Analysis
-
max time kernel
168s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 18:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe
-
Size
520KB
-
MD5
bf6926db1af3fbb32194ba5a49a818ef
-
SHA1
6733bf73872383db2079695b7d2e4e5613148bb0
-
SHA256
75a7b7e6294c11ffec41581fc441bb6f47b87e97e0cad9997a5731af14e46ecf
-
SHA512
04574fd4c02479528f53d44aaaad8c70a049d3fc44d089e66c112a3ceaa7005b0c75f5d08609cccb7643ec3b887fe35aa0c3014bcd9df0139c9bf7d743adebe2
-
SSDEEP
12288:gj8fuxR21t5i8f/vZ1646j6zAYWGhMisbWshtBvh+NZ:gj8fuK1GY5cn2zB5qiWz+N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4572 B85E.tmp 5104 BC17.tmp 3644 BE3A.tmp 3504 BF44.tmp 2040 C07C.tmp 3124 C1E4.tmp 2892 C30D.tmp 4732 C501.tmp 4940 C58D.tmp 2128 C704.tmp 3264 C8C9.tmp 4824 CB79.tmp 2336 CDBB.tmp 1436 CE86.tmp 3652 D00D.tmp 380 D2AD.tmp 2732 D368.tmp 2008 D472.tmp 2148 D6E3.tmp 1948 D7AE.tmp 1180 D8B7.tmp 2660 D954.tmp 4080 DABB.tmp 4600 DDE8.tmp 5020 DE84.tmp 4908 E133.tmp 3612 E24D.tmp 4676 E2E9.tmp 3528 E395.tmp 1972 E441.tmp 3928 E5D7.tmp 4468 E77D.tmp 3348 E877.tmp 2836 E9BF.tmp 4932 EA5B.tmp 3376 EAD8.tmp 4496 EB45.tmp 4176 EC9D.tmp 1484 ED39.tmp 4684 EDF5.tmp 1656 EE82.tmp 1416 EF5C.tmp 2040 EFF9.tmp 4056 F160.tmp 2892 F1CD.tmp 3916 F23B.tmp 1812 F373.tmp 4672 F3F0.tmp 1324 F46D.tmp 3064 F603.tmp 2404 F7A9.tmp 3492 F836.tmp 2240 F901.tmp 4636 F97E.tmp 3188 FAD6.tmp 4380 FBA1.tmp 1800 FC9B.tmp 4052 FD18.tmp 1044 FDB4.tmp 3860 FF2B.tmp 4644 B2.tmp 4680 352.tmp 4836 3EE.tmp 3816 45B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 4572 2508 NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe 93 PID 2508 wrote to memory of 4572 2508 NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe 93 PID 2508 wrote to memory of 4572 2508 NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe 93 PID 4572 wrote to memory of 5104 4572 B85E.tmp 94 PID 4572 wrote to memory of 5104 4572 B85E.tmp 94 PID 4572 wrote to memory of 5104 4572 B85E.tmp 94 PID 5104 wrote to memory of 3644 5104 BC17.tmp 95 PID 5104 wrote to memory of 3644 5104 BC17.tmp 95 PID 5104 wrote to memory of 3644 5104 BC17.tmp 95 PID 3644 wrote to memory of 3504 3644 BE3A.tmp 96 PID 3644 wrote to memory of 3504 3644 BE3A.tmp 96 PID 3644 wrote to memory of 3504 3644 BE3A.tmp 96 PID 3504 wrote to memory of 2040 3504 BF44.tmp 97 PID 3504 wrote to memory of 2040 3504 BF44.tmp 97 PID 3504 wrote to memory of 2040 3504 BF44.tmp 97 PID 2040 wrote to memory of 3124 2040 C07C.tmp 98 PID 2040 wrote to memory of 3124 2040 C07C.tmp 98 PID 2040 wrote to memory of 3124 2040 C07C.tmp 98 PID 3124 wrote to memory of 2892 3124 C1E4.tmp 99 PID 3124 wrote to memory of 2892 3124 C1E4.tmp 99 PID 3124 wrote to memory of 2892 3124 C1E4.tmp 99 PID 2892 wrote to memory of 4732 2892 C30D.tmp 100 PID 2892 wrote to memory of 4732 2892 C30D.tmp 100 PID 2892 wrote to memory of 4732 2892 C30D.tmp 100 PID 4732 wrote to memory of 4940 4732 C501.tmp 101 PID 4732 wrote to memory of 4940 4732 C501.tmp 101 PID 4732 wrote to memory of 4940 4732 C501.tmp 101 PID 4940 wrote to memory of 2128 4940 C58D.tmp 102 PID 4940 wrote to memory of 2128 4940 C58D.tmp 102 PID 4940 wrote to memory of 2128 4940 C58D.tmp 102 PID 2128 wrote to memory of 3264 2128 C704.tmp 103 PID 2128 wrote to memory of 3264 2128 C704.tmp 103 PID 2128 wrote to memory of 3264 2128 C704.tmp 103 PID 3264 wrote to memory of 4824 3264 C8C9.tmp 104 PID 3264 wrote to memory of 4824 3264 C8C9.tmp 104 PID 3264 wrote to memory of 4824 3264 C8C9.tmp 104 PID 4824 wrote to memory of 2336 4824 CB79.tmp 105 PID 4824 wrote to memory of 2336 4824 CB79.tmp 105 PID 4824 wrote to memory of 2336 4824 CB79.tmp 105 PID 2336 wrote to memory of 1436 2336 CDBB.tmp 106 PID 2336 wrote to memory of 1436 2336 CDBB.tmp 106 PID 2336 wrote to memory of 1436 2336 CDBB.tmp 106 PID 1436 wrote to memory of 3652 1436 CE86.tmp 107 PID 1436 wrote to memory of 3652 1436 CE86.tmp 107 PID 1436 wrote to memory of 3652 1436 CE86.tmp 107 PID 3652 wrote to memory of 380 3652 D00D.tmp 108 PID 3652 wrote to memory of 380 3652 D00D.tmp 108 PID 3652 wrote to memory of 380 3652 D00D.tmp 108 PID 380 wrote to memory of 2732 380 D2AD.tmp 109 PID 380 wrote to memory of 2732 380 D2AD.tmp 109 PID 380 wrote to memory of 2732 380 D2AD.tmp 109 PID 2732 wrote to memory of 2008 2732 D368.tmp 111 PID 2732 wrote to memory of 2008 2732 D368.tmp 111 PID 2732 wrote to memory of 2008 2732 D368.tmp 111 PID 2008 wrote to memory of 2148 2008 D472.tmp 112 PID 2008 wrote to memory of 2148 2008 D472.tmp 112 PID 2008 wrote to memory of 2148 2008 D472.tmp 112 PID 2148 wrote to memory of 1948 2148 D6E3.tmp 113 PID 2148 wrote to memory of 1948 2148 D6E3.tmp 113 PID 2148 wrote to memory of 1948 2148 D6E3.tmp 113 PID 1948 wrote to memory of 1180 1948 D7AE.tmp 114 PID 1948 wrote to memory of 1180 1948 D7AE.tmp 114 PID 1948 wrote to memory of 1180 1948 D7AE.tmp 114 PID 1180 wrote to memory of 2660 1180 D8B7.tmp 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_bf6926db1af3fbb32194ba5a49a818ef_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\B85E.tmp"C:\Users\Admin\AppData\Local\Temp\B85E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\BC17.tmp"C:\Users\Admin\AppData\Local\Temp\BC17.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\BE3A.tmp"C:\Users\Admin\AppData\Local\Temp\BE3A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\BF44.tmp"C:\Users\Admin\AppData\Local\Temp\BF44.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\C07C.tmp"C:\Users\Admin\AppData\Local\Temp\C07C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\C1E4.tmp"C:\Users\Admin\AppData\Local\Temp\C1E4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\C30D.tmp"C:\Users\Admin\AppData\Local\Temp\C30D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\C501.tmp"C:\Users\Admin\AppData\Local\Temp\C501.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\C58D.tmp"C:\Users\Admin\AppData\Local\Temp\C58D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\C704.tmp"C:\Users\Admin\AppData\Local\Temp\C704.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\C8C9.tmp"C:\Users\Admin\AppData\Local\Temp\C8C9.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\CB79.tmp"C:\Users\Admin\AppData\Local\Temp\CB79.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\CDBB.tmp"C:\Users\Admin\AppData\Local\Temp\CDBB.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\CE86.tmp"C:\Users\Admin\AppData\Local\Temp\CE86.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\D00D.tmp"C:\Users\Admin\AppData\Local\Temp\D00D.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\D2AD.tmp"C:\Users\Admin\AppData\Local\Temp\D2AD.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\D368.tmp"C:\Users\Admin\AppData\Local\Temp\D368.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\D472.tmp"C:\Users\Admin\AppData\Local\Temp\D472.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\D6E3.tmp"C:\Users\Admin\AppData\Local\Temp\D6E3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\D7AE.tmp"C:\Users\Admin\AppData\Local\Temp\D7AE.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\D8B7.tmp"C:\Users\Admin\AppData\Local\Temp\D8B7.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\D954.tmp"C:\Users\Admin\AppData\Local\Temp\D954.tmp"23⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\DABB.tmp"C:\Users\Admin\AppData\Local\Temp\DABB.tmp"24⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\DDE8.tmp"C:\Users\Admin\AppData\Local\Temp\DDE8.tmp"25⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\DE84.tmp"C:\Users\Admin\AppData\Local\Temp\DE84.tmp"26⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\E133.tmp"C:\Users\Admin\AppData\Local\Temp\E133.tmp"27⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\E24D.tmp"C:\Users\Admin\AppData\Local\Temp\E24D.tmp"28⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\E2E9.tmp"C:\Users\Admin\AppData\Local\Temp\E2E9.tmp"29⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\E395.tmp"C:\Users\Admin\AppData\Local\Temp\E395.tmp"30⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\E441.tmp"C:\Users\Admin\AppData\Local\Temp\E441.tmp"31⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\E5D7.tmp"C:\Users\Admin\AppData\Local\Temp\E5D7.tmp"32⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\E77D.tmp"C:\Users\Admin\AppData\Local\Temp\E77D.tmp"33⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\E877.tmp"C:\Users\Admin\AppData\Local\Temp\E877.tmp"34⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\E9BF.tmp"C:\Users\Admin\AppData\Local\Temp\E9BF.tmp"35⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\EA5B.tmp"C:\Users\Admin\AppData\Local\Temp\EA5B.tmp"36⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\EAD8.tmp"C:\Users\Admin\AppData\Local\Temp\EAD8.tmp"37⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\EB45.tmp"C:\Users\Admin\AppData\Local\Temp\EB45.tmp"38⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\EC9D.tmp"C:\Users\Admin\AppData\Local\Temp\EC9D.tmp"39⤵
- Executes dropped EXE
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\ED39.tmp"C:\Users\Admin\AppData\Local\Temp\ED39.tmp"40⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\EDF5.tmp"C:\Users\Admin\AppData\Local\Temp\EDF5.tmp"41⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\EE82.tmp"C:\Users\Admin\AppData\Local\Temp\EE82.tmp"42⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\EF5C.tmp"C:\Users\Admin\AppData\Local\Temp\EF5C.tmp"43⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\EFF9.tmp"C:\Users\Admin\AppData\Local\Temp\EFF9.tmp"44⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\F160.tmp"C:\Users\Admin\AppData\Local\Temp\F160.tmp"45⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\F1CD.tmp"C:\Users\Admin\AppData\Local\Temp\F1CD.tmp"46⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\F23B.tmp"C:\Users\Admin\AppData\Local\Temp\F23B.tmp"47⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\F373.tmp"C:\Users\Admin\AppData\Local\Temp\F373.tmp"48⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\F3F0.tmp"C:\Users\Admin\AppData\Local\Temp\F3F0.tmp"49⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\F46D.tmp"C:\Users\Admin\AppData\Local\Temp\F46D.tmp"50⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\F603.tmp"C:\Users\Admin\AppData\Local\Temp\F603.tmp"51⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\F7A9.tmp"C:\Users\Admin\AppData\Local\Temp\F7A9.tmp"52⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\F836.tmp"C:\Users\Admin\AppData\Local\Temp\F836.tmp"53⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\F901.tmp"C:\Users\Admin\AppData\Local\Temp\F901.tmp"54⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\F97E.tmp"C:\Users\Admin\AppData\Local\Temp\F97E.tmp"55⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\FAD6.tmp"C:\Users\Admin\AppData\Local\Temp\FAD6.tmp"56⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\FBA1.tmp"C:\Users\Admin\AppData\Local\Temp\FBA1.tmp"57⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\FC9B.tmp"C:\Users\Admin\AppData\Local\Temp\FC9B.tmp"58⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\FD18.tmp"C:\Users\Admin\AppData\Local\Temp\FD18.tmp"59⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\FDB4.tmp"C:\Users\Admin\AppData\Local\Temp\FDB4.tmp"60⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\FF2B.tmp"C:\Users\Admin\AppData\Local\Temp\FF2B.tmp"61⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\B2.tmp"C:\Users\Admin\AppData\Local\Temp\B2.tmp"62⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\352.tmp"C:\Users\Admin\AppData\Local\Temp\352.tmp"63⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3EE.tmp"C:\Users\Admin\AppData\Local\Temp\3EE.tmp"64⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\45B.tmp"C:\Users\Admin\AppData\Local\Temp\45B.tmp"65⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\507.tmp"C:\Users\Admin\AppData\Local\Temp\507.tmp"66⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\65F.tmp"C:\Users\Admin\AppData\Local\Temp\65F.tmp"67⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\6FB.tmp"C:\Users\Admin\AppData\Local\Temp\6FB.tmp"68⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\797.tmp"C:\Users\Admin\AppData\Local\Temp\797.tmp"69⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\93D.tmp"C:\Users\Admin\AppData\Local\Temp\93D.tmp"70⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\A57.tmp"C:\Users\Admin\AppData\Local\Temp\A57.tmp"71⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\AF3.tmp"C:\Users\Admin\AppData\Local\Temp\AF3.tmp"72⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\B7F.tmp"C:\Users\Admin\AppData\Local\Temp\B7F.tmp"73⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\C1C.tmp"C:\Users\Admin\AppData\Local\Temp\C1C.tmp"74⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\CC8.tmp"C:\Users\Admin\AppData\Local\Temp\CC8.tmp"75⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\D73.tmp"C:\Users\Admin\AppData\Local\Temp\D73.tmp"76⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\F48.tmp"C:\Users\Admin\AppData\Local\Temp\F48.tmp"77⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\FF4.tmp"C:\Users\Admin\AppData\Local\Temp\FF4.tmp"78⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\10CF.tmp"C:\Users\Admin\AppData\Local\Temp\10CF.tmp"79⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\115B.tmp"C:\Users\Admin\AppData\Local\Temp\115B.tmp"80⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\11E8.tmp"C:\Users\Admin\AppData\Local\Temp\11E8.tmp"81⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\12B3.tmp"C:\Users\Admin\AppData\Local\Temp\12B3.tmp"82⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\1330.tmp"C:\Users\Admin\AppData\Local\Temp\1330.tmp"83⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\14B7.tmp"C:\Users\Admin\AppData\Local\Temp\14B7.tmp"84⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\15A1.tmp"C:\Users\Admin\AppData\Local\Temp\15A1.tmp"85⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\162E.tmp"C:\Users\Admin\AppData\Local\Temp\162E.tmp"86⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\1709.tmp"C:\Users\Admin\AppData\Local\Temp\1709.tmp"87⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\17B4.tmp"C:\Users\Admin\AppData\Local\Temp\17B4.tmp"88⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\1831.tmp"C:\Users\Admin\AppData\Local\Temp\1831.tmp"89⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\18AE.tmp"C:\Users\Admin\AppData\Local\Temp\18AE.tmp"90⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"91⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\1D33.tmp"C:\Users\Admin\AppData\Local\Temp\1D33.tmp"92⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\1DBF.tmp"C:\Users\Admin\AppData\Local\Temp\1DBF.tmp"93⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\1E5C.tmp"C:\Users\Admin\AppData\Local\Temp\1E5C.tmp"94⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\1F07.tmp"C:\Users\Admin\AppData\Local\Temp\1F07.tmp"95⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\1F94.tmp"C:\Users\Admin\AppData\Local\Temp\1F94.tmp"96⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\20CD.tmp"C:\Users\Admin\AppData\Local\Temp\20CD.tmp"97⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\2159.tmp"C:\Users\Admin\AppData\Local\Temp\2159.tmp"98⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\21E6.tmp"C:\Users\Admin\AppData\Local\Temp\21E6.tmp"99⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\2263.tmp"C:\Users\Admin\AppData\Local\Temp\2263.tmp"100⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\232E.tmp"C:\Users\Admin\AppData\Local\Temp\232E.tmp"101⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\23BB.tmp"C:\Users\Admin\AppData\Local\Temp\23BB.tmp"102⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\2447.tmp"C:\Users\Admin\AppData\Local\Temp\2447.tmp"103⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\24F3.tmp"C:\Users\Admin\AppData\Local\Temp\24F3.tmp"104⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\2570.tmp"C:\Users\Admin\AppData\Local\Temp\2570.tmp"105⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\25FD.tmp"C:\Users\Admin\AppData\Local\Temp\25FD.tmp"106⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\2689.tmp"C:\Users\Admin\AppData\Local\Temp\2689.tmp"107⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\2800.tmp"C:\Users\Admin\AppData\Local\Temp\2800.tmp"108⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\288D.tmp"C:\Users\Admin\AppData\Local\Temp\288D.tmp"109⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\28FA.tmp"C:\Users\Admin\AppData\Local\Temp\28FA.tmp"110⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\2987.tmp"C:\Users\Admin\AppData\Local\Temp\2987.tmp"111⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\2C85.tmp"C:\Users\Admin\AppData\Local\Temp\2C85.tmp"112⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\2D11.tmp"C:\Users\Admin\AppData\Local\Temp\2D11.tmp"113⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\2DCD.tmp"C:\Users\Admin\AppData\Local\Temp\2DCD.tmp"114⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\2E69.tmp"C:\Users\Admin\AppData\Local\Temp\2E69.tmp"115⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2F05.tmp"C:\Users\Admin\AppData\Local\Temp\2F05.tmp"116⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\2FC1.tmp"C:\Users\Admin\AppData\Local\Temp\2FC1.tmp"117⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3138.tmp"C:\Users\Admin\AppData\Local\Temp\3138.tmp"118⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\31C4.tmp"C:\Users\Admin\AppData\Local\Temp\31C4.tmp"119⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\337A.tmp"C:\Users\Admin\AppData\Local\Temp\337A.tmp"120⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\3639.tmp"C:\Users\Admin\AppData\Local\Temp\3639.tmp"121⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\387B.tmp"C:\Users\Admin\AppData\Local\Temp\387B.tmp"122⤵PID:1096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-