Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 15:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe
-
Size
486KB
-
MD5
c56fc475caa7d513e5a2b158a674c397
-
SHA1
11ea6652527c9ed028208a4901bf09b98cb0034f
-
SHA256
eac25d7ad4375e73eb019aca0d067c341bd5af49b258d80fb1e0b7f47d21a24b
-
SHA512
4977f190e47238892cd0ecab15f96390617b30372c05b19899aac55c2bb94751a88f4417f74386c8389176aecc170da7210fd23d2b5397d7afbe229c4dd13deb
-
SSDEEP
12288:/U5rCOTeiDxiL+HYLOtfHkIx7cLeOXxNZ:/UQOJD0KHYLWkIxILdhN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4436 BBDE.tmp 1860 BFC6.tmp 4916 C1C9.tmp 4032 C350.tmp 4468 C525.tmp 4512 C5E0.tmp 1028 C69C.tmp 4480 C757.tmp 1520 C7F3.tmp 1140 C8AF.tmp 4684 C999.tmp 2008 CA26.tmp 2732 CAE1.tmp 2924 CB5E.tmp 2872 CC49.tmp 4544 CD62.tmp 3776 CE5C.tmp 5100 CF27.tmp 3020 D031.tmp 4836 D10B.tmp 4752 D205.tmp 2212 D2A2.tmp 4780 D39C.tmp 4592 D467.tmp 2616 D542.tmp 3340 D61C.tmp 3132 D716.tmp 228 D820.tmp 3256 D8EB.tmp 2160 DAB0.tmp 3604 DB8B.tmp 2540 DC46.tmp 804 DD21.tmp 4688 DDCD.tmp 4464 DE3A.tmp 4188 DEB7.tmp 3332 E00F.tmp 4272 E167.tmp 1332 E1F4.tmp 3784 E271.tmp 1832 E3D8.tmp 2868 E455.tmp 1688 E4C2.tmp 3428 E530.tmp 1696 E6A7.tmp 2328 E724.tmp 1904 E791.tmp 2380 E80E.tmp 4032 E8E9.tmp 1160 E966.tmp 676 E9E3.tmp 4876 EA8F.tmp 1028 EB2B.tmp 3676 EBA8.tmp 1520 EC35.tmp 1280 EC92.tmp 648 EDAC.tmp 3652 EE48.tmp 3040 EEE4.tmp 5036 EF61.tmp 2924 F05B.tmp 404 F0C8.tmp 1552 F145.tmp 3140 F201.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4436 4784 NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe 91 PID 4784 wrote to memory of 4436 4784 NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe 91 PID 4784 wrote to memory of 4436 4784 NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe 91 PID 4436 wrote to memory of 1860 4436 BBDE.tmp 92 PID 4436 wrote to memory of 1860 4436 BBDE.tmp 92 PID 4436 wrote to memory of 1860 4436 BBDE.tmp 92 PID 1860 wrote to memory of 4916 1860 BFC6.tmp 93 PID 1860 wrote to memory of 4916 1860 BFC6.tmp 93 PID 1860 wrote to memory of 4916 1860 BFC6.tmp 93 PID 4916 wrote to memory of 4032 4916 C1C9.tmp 94 PID 4916 wrote to memory of 4032 4916 C1C9.tmp 94 PID 4916 wrote to memory of 4032 4916 C1C9.tmp 94 PID 4032 wrote to memory of 4468 4032 C350.tmp 95 PID 4032 wrote to memory of 4468 4032 C350.tmp 95 PID 4032 wrote to memory of 4468 4032 C350.tmp 95 PID 4468 wrote to memory of 4512 4468 C525.tmp 96 PID 4468 wrote to memory of 4512 4468 C525.tmp 96 PID 4468 wrote to memory of 4512 4468 C525.tmp 96 PID 4512 wrote to memory of 1028 4512 C5E0.tmp 97 PID 4512 wrote to memory of 1028 4512 C5E0.tmp 97 PID 4512 wrote to memory of 1028 4512 C5E0.tmp 97 PID 1028 wrote to memory of 4480 1028 C69C.tmp 98 PID 1028 wrote to memory of 4480 1028 C69C.tmp 98 PID 1028 wrote to memory of 4480 1028 C69C.tmp 98 PID 4480 wrote to memory of 1520 4480 C757.tmp 99 PID 4480 wrote to memory of 1520 4480 C757.tmp 99 PID 4480 wrote to memory of 1520 4480 C757.tmp 99 PID 1520 wrote to memory of 1140 1520 C7F3.tmp 100 PID 1520 wrote to memory of 1140 1520 C7F3.tmp 100 PID 1520 wrote to memory of 1140 1520 C7F3.tmp 100 PID 1140 wrote to memory of 4684 1140 C8AF.tmp 101 PID 1140 wrote to memory of 4684 1140 C8AF.tmp 101 PID 1140 wrote to memory of 4684 1140 C8AF.tmp 101 PID 4684 wrote to memory of 2008 4684 C999.tmp 102 PID 4684 wrote to memory of 2008 4684 C999.tmp 102 PID 4684 wrote to memory of 2008 4684 C999.tmp 102 PID 2008 wrote to memory of 2732 2008 CA26.tmp 103 PID 2008 wrote to memory of 2732 2008 CA26.tmp 103 PID 2008 wrote to memory of 2732 2008 CA26.tmp 103 PID 2732 wrote to memory of 2924 2732 CAE1.tmp 104 PID 2732 wrote to memory of 2924 2732 CAE1.tmp 104 PID 2732 wrote to memory of 2924 2732 CAE1.tmp 104 PID 2924 wrote to memory of 2872 2924 CB5E.tmp 105 PID 2924 wrote to memory of 2872 2924 CB5E.tmp 105 PID 2924 wrote to memory of 2872 2924 CB5E.tmp 105 PID 2872 wrote to memory of 4544 2872 CC49.tmp 106 PID 2872 wrote to memory of 4544 2872 CC49.tmp 106 PID 2872 wrote to memory of 4544 2872 CC49.tmp 106 PID 4544 wrote to memory of 3776 4544 CD62.tmp 107 PID 4544 wrote to memory of 3776 4544 CD62.tmp 107 PID 4544 wrote to memory of 3776 4544 CD62.tmp 107 PID 3776 wrote to memory of 5100 3776 CE5C.tmp 108 PID 3776 wrote to memory of 5100 3776 CE5C.tmp 108 PID 3776 wrote to memory of 5100 3776 CE5C.tmp 108 PID 5100 wrote to memory of 3020 5100 CF27.tmp 109 PID 5100 wrote to memory of 3020 5100 CF27.tmp 109 PID 5100 wrote to memory of 3020 5100 CF27.tmp 109 PID 3020 wrote to memory of 4836 3020 D031.tmp 110 PID 3020 wrote to memory of 4836 3020 D031.tmp 110 PID 3020 wrote to memory of 4836 3020 D031.tmp 110 PID 4836 wrote to memory of 4752 4836 D10B.tmp 111 PID 4836 wrote to memory of 4752 4836 D10B.tmp 111 PID 4836 wrote to memory of 4752 4836 D10B.tmp 111 PID 4752 wrote to memory of 2212 4752 D205.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-26_c56fc475caa7d513e5a2b158a674c397_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\C350.tmp"C:\Users\Admin\AppData\Local\Temp\C350.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\C525.tmp"C:\Users\Admin\AppData\Local\Temp\C525.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\C69C.tmp"C:\Users\Admin\AppData\Local\Temp\C69C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\CA26.tmp"C:\Users\Admin\AppData\Local\Temp\CA26.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\CC49.tmp"C:\Users\Admin\AppData\Local\Temp\CC49.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\D205.tmp"C:\Users\Admin\AppData\Local\Temp\D205.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"23⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"24⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"25⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\D542.tmp"C:\Users\Admin\AppData\Local\Temp\D542.tmp"26⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"27⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\D716.tmp"C:\Users\Admin\AppData\Local\Temp\D716.tmp"28⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"29⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"30⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"31⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"32⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"33⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"34⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"35⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"36⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"37⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"38⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"39⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"40⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\E271.tmp"C:\Users\Admin\AppData\Local\Temp\E271.tmp"41⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"42⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"43⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"44⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"45⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"46⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"47⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"48⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"49⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\E80E.tmp"C:\Users\Admin\AppData\Local\Temp\E80E.tmp"50⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\E8E9.tmp"C:\Users\Admin\AppData\Local\Temp\E8E9.tmp"51⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\E966.tmp"C:\Users\Admin\AppData\Local\Temp\E966.tmp"52⤵
- Executes dropped EXE
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"C:\Users\Admin\AppData\Local\Temp\E9E3.tmp"53⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"54⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"55⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"56⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"57⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"58⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"59⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\EE48.tmp"C:\Users\Admin\AppData\Local\Temp\EE48.tmp"60⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"61⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\EF61.tmp"C:\Users\Admin\AppData\Local\Temp\EF61.tmp"62⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\F05B.tmp"C:\Users\Admin\AppData\Local\Temp\F05B.tmp"63⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"64⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"65⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\F201.tmp"C:\Users\Admin\AppData\Local\Temp\F201.tmp"66⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"67⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\F30B.tmp"C:\Users\Admin\AppData\Local\Temp\F30B.tmp"68⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"69⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"70⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"71⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"72⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"73⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\F78F.tmp"C:\Users\Admin\AppData\Local\Temp\F78F.tmp"74⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"75⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"76⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\FB19.tmp"C:\Users\Admin\AppData\Local\Temp\FB19.tmp"77⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"78⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"79⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"80⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"81⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\FE36.tmp"C:\Users\Admin\AppData\Local\Temp\FE36.tmp"82⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"83⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\FF20.tmp"C:\Users\Admin\AppData\Local\Temp\FF20.tmp"84⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"85⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\3A.tmp"C:\Users\Admin\AppData\Local\Temp\3A.tmp"86⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"87⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"88⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"89⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"90⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"91⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"92⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"93⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\4DD.tmp"C:\Users\Admin\AppData\Local\Temp\4DD.tmp"94⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"95⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\616.tmp"C:\Users\Admin\AppData\Local\Temp\616.tmp"96⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\6A2.tmp"C:\Users\Admin\AppData\Local\Temp\6A2.tmp"97⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"98⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"99⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"100⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"101⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"102⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"103⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"104⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"105⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"106⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"107⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\D3A.tmp"C:\Users\Admin\AppData\Local\Temp\D3A.tmp"108⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"109⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"110⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\EFF.tmp"C:\Users\Admin\AppData\Local\Temp\EFF.tmp"111⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"112⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"113⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"114⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"115⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"116⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"117⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\12B8.tmp"C:\Users\Admin\AppData\Local\Temp\12B8.tmp"118⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"119⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"120⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"121⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\1577.tmp"C:\Users\Admin\AppData\Local\Temp\1577.tmp"122⤵PID:2632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-