Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 15:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe
-
Size
486KB
-
MD5
6af0cb9f795afce21359cf0956c2155a
-
SHA1
7410d02b76fad0206587fb3561c730649754b4ad
-
SHA256
c4d65c953eb72f9c5f9136f768beb8b028dc6ed39db2fb8d12fc3814c38173e9
-
SHA512
859e37c4d86f9f1460266c3ec74698a3075d89c8820928697138b59460e37c65516cff24d0f96aa4939ee390e06742b332e0128bec7c94c1797963b5fd93e0c9
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD7SBBaVF4Q0s/0sU9UfTgKsWiW7O2EkYXSqdTr:UU5rCOTeiDSi7eufEKsc71E7Dd3bNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4412 9A7B.tmp 2880 9B46.tmp 3528 9BD2.tmp 4712 9CAD.tmp 1968 9D59.tmp 704 9E05.tmp 4720 9EC0.tmp 3500 9F7C.tmp 4484 A018.tmp 1536 A0B4.tmp 5000 A160.tmp 4968 A24B.tmp 3992 A325.tmp 3772 A3D1.tmp 3120 A4FA.tmp 652 A5A6.tmp 4624 A642.tmp 712 A6DF.tmp 2136 A7B9.tmp 4272 A875.tmp 3788 A901.tmp 3984 A99E.tmp 4476 AA2A.tmp 2544 AAE6.tmp 3488 AB72.tmp 412 ABFF.tmp 388 AC7C.tmp 2876 AD18.tmp 4756 ADD4.tmp 4348 AE8F.tmp 2208 AF5A.tmp 4412 B045.tmp 3936 B110.tmp 1896 B19D.tmp 4004 B229.tmp 3572 B2A6.tmp 4972 B323.tmp 4400 B3BF.tmp 4832 B47B.tmp 3592 B508.tmp 492 B5B3.tmp 3920 B640.tmp 1800 B6DC.tmp 536 B798.tmp 696 B805.tmp 2828 B97C.tmp 1680 BA67.tmp 5000 BAE4.tmp 3316 BB80.tmp 3116 BC2C.tmp 2320 BCA9.tmp 3772 BD35.tmp 4840 BDD2.tmp 5008 BE3F.tmp 3580 BEBC.tmp 3940 BF58.tmp 2652 BFD5.tmp 4776 C043.tmp 920 C0CF.tmp 2108 C16B.tmp 3796 C1F8.tmp 4692 C256.tmp 2836 C2C3.tmp 2736 C350.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4412 2648 NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe 88 PID 2648 wrote to memory of 4412 2648 NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe 88 PID 2648 wrote to memory of 4412 2648 NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe 88 PID 4412 wrote to memory of 2880 4412 9A7B.tmp 90 PID 4412 wrote to memory of 2880 4412 9A7B.tmp 90 PID 4412 wrote to memory of 2880 4412 9A7B.tmp 90 PID 2880 wrote to memory of 3528 2880 9B46.tmp 91 PID 2880 wrote to memory of 3528 2880 9B46.tmp 91 PID 2880 wrote to memory of 3528 2880 9B46.tmp 91 PID 3528 wrote to memory of 4712 3528 9BD2.tmp 92 PID 3528 wrote to memory of 4712 3528 9BD2.tmp 92 PID 3528 wrote to memory of 4712 3528 9BD2.tmp 92 PID 4712 wrote to memory of 1968 4712 9CAD.tmp 94 PID 4712 wrote to memory of 1968 4712 9CAD.tmp 94 PID 4712 wrote to memory of 1968 4712 9CAD.tmp 94 PID 1968 wrote to memory of 704 1968 9D59.tmp 95 PID 1968 wrote to memory of 704 1968 9D59.tmp 95 PID 1968 wrote to memory of 704 1968 9D59.tmp 95 PID 704 wrote to memory of 4720 704 9E05.tmp 97 PID 704 wrote to memory of 4720 704 9E05.tmp 97 PID 704 wrote to memory of 4720 704 9E05.tmp 97 PID 4720 wrote to memory of 3500 4720 9EC0.tmp 98 PID 4720 wrote to memory of 3500 4720 9EC0.tmp 98 PID 4720 wrote to memory of 3500 4720 9EC0.tmp 98 PID 3500 wrote to memory of 4484 3500 9F7C.tmp 99 PID 3500 wrote to memory of 4484 3500 9F7C.tmp 99 PID 3500 wrote to memory of 4484 3500 9F7C.tmp 99 PID 4484 wrote to memory of 1536 4484 A018.tmp 100 PID 4484 wrote to memory of 1536 4484 A018.tmp 100 PID 4484 wrote to memory of 1536 4484 A018.tmp 100 PID 1536 wrote to memory of 5000 1536 A0B4.tmp 101 PID 1536 wrote to memory of 5000 1536 A0B4.tmp 101 PID 1536 wrote to memory of 5000 1536 A0B4.tmp 101 PID 5000 wrote to memory of 4968 5000 A160.tmp 102 PID 5000 wrote to memory of 4968 5000 A160.tmp 102 PID 5000 wrote to memory of 4968 5000 A160.tmp 102 PID 4968 wrote to memory of 3992 4968 A24B.tmp 103 PID 4968 wrote to memory of 3992 4968 A24B.tmp 103 PID 4968 wrote to memory of 3992 4968 A24B.tmp 103 PID 3992 wrote to memory of 3772 3992 A325.tmp 104 PID 3992 wrote to memory of 3772 3992 A325.tmp 104 PID 3992 wrote to memory of 3772 3992 A325.tmp 104 PID 3772 wrote to memory of 3120 3772 A3D1.tmp 105 PID 3772 wrote to memory of 3120 3772 A3D1.tmp 105 PID 3772 wrote to memory of 3120 3772 A3D1.tmp 105 PID 3120 wrote to memory of 652 3120 A4FA.tmp 106 PID 3120 wrote to memory of 652 3120 A4FA.tmp 106 PID 3120 wrote to memory of 652 3120 A4FA.tmp 106 PID 652 wrote to memory of 4624 652 A5A6.tmp 108 PID 652 wrote to memory of 4624 652 A5A6.tmp 108 PID 652 wrote to memory of 4624 652 A5A6.tmp 108 PID 4624 wrote to memory of 712 4624 A642.tmp 109 PID 4624 wrote to memory of 712 4624 A642.tmp 109 PID 4624 wrote to memory of 712 4624 A642.tmp 109 PID 712 wrote to memory of 2136 712 A6DF.tmp 112 PID 712 wrote to memory of 2136 712 A6DF.tmp 112 PID 712 wrote to memory of 2136 712 A6DF.tmp 112 PID 2136 wrote to memory of 4272 2136 A7B9.tmp 113 PID 2136 wrote to memory of 4272 2136 A7B9.tmp 113 PID 2136 wrote to memory of 4272 2136 A7B9.tmp 113 PID 4272 wrote to memory of 3788 4272 A875.tmp 115 PID 4272 wrote to memory of 3788 4272 A875.tmp 115 PID 4272 wrote to memory of 3788 4272 A875.tmp 115 PID 3788 wrote to memory of 3984 3788 A901.tmp 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_6af0cb9f795afce21359cf0956c2155a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\9B46.tmp"C:\Users\Admin\AppData\Local\Temp\9B46.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\9D59.tmp"C:\Users\Admin\AppData\Local\Temp\9D59.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\9E05.tmp"C:\Users\Admin\AppData\Local\Temp\9E05.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\A160.tmp"C:\Users\Admin\AppData\Local\Temp\A160.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\A24B.tmp"C:\Users\Admin\AppData\Local\Temp\A24B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\A325.tmp"C:\Users\Admin\AppData\Local\Temp\A325.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\A6DF.tmp"C:\Users\Admin\AppData\Local\Temp\A6DF.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\A901.tmp"C:\Users\Admin\AppData\Local\Temp\A901.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\A99E.tmp"C:\Users\Admin\AppData\Local\Temp\A99E.tmp"23⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"24⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"25⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"26⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\ABFF.tmp"C:\Users\Admin\AppData\Local\Temp\ABFF.tmp"27⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"28⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"29⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"30⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"31⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"32⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"33⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\B110.tmp"C:\Users\Admin\AppData\Local\Temp\B110.tmp"34⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\B19D.tmp"C:\Users\Admin\AppData\Local\Temp\B19D.tmp"35⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\B229.tmp"C:\Users\Admin\AppData\Local\Temp\B229.tmp"36⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"37⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\B323.tmp"C:\Users\Admin\AppData\Local\Temp\B323.tmp"38⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"39⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"40⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"41⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"42⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"43⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"44⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"45⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\B805.tmp"C:\Users\Admin\AppData\Local\Temp\B805.tmp"46⤵
- Executes dropped EXE
PID:696 -
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"47⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\BA67.tmp"C:\Users\Admin\AppData\Local\Temp\BA67.tmp"48⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"49⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\BB80.tmp"C:\Users\Admin\AppData\Local\Temp\BB80.tmp"50⤵
- Executes dropped EXE
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"51⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"52⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"53⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"54⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"55⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"56⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\BF58.tmp"C:\Users\Admin\AppData\Local\Temp\BF58.tmp"57⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"58⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\C043.tmp"C:\Users\Admin\AppData\Local\Temp\C043.tmp"59⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"60⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\C16B.tmp"C:\Users\Admin\AppData\Local\Temp\C16B.tmp"61⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"62⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\C256.tmp"C:\Users\Admin\AppData\Local\Temp\C256.tmp"63⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"64⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\C350.tmp"C:\Users\Admin\AppData\Local\Temp\C350.tmp"65⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"66⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\C459.tmp"C:\Users\Admin\AppData\Local\Temp\C459.tmp"67⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"68⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\C573.tmp"C:\Users\Admin\AppData\Local\Temp\C573.tmp"69⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"70⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\C69C.tmp"C:\Users\Admin\AppData\Local\Temp\C69C.tmp"71⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\C709.tmp"C:\Users\Admin\AppData\Local\Temp\C709.tmp"72⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"73⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\C803.tmp"C:\Users\Admin\AppData\Local\Temp\C803.tmp"74⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"75⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"76⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\C97A.tmp"C:\Users\Admin\AppData\Local\Temp\C97A.tmp"77⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"C:\Users\Admin\AppData\Local\Temp\C9F7.tmp"78⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"79⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"80⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\CB7E.tmp"C:\Users\Admin\AppData\Local\Temp\CB7E.tmp"81⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"82⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"83⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\CD04.tmp"C:\Users\Admin\AppData\Local\Temp\CD04.tmp"84⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\CD81.tmp"C:\Users\Admin\AppData\Local\Temp\CD81.tmp"85⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"86⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"87⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\CF75.tmp"C:\Users\Admin\AppData\Local\Temp\CF75.tmp"88⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"89⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\D050.tmp"C:\Users\Admin\AppData\Local\Temp\D050.tmp"90⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"91⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\D12B.tmp"C:\Users\Admin\AppData\Local\Temp\D12B.tmp"92⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"93⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\D225.tmp"C:\Users\Admin\AppData\Local\Temp\D225.tmp"94⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"95⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"96⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"97⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\D438.tmp"C:\Users\Admin\AppData\Local\Temp\D438.tmp"98⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"99⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\D570.tmp"C:\Users\Admin\AppData\Local\Temp\D570.tmp"100⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"101⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"102⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\D726.tmp"C:\Users\Admin\AppData\Local\Temp\D726.tmp"103⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"104⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"105⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"106⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\D939.tmp"C:\Users\Admin\AppData\Local\Temp\D939.tmp"107⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"C:\Users\Admin\AppData\Local\Temp\D9E5.tmp"108⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"109⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"110⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"111⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"112⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"113⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"114⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"115⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"116⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"117⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"118⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"119⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"120⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\E02E.tmp"C:\Users\Admin\AppData\Local\Temp\E02E.tmp"121⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\E09C.tmp"C:\Users\Admin\AppData\Local\Temp\E09C.tmp"122⤵PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-