Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 23:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe
Resource
win7-20240419-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe
-
Size
520KB
-
MD5
0b8f60ac908bfe63c5f059d7da88ef70
-
SHA1
689cdea3d03c2808e79fe588c506d06e26b240a5
-
SHA256
f88e79015351b0224c1015bb121cae65f01d95db3e86d1d0b70cb719bdae0761
-
SHA512
21a57467623c25a89a5d41f11619f195ed352fe23c2bf5d38d468bb48591cb0a609d2e70dde26e460db62ab7a4024b87a244a587fc6314cd967c3f8f65f3426a
-
SSDEEP
12288:roRXOQjmOy7gI1OO0Qmdn4DMfHK30M/N/glhfNZ:rogQ9y7TK1dn4CC/NWhfN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4740 10D4.tmp 1436 120C.tmp 4672 1345.tmp 1616 13F0.tmp 2760 14CB.tmp 2800 1596.tmp 3604 16B0.tmp 1108 1C2E.tmp 432 1CE9.tmp 3912 1E51.tmp 212 1F1C.tmp 2020 2064.tmp 4344 211F.tmp 1124 21DB.tmp 4496 22E5.tmp 2908 2390.tmp 3992 249A.tmp 2720 2601.tmp 4956 267E.tmp 1940 2759.tmp 2788 2824.tmp 2596 292E.tmp 3984 29CA.tmp 3324 2A86.tmp 1844 2B32.tmp 5080 2BDD.tmp 4368 2CA9.tmp 4776 2D83.tmp 4236 2E20.tmp 1420 2ECB.tmp 392 2F87.tmp 1120 3052.tmp 3192 311D.tmp 4608 319A.tmp 2856 3265.tmp 2440 32E2.tmp 4408 336F.tmp 4376 340B.tmp 3824 3498.tmp 376 3553.tmp 3148 35D0.tmp 4076 365D.tmp 5012 36F9.tmp 3080 3803.tmp 1960 38ED.tmp 4672 3A35.tmp 2916 3B5E.tmp 4424 3C58.tmp 4028 3DCF.tmp 3456 3F08.tmp 4268 407F.tmp 2104 4205.tmp 2476 431F.tmp 800 43F9.tmp 4048 4503.tmp 1172 461C.tmp 4456 46D8.tmp 4344 4793.tmp 1400 486E.tmp 4496 4958.tmp 2296 49E5.tmp 1708 4A81.tmp 1148 4B6C.tmp 4584 4C27.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4740 2468 0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe 91 PID 2468 wrote to memory of 4740 2468 0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe 91 PID 2468 wrote to memory of 4740 2468 0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe 91 PID 4740 wrote to memory of 1436 4740 10D4.tmp 92 PID 4740 wrote to memory of 1436 4740 10D4.tmp 92 PID 4740 wrote to memory of 1436 4740 10D4.tmp 92 PID 1436 wrote to memory of 4672 1436 120C.tmp 93 PID 1436 wrote to memory of 4672 1436 120C.tmp 93 PID 1436 wrote to memory of 4672 1436 120C.tmp 93 PID 4672 wrote to memory of 1616 4672 1345.tmp 94 PID 4672 wrote to memory of 1616 4672 1345.tmp 94 PID 4672 wrote to memory of 1616 4672 1345.tmp 94 PID 1616 wrote to memory of 2760 1616 13F0.tmp 95 PID 1616 wrote to memory of 2760 1616 13F0.tmp 95 PID 1616 wrote to memory of 2760 1616 13F0.tmp 95 PID 2760 wrote to memory of 2800 2760 14CB.tmp 96 PID 2760 wrote to memory of 2800 2760 14CB.tmp 96 PID 2760 wrote to memory of 2800 2760 14CB.tmp 96 PID 2800 wrote to memory of 3604 2800 1596.tmp 97 PID 2800 wrote to memory of 3604 2800 1596.tmp 97 PID 2800 wrote to memory of 3604 2800 1596.tmp 97 PID 3604 wrote to memory of 1108 3604 16B0.tmp 98 PID 3604 wrote to memory of 1108 3604 16B0.tmp 98 PID 3604 wrote to memory of 1108 3604 16B0.tmp 98 PID 1108 wrote to memory of 432 1108 1C2E.tmp 99 PID 1108 wrote to memory of 432 1108 1C2E.tmp 99 PID 1108 wrote to memory of 432 1108 1C2E.tmp 99 PID 432 wrote to memory of 3912 432 1CE9.tmp 100 PID 432 wrote to memory of 3912 432 1CE9.tmp 100 PID 432 wrote to memory of 3912 432 1CE9.tmp 100 PID 3912 wrote to memory of 212 3912 1E51.tmp 101 PID 3912 wrote to memory of 212 3912 1E51.tmp 101 PID 3912 wrote to memory of 212 3912 1E51.tmp 101 PID 212 wrote to memory of 2020 212 1F1C.tmp 102 PID 212 wrote to memory of 2020 212 1F1C.tmp 102 PID 212 wrote to memory of 2020 212 1F1C.tmp 102 PID 2020 wrote to memory of 4344 2020 2064.tmp 103 PID 2020 wrote to memory of 4344 2020 2064.tmp 103 PID 2020 wrote to memory of 4344 2020 2064.tmp 103 PID 4344 wrote to memory of 1124 4344 211F.tmp 104 PID 4344 wrote to memory of 1124 4344 211F.tmp 104 PID 4344 wrote to memory of 1124 4344 211F.tmp 104 PID 1124 wrote to memory of 4496 1124 21DB.tmp 105 PID 1124 wrote to memory of 4496 1124 21DB.tmp 105 PID 1124 wrote to memory of 4496 1124 21DB.tmp 105 PID 4496 wrote to memory of 2908 4496 22E5.tmp 106 PID 4496 wrote to memory of 2908 4496 22E5.tmp 106 PID 4496 wrote to memory of 2908 4496 22E5.tmp 106 PID 2908 wrote to memory of 3992 2908 2390.tmp 107 PID 2908 wrote to memory of 3992 2908 2390.tmp 107 PID 2908 wrote to memory of 3992 2908 2390.tmp 107 PID 3992 wrote to memory of 2720 3992 249A.tmp 108 PID 3992 wrote to memory of 2720 3992 249A.tmp 108 PID 3992 wrote to memory of 2720 3992 249A.tmp 108 PID 2720 wrote to memory of 4956 2720 2601.tmp 109 PID 2720 wrote to memory of 4956 2720 2601.tmp 109 PID 2720 wrote to memory of 4956 2720 2601.tmp 109 PID 4956 wrote to memory of 1940 4956 267E.tmp 110 PID 4956 wrote to memory of 1940 4956 267E.tmp 110 PID 4956 wrote to memory of 1940 4956 267E.tmp 110 PID 1940 wrote to memory of 2788 1940 2759.tmp 111 PID 1940 wrote to memory of 2788 1940 2759.tmp 111 PID 1940 wrote to memory of 2788 1940 2759.tmp 111 PID 2788 wrote to memory of 2596 2788 2824.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0b8f60ac908bfe63c5f059d7da88ef70_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\14CB.tmp"C:\Users\Admin\AppData\Local\Temp\14CB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\16B0.tmp"C:\Users\Admin\AppData\Local\Temp\16B0.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\1C2E.tmp"C:\Users\Admin\AppData\Local\Temp\1C2E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\1E51.tmp"C:\Users\Admin\AppData\Local\Temp\1E51.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\2064.tmp"C:\Users\Admin\AppData\Local\Temp\2064.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\211F.tmp"C:\Users\Admin\AppData\Local\Temp\211F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\2390.tmp"C:\Users\Admin\AppData\Local\Temp\2390.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\2601.tmp"C:\Users\Admin\AppData\Local\Temp\2601.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\292E.tmp"C:\Users\Admin\AppData\Local\Temp\292E.tmp"23⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"24⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\2A86.tmp"C:\Users\Admin\AppData\Local\Temp\2A86.tmp"25⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"26⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"27⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"28⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\2D83.tmp"C:\Users\Admin\AppData\Local\Temp\2D83.tmp"29⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"30⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"C:\Users\Admin\AppData\Local\Temp\2ECB.tmp"31⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"32⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"33⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"34⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"35⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\3265.tmp"C:\Users\Admin\AppData\Local\Temp\3265.tmp"36⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"37⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"38⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"39⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"40⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"41⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"42⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"43⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"44⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"45⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"46⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3A35.tmp"C:\Users\Admin\AppData\Local\Temp\3A35.tmp"47⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"48⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"49⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"50⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"51⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"52⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\4205.tmp"C:\Users\Admin\AppData\Local\Temp\4205.tmp"53⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"54⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\43F9.tmp"C:\Users\Admin\AppData\Local\Temp\43F9.tmp"55⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\4503.tmp"C:\Users\Admin\AppData\Local\Temp\4503.tmp"56⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"57⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"58⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\4793.tmp"C:\Users\Admin\AppData\Local\Temp\4793.tmp"59⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"60⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"61⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"62⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"63⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"64⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\4C27.tmp"C:\Users\Admin\AppData\Local\Temp\4C27.tmp"65⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"C:\Users\Admin\AppData\Local\Temp\4CA4.tmp"66⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"67⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\4DBD.tmp"C:\Users\Admin\AppData\Local\Temp\4DBD.tmp"68⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\4E79.tmp"C:\Users\Admin\AppData\Local\Temp\4E79.tmp"69⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp"70⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\4FA2.tmp"C:\Users\Admin\AppData\Local\Temp\4FA2.tmp"71⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\501F.tmp"C:\Users\Admin\AppData\Local\Temp\501F.tmp"72⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\50CB.tmp"C:\Users\Admin\AppData\Local\Temp\50CB.tmp"73⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\5196.tmp"C:\Users\Admin\AppData\Local\Temp\5196.tmp"74⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"75⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"76⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\537A.tmp"C:\Users\Admin\AppData\Local\Temp\537A.tmp"77⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"78⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\54A3.tmp"C:\Users\Admin\AppData\Local\Temp\54A3.tmp"79⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\555E.tmp"C:\Users\Admin\AppData\Local\Temp\555E.tmp"80⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\560A.tmp"C:\Users\Admin\AppData\Local\Temp\560A.tmp"81⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"82⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\57B0.tmp"C:\Users\Admin\AppData\Local\Temp\57B0.tmp"83⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\58AA.tmp"C:\Users\Admin\AppData\Local\Temp\58AA.tmp"84⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"85⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"86⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"87⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\5B69.tmp"C:\Users\Admin\AppData\Local\Temp\5B69.tmp"88⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"89⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"C:\Users\Admin\AppData\Local\Temp\5CA2.tmp"90⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"91⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"92⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"93⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\5F61.tmp"C:\Users\Admin\AppData\Local\Temp\5F61.tmp"94⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"95⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\607A.tmp"C:\Users\Admin\AppData\Local\Temp\607A.tmp"96⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"97⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"98⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\624F.tmp"C:\Users\Admin\AppData\Local\Temp\624F.tmp"99⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\62DC.tmp"C:\Users\Admin\AppData\Local\Temp\62DC.tmp"100⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\6368.tmp"C:\Users\Admin\AppData\Local\Temp\6368.tmp"101⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\6404.tmp"C:\Users\Admin\AppData\Local\Temp\6404.tmp"102⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\6491.tmp"C:\Users\Admin\AppData\Local\Temp\6491.tmp"103⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\655C.tmp"C:\Users\Admin\AppData\Local\Temp\655C.tmp"104⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\65D9.tmp"C:\Users\Admin\AppData\Local\Temp\65D9.tmp"105⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"106⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\6741.tmp"C:\Users\Admin\AppData\Local\Temp\6741.tmp"107⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\67DD.tmp"C:\Users\Admin\AppData\Local\Temp\67DD.tmp"108⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"109⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\6915.tmp"C:\Users\Admin\AppData\Local\Temp\6915.tmp"110⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\69A2.tmp"C:\Users\Admin\AppData\Local\Temp\69A2.tmp"111⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"112⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\6AAC.tmp"C:\Users\Admin\AppData\Local\Temp\6AAC.tmp"113⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\6B57.tmp"C:\Users\Admin\AppData\Local\Temp\6B57.tmp"114⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"115⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"116⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"C:\Users\Admin\AppData\Local\Temp\6CFD.tmp"117⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"118⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\6E17.tmp"C:\Users\Admin\AppData\Local\Temp\6E17.tmp"119⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"120⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"121⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"122⤵PID:4164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-