 42A2.tmp 113 PID 3824 wrote to memory of 1000 3824 42A2.tmp 113 PID 3824 wrote to memory of 1000 3824 42A2.tmp 113 PID 1000 wrote to memory of 3680 1000 434D.tmp 114 PID 1000 wrote to memory of 3680 1000 434D.tmp 114 PID 1000 wrote to memory of 3680 1000 434D.tmp 114 PID 3680 wrote to memory of 3960 3680 4428.tmp 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS2023-09-04_94fd6782b85bd1fb33c998aa3a18d5c6_mafiaexe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\3014.tmp"C:\Users\Admin\AppData\Local\Temp\3014.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\3A16.tmp"C:\Users\Admin\AppData\Local\Temp\3A16.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\3C87.tmp"C:\Users\Admin\AppData\Local\Temp\3C87.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\3D62.tmp"C:\Users\Admin\AppData\Local\Temp\3D62.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"C:\Users\Admin\AppData\Local\Temp\3E5C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\4513.tmp"C:\Users\Admin\AppData\Local\Temp\4513.tmp"23⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\45AF.tmp"C:\Users\Admin\AppData\Local\Temp\45AF.tmp"24⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\466A.tmp"C:\Users\Admin\AppData\Local\Temp\466A.tmp"25⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\4726.tmp"C:\Users\Admin\AppData\Local\Temp\4726.tmp"26⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"27⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"28⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"29⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"30⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"31⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"32⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"33⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"C:\Users\Admin\AppData\Local\Temp\4DCD.tmp"34⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\4E98.tmp"C:\Users\Admin\AppData\Local\Temp\4E98.tmp"35⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"36⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"37⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\5148.tmp"C:\Users\Admin\AppData\Local\Temp\5148.tmp"38⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\51B5.tmp"C:\Users\Admin\AppData\Local\Temp\51B5.tmp"39⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"40⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\52ED.tmp"C:\Users\Admin\AppData\Local\Temp\52ED.tmp"41⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"42⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\53E7.tmp"C:\Users\Admin\AppData\Local\Temp\53E7.tmp"43⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"44⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"45⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"46⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"47⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"48⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\5762.tmp"C:\Users\Admin\AppData\Local\Temp\5762.tmp"49⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\57DF.tmp"C:\Users\Admin\AppData\Local\Temp\57DF.tmp"50⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"51⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"52⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\5966.tmp"C:\Users\Admin\AppData\Local\Temp\5966.tmp"53⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp"54⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"55⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"56⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"C:\Users\Admin\AppData\Local\Temp\5BF6.tmp"57⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"58⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"59⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"60⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\5E57.tmp"C:\Users\Admin\AppData\Local\Temp\5E57.tmp"61⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"62⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"63⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"64⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\6165.tmp"C:\Users\Admin\AppData\Local\Temp\6165.tmp"65⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\6201.tmp"C:\Users\Admin\AppData\Local\Temp\6201.tmp"66⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"67⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\6349.tmp"C:\Users\Admin\AppData\Local\Temp\6349.tmp"68⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"69⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\6491.tmp"C:\Users\Admin\AppData\Local\Temp\6491.tmp"70⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\653D.tmp"C:\Users\Admin\AppData\Local\Temp\653D.tmp"71⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"72⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\6695.tmp"C:\Users\Admin\AppData\Local\Temp\6695.tmp"73⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\6731.tmp"C:\Users\Admin\AppData\Local\Temp\6731.tmp"74⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"75⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"76⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\6A00.tmp"C:\Users\Admin\AppData\Local\Temp\6A00.tmp"77⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"78⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"79⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\6B57.tmp"C:\Users\Admin\AppData\Local\Temp\6B57.tmp"80⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"81⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"82⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"83⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\6E17.tmp"C:\Users\Admin\AppData\Local\Temp\6E17.tmp"84⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\6E84.tmp"C:\Users\Admin\AppData\Local\Temp\6E84.tmp"85⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\6F30.tmp"C:\Users\Admin\AppData\Local\Temp\6F30.tmp"86⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"87⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\7059.tmp"C:\Users\Admin\AppData\Local\Temp\7059.tmp"88⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\70E5.tmp"C:\Users\Admin\AppData\Local\Temp\70E5.tmp"89⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\7153.tmp"C:\Users\Admin\AppData\Local\Temp\7153.tmp"90⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\71D0.tmp"C:\Users\Admin\AppData\Local\Temp\71D0.tmp"91⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\729B.tmp"C:\Users\Admin\AppData\Local\Temp\729B.tmp"92⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"93⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\73B4.tmp"C:\Users\Admin\AppData\Local\Temp\73B4.tmp"94⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\7421.tmp"C:\Users\Admin\AppData\Local\Temp\7421.tmp"95⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\74AE.tmp"C:\Users\Admin\AppData\Local\Temp\74AE.tmp"96⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\7579.tmp"C:\Users\Admin\AppData\Local\Temp\7579.tmp"97⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\7635.tmp"C:\Users\Admin\AppData\Local\Temp\7635.tmp"98⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\76C1.tmp"C:\Users\Admin\AppData\Local\Temp\76C1.tmp"99⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"100⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\7829.tmp"C:\Users\Admin\AppData\Local\Temp\7829.tmp"101⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"102⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\7961.tmp"C:\Users\Admin\AppData\Local\Temp\7961.tmp"103⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\79EE.tmp"C:\Users\Admin\AppData\Local\Temp\79EE.tmp"104⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"C:\Users\Admin\AppData\Local\Temp\7A7A.tmp"105⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\7B46.tmp"C:\Users\Admin\AppData\Local\Temp\7B46.tmp"106⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"107⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"108⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\7CDC.tmp"C:\Users\Admin\AppData\Local\Temp\7CDC.tmp"109⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"110⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\7E72.tmp"C:\Users\Admin\AppData\Local\Temp\7E72.tmp"111⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\7F1E.tmp"C:\Users\Admin\AppData\Local\Temp\7F1E.tmp"112⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"113⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\8056.tmp"C:\Users\Admin\AppData\Local\Temp\8056.tmp"114⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\80D3.tmp"C:\Users\Admin\AppData\Local\Temp\80D3.tmp"115⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\818F.tmp"C:\Users\Admin\AppData\Local\Temp\818F.tmp"116⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\820C.tmp"C:\Users\Admin\AppData\Local\Temp\820C.tmp"117⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\8289.tmp"C:\Users\Admin\AppData\Local\Temp\8289.tmp"118⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\8335.tmp"C:\Users\Admin\AppData\Local\Temp\8335.tmp"119⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\83E1.tmp"C:\Users\Admin\AppData\Local\Temp\83E1.tmp"120⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\848D.tmp"C:\Users\Admin\AppData\Local\Temp\848D.tmp"121⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\8538.tmp"C:\Users\Admin\AppData\Local\Temp\8538.tmp"122⤵PID:2764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-