Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe
-
Size
486KB
-
MD5
bc8444e68b2ca99954695234bf201498
-
SHA1
8d574363ade573f77cc77bedac66a5462d78c0dd
-
SHA256
0a959b88be57733f1e34192c5d57e9bbc492e15dfdf20027ea8b67bfa4991b11
-
SHA512
a7d9522e79ba297640d6c113bf99e391816ba344b01d04b3065ee040a1fa4a46266806feaa5ad65cf905bc687b9ba3863cab8d631e4e2f04e0bcba6a8e8c6887
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7hWYXYYAJol5MlvXwmRq7+lMgs/2C+J0dOB03:/U5rCOTeiD5XYol50iOaM0dw0IsAoNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1736 82BD.tmp 4072 8397.tmp 412 8462.tmp 4724 853D.tmp 3440 8628.tmp 4220 8770.tmp 636 880C.tmp 3524 88C7.tmp 1836 8954.tmp 708 89F0.tmp 4576 8AAC.tmp 3664 8B67.tmp 3892 8BE4.tmp 244 8CA0.tmp 680 8D3C.tmp 4744 8E46.tmp 4876 8EF2.tmp 3284 8FAD.tmp 3808 90B7.tmp 2036 9153.tmp 1352 922E.tmp 544 92E9.tmp 4224 93C4.tmp 2132 9451.tmp 2968 950C.tmp 8 9599.tmp 4296 9654.tmp 2308 9700.tmp 232 978D.tmp 212 9848.tmp 1628 9913.tmp 3368 99B0.tmp 2380 9A5B.tmp 4776 9AB9.tmp 3196 9B36.tmp 3968 9BD2.tmp 376 9C5F.tmp 1096 9CFB.tmp 1016 9E15.tmp 4788 9E92.tmp 5040 9F3D.tmp 2140 9FDA.tmp 4800 A066.tmp 4432 A103.tmp 4796 A18F.tmp 5028 A21C.tmp 3764 A2C8.tmp 3580 A364.tmp 4204 A410.tmp 4420 A48D.tmp 3484 A529.tmp 3308 A5B6.tmp 1316 A671.tmp 2204 A71D.tmp 920 A79A.tmp 1756 A807.tmp 3948 A894.tmp 3504 A911.tmp 544 A98E.tmp 4224 AA2A.tmp 1740 AAB7.tmp 2252 AB44.tmp 5104 ABC1.tmp 3380 AC4D.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1736 5008 NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe 87 PID 5008 wrote to memory of 1736 5008 NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe 87 PID 5008 wrote to memory of 1736 5008 NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe 87 PID 1736 wrote to memory of 4072 1736 82BD.tmp 88 PID 1736 wrote to memory of 4072 1736 82BD.tmp 88 PID 1736 wrote to memory of 4072 1736 82BD.tmp 88 PID 4072 wrote to memory of 412 4072 8397.tmp 90 PID 4072 wrote to memory of 412 4072 8397.tmp 90 PID 4072 wrote to memory of 412 4072 8397.tmp 90 PID 412 wrote to memory of 4724 412 8462.tmp 91 PID 412 wrote to memory of 4724 412 8462.tmp 91 PID 412 wrote to memory of 4724 412 8462.tmp 91 PID 4724 wrote to memory of 3440 4724 853D.tmp 92 PID 4724 wrote to memory of 3440 4724 853D.tmp 92 PID 4724 wrote to memory of 3440 4724 853D.tmp 92 PID 3440 wrote to memory of 4220 3440 8628.tmp 94 PID 3440 wrote to memory of 4220 3440 8628.tmp 94 PID 3440 wrote to memory of 4220 3440 8628.tmp 94 PID 4220 wrote to memory of 636 4220 8770.tmp 95 PID 4220 wrote to memory of 636 4220 8770.tmp 95 PID 4220 wrote to memory of 636 4220 8770.tmp 95 PID 636 wrote to memory of 3524 636 880C.tmp 96 PID 636 wrote to memory of 3524 636 880C.tmp 96 PID 636 wrote to memory of 3524 636 880C.tmp 96 PID 3524 wrote to memory of 1836 3524 88C7.tmp 97 PID 3524 wrote to memory of 1836 3524 88C7.tmp 97 PID 3524 wrote to memory of 1836 3524 88C7.tmp 97 PID 1836 wrote to memory of 708 1836 8954.tmp 98 PID 1836 wrote to memory of 708 1836 8954.tmp 98 PID 1836 wrote to memory of 708 1836 8954.tmp 98 PID 708 wrote to memory of 4576 708 89F0.tmp 99 PID 708 wrote to memory of 4576 708 89F0.tmp 99 PID 708 wrote to memory of 4576 708 89F0.tmp 99 PID 4576 wrote to memory of 3664 4576 8AAC.tmp 100 PID 4576 wrote to memory of 3664 4576 8AAC.tmp 100 PID 4576 wrote to memory of 3664 4576 8AAC.tmp 100 PID 3664 wrote to memory of 3892 3664 8B67.tmp 102 PID 3664 wrote to memory of 3892 3664 8B67.tmp 102 PID 3664 wrote to memory of 3892 3664 8B67.tmp 102 PID 3892 wrote to memory of 244 3892 8BE4.tmp 103 PID 3892 wrote to memory of 244 3892 8BE4.tmp 103 PID 3892 wrote to memory of 244 3892 8BE4.tmp 103 PID 244 wrote to memory of 680 244 8CA0.tmp 104 PID 244 wrote to memory of 680 244 8CA0.tmp 104 PID 244 wrote to memory of 680 244 8CA0.tmp 104 PID 680 wrote to memory of 4744 680 8D3C.tmp 106 PID 680 wrote to memory of 4744 680 8D3C.tmp 106 PID 680 wrote to memory of 4744 680 8D3C.tmp 106 PID 4744 wrote to memory of 4876 4744 8E46.tmp 107 PID 4744 wrote to memory of 4876 4744 8E46.tmp 107 PID 4744 wrote to memory of 4876 4744 8E46.tmp 107 PID 4876 wrote to memory of 3284 4876 8EF2.tmp 108 PID 4876 wrote to memory of 3284 4876 8EF2.tmp 108 PID 4876 wrote to memory of 3284 4876 8EF2.tmp 108 PID 3284 wrote to memory of 3808 3284 8FAD.tmp 111 PID 3284 wrote to memory of 3808 3284 8FAD.tmp 111 PID 3284 wrote to memory of 3808 3284 8FAD.tmp 111 PID 3808 wrote to memory of 2036 3808 90B7.tmp 112 PID 3808 wrote to memory of 2036 3808 90B7.tmp 112 PID 3808 wrote to memory of 2036 3808 90B7.tmp 112 PID 2036 wrote to memory of 1352 2036 9153.tmp 113 PID 2036 wrote to memory of 1352 2036 9153.tmp 113 PID 2036 wrote to memory of 1352 2036 9153.tmp 113 PID 1352 wrote to memory of 544 1352 922E.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_bc8444e68b2ca99954695234bf201498_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\82BD.tmp"C:\Users\Admin\AppData\Local\Temp\82BD.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\8397.tmp"C:\Users\Admin\AppData\Local\Temp\8397.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\8462.tmp"C:\Users\Admin\AppData\Local\Temp\8462.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\853D.tmp"C:\Users\Admin\AppData\Local\Temp\853D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\8770.tmp"C:\Users\Admin\AppData\Local\Temp\8770.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\880C.tmp"C:\Users\Admin\AppData\Local\Temp\880C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\88C7.tmp"C:\Users\Admin\AppData\Local\Temp\88C7.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\8CA0.tmp"C:\Users\Admin\AppData\Local\Temp\8CA0.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"C:\Users\Admin\AppData\Local\Temp\8D3C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\8E46.tmp"C:\Users\Admin\AppData\Local\Temp\8E46.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\90B7.tmp"C:\Users\Admin\AppData\Local\Temp\90B7.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\9153.tmp"C:\Users\Admin\AppData\Local\Temp\9153.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\92E9.tmp"C:\Users\Admin\AppData\Local\Temp\92E9.tmp"23⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\93C4.tmp"C:\Users\Admin\AppData\Local\Temp\93C4.tmp"24⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\9451.tmp"C:\Users\Admin\AppData\Local\Temp\9451.tmp"25⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\950C.tmp"C:\Users\Admin\AppData\Local\Temp\950C.tmp"26⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\9599.tmp"C:\Users\Admin\AppData\Local\Temp\9599.tmp"27⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\9654.tmp"C:\Users\Admin\AppData\Local\Temp\9654.tmp"28⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\9700.tmp"C:\Users\Admin\AppData\Local\Temp\9700.tmp"29⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\978D.tmp"C:\Users\Admin\AppData\Local\Temp\978D.tmp"30⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\9848.tmp"C:\Users\Admin\AppData\Local\Temp\9848.tmp"31⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\9913.tmp"C:\Users\Admin\AppData\Local\Temp\9913.tmp"32⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"33⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"C:\Users\Admin\AppData\Local\Temp\9A5B.tmp"34⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"35⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\9B36.tmp"C:\Users\Admin\AppData\Local\Temp\9B36.tmp"36⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"37⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"38⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\9CFB.tmp"C:\Users\Admin\AppData\Local\Temp\9CFB.tmp"39⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\9E15.tmp"C:\Users\Admin\AppData\Local\Temp\9E15.tmp"40⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"41⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"42⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"43⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\A066.tmp"C:\Users\Admin\AppData\Local\Temp\A066.tmp"44⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\A103.tmp"C:\Users\Admin\AppData\Local\Temp\A103.tmp"45⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\A18F.tmp"C:\Users\Admin\AppData\Local\Temp\A18F.tmp"46⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"47⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"48⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"49⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\A410.tmp"C:\Users\Admin\AppData\Local\Temp\A410.tmp"50⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\A48D.tmp"C:\Users\Admin\AppData\Local\Temp\A48D.tmp"51⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\A529.tmp"C:\Users\Admin\AppData\Local\Temp\A529.tmp"52⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\A5B6.tmp"C:\Users\Admin\AppData\Local\Temp\A5B6.tmp"53⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\A671.tmp"C:\Users\Admin\AppData\Local\Temp\A671.tmp"54⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\A71D.tmp"C:\Users\Admin\AppData\Local\Temp\A71D.tmp"55⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"56⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\A807.tmp"C:\Users\Admin\AppData\Local\Temp\A807.tmp"57⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\A894.tmp"C:\Users\Admin\AppData\Local\Temp\A894.tmp"58⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\A911.tmp"C:\Users\Admin\AppData\Local\Temp\A911.tmp"59⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\A98E.tmp"C:\Users\Admin\AppData\Local\Temp\A98E.tmp"60⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"61⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"62⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\AB44.tmp"C:\Users\Admin\AppData\Local\Temp\AB44.tmp"63⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"64⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"65⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"66⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\AD86.tmp"C:\Users\Admin\AppData\Local\Temp\AD86.tmp"67⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\AE12.tmp"C:\Users\Admin\AppData\Local\Temp\AE12.tmp"68⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"69⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"70⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"71⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"72⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"73⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\B16E.tmp"C:\Users\Admin\AppData\Local\Temp\B16E.tmp"74⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"75⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\B258.tmp"C:\Users\Admin\AppData\Local\Temp\B258.tmp"76⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"77⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"78⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"79⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\B48B.tmp"C:\Users\Admin\AppData\Local\Temp\B48B.tmp"80⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"81⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\B585.tmp"C:\Users\Admin\AppData\Local\Temp\B585.tmp"82⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\B621.tmp"C:\Users\Admin\AppData\Local\Temp\B621.tmp"83⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"84⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"85⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\B815.tmp"C:\Users\Admin\AppData\Local\Temp\B815.tmp"86⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"87⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"88⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"89⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"90⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\BA67.tmp"C:\Users\Admin\AppData\Local\Temp\BA67.tmp"91⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"92⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"93⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"94⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\BC6A.tmp"C:\Users\Admin\AppData\Local\Temp\BC6A.tmp"95⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"96⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\BD83.tmp"C:\Users\Admin\AppData\Local\Temp\BD83.tmp"97⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"98⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"99⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"100⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\BF77.tmp"C:\Users\Admin\AppData\Local\Temp\BF77.tmp"101⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"102⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\C043.tmp"C:\Users\Admin\AppData\Local\Temp\C043.tmp"103⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"104⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"105⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\C1AA.tmp"C:\Users\Admin\AppData\Local\Temp\C1AA.tmp"106⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"107⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"108⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"109⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"110⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\C488.tmp"C:\Users\Admin\AppData\Local\Temp\C488.tmp"111⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"112⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\C563.tmp"C:\Users\Admin\AppData\Local\Temp\C563.tmp"113⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"114⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\C69C.tmp"C:\Users\Admin\AppData\Local\Temp\C69C.tmp"115⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"116⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"117⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\C832.tmp"C:\Users\Admin\AppData\Local\Temp\C832.tmp"118⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"119⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\C93B.tmp"C:\Users\Admin\AppData\Local\Temp\C93B.tmp"120⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"121⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\CA55.tmp"C:\Users\Admin\AppData\Local\Temp\CA55.tmp"122⤵PID:4388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-