Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2023 11:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
General
-
Target
55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe
-
Size
527KB
-
MD5
55dc9b178aaecbfb07e56a9b8c50114c
-
SHA1
fa82a469ed4e9a9cdde528393c6852214bcc9a43
-
SHA256
7c3b754a13dc5a7f19cba5ff48547decb6ab46ed4770eb92cfc0958b172a15d4
-
SHA512
124155e91082bd6db9db2f200b5b6d16b4c0f3100a2f8ede679a0db8e7da769c83e8234e21528acc3c198f1932baf2870bb58aa56322c9550067c50dcea48813
-
SSDEEP
12288:fU5rCOTeid68wKd3WZnz5U6z+3BUsShLIj61Y8xNrlqDZu:fUQOJd8zq6zciLIIYONrUDo
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/files/0x00060000000231f5-191.dat family_anchor_dns behavioral2/files/0x00060000000231f5-192.dat family_anchor_dns -
Executes dropped EXE 64 IoCs
pid Process 4460 1940.tmp 2716 1A2A.tmp 2772 1B34.tmp 1748 1C5D.tmp 1808 1D37.tmp 1944 1E03.tmp 5108 1ECE.tmp 2008 1FB8.tmp 5056 2054.tmp 3376 214E.tmp 2860 2229.tmp 4152 22E5.tmp 2204 23CF.tmp 5012 248A.tmp 4400 2565.tmp 3040 2621.tmp 3472 270B.tmp 3204 2815.tmp 2648 28FF.tmp 2452 29DA.tmp 2524 2AC4.tmp 4976 2BAF.tmp 1480 2C99.tmp 5036 2D83.tmp 4740 2E3F.tmp 3784 2EFA.tmp 4584 2FE5.tmp 2240 314C.tmp 4972 3256.tmp 3768 337F.tmp 1136 34A7.tmp 2368 35C1.tmp 1660 366D.tmp 1492 3709.tmp 3856 37A5.tmp 2912 3851.tmp 3516 38ED.tmp 4640 3989.tmp 368 3A45.tmp 3620 3B20.tmp 1128 3BEB.tmp 5004 3CB6.tmp 2612 3D43.tmp 224 3DDF.tmp 3728 3E7B.tmp 2732 3F27.tmp 1212 3FF2.tmp 3112 409E.tmp 888 4169.tmp 2848 4225.tmp 3688 42B1.tmp 644 434D.tmp 4736 43EA.tmp 1804 4476.tmp 3732 4503.tmp 3348 4590.tmp 4408 461C.tmp 4704 46A9.tmp 2312 4726.tmp 380 47E1.tmp 5024 486E.tmp 1080 48FB.tmp 3820 4987.tmp 5056 4B4C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 4460 3804 55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe 80 PID 3804 wrote to memory of 4460 3804 55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe 80 PID 3804 wrote to memory of 4460 3804 55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe 80 PID 4460 wrote to memory of 2716 4460 1940.tmp 81 PID 4460 wrote to memory of 2716 4460 1940.tmp 81 PID 4460 wrote to memory of 2716 4460 1940.tmp 81 PID 2716 wrote to memory of 2772 2716 1A2A.tmp 82 PID 2716 wrote to memory of 2772 2716 1A2A.tmp 82 PID 2716 wrote to memory of 2772 2716 1A2A.tmp 82 PID 2772 wrote to memory of 1748 2772 1B34.tmp 83 PID 2772 wrote to memory of 1748 2772 1B34.tmp 83 PID 2772 wrote to memory of 1748 2772 1B34.tmp 83 PID 1748 wrote to memory of 1808 1748 1C5D.tmp 84 PID 1748 wrote to memory of 1808 1748 1C5D.tmp 84 PID 1748 wrote to memory of 1808 1748 1C5D.tmp 84 PID 1808 wrote to memory of 1944 1808 1D37.tmp 85 PID 1808 wrote to memory of 1944 1808 1D37.tmp 85 PID 1808 wrote to memory of 1944 1808 1D37.tmp 85 PID 1944 wrote to memory of 5108 1944 1E03.tmp 86 PID 1944 wrote to memory of 5108 1944 1E03.tmp 86 PID 1944 wrote to memory of 5108 1944 1E03.tmp 86 PID 5108 wrote to memory of 2008 5108 1ECE.tmp 88 PID 5108 wrote to memory of 2008 5108 1ECE.tmp 88 PID 5108 wrote to memory of 2008 5108 1ECE.tmp 88 PID 2008 wrote to memory of 5056 2008 1FB8.tmp 89 PID 2008 wrote to memory of 5056 2008 1FB8.tmp 89 PID 2008 wrote to memory of 5056 2008 1FB8.tmp 89 PID 5056 wrote to memory of 3376 5056 2054.tmp 90 PID 5056 wrote to memory of 3376 5056 2054.tmp 90 PID 5056 wrote to memory of 3376 5056 2054.tmp 90 PID 3376 wrote to memory of 2860 3376 214E.tmp 91 PID 3376 wrote to memory of 2860 3376 214E.tmp 91 PID 3376 wrote to memory of 2860 3376 214E.tmp 91 PID 2860 wrote to memory of 4152 2860 2229.tmp 92 PID 2860 wrote to memory of 4152 2860 2229.tmp 92 PID 2860 wrote to memory of 4152 2860 2229.tmp 92 PID 4152 wrote to memory of 2204 4152 22E5.tmp 93 PID 4152 wrote to memory of 2204 4152 22E5.tmp 93 PID 4152 wrote to memory of 2204 4152 22E5.tmp 93 PID 2204 wrote to memory of 5012 2204 23CF.tmp 94 PID 2204 wrote to memory of 5012 2204 23CF.tmp 94 PID 2204 wrote to memory of 5012 2204 23CF.tmp 94 PID 5012 wrote to memory of 4400 5012 248A.tmp 95 PID 5012 wrote to memory of 4400 5012 248A.tmp 95 PID 5012 wrote to memory of 4400 5012 248A.tmp 95 PID 4400 wrote to memory of 3040 4400 2565.tmp 98 PID 4400 wrote to memory of 3040 4400 2565.tmp 98 PID 4400 wrote to memory of 3040 4400 2565.tmp 98 PID 3040 wrote to memory of 3472 3040 2621.tmp 99 PID 3040 wrote to memory of 3472 3040 2621.tmp 99 PID 3040 wrote to memory of 3472 3040 2621.tmp 99 PID 3472 wrote to memory of 3204 3472 270B.tmp 100 PID 3472 wrote to memory of 3204 3472 270B.tmp 100 PID 3472 wrote to memory of 3204 3472 270B.tmp 100 PID 3204 wrote to memory of 2648 3204 2815.tmp 101 PID 3204 wrote to memory of 2648 3204 2815.tmp 101 PID 3204 wrote to memory of 2648 3204 2815.tmp 101 PID 2648 wrote to memory of 2452 2648 28FF.tmp 102 PID 2648 wrote to memory of 2452 2648 28FF.tmp 102 PID 2648 wrote to memory of 2452 2648 28FF.tmp 102 PID 2452 wrote to memory of 2524 2452 29DA.tmp 104 PID 2452 wrote to memory of 2524 2452 29DA.tmp 104 PID 2452 wrote to memory of 2524 2452 29DA.tmp 104 PID 2524 wrote to memory of 4976 2524 2AC4.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\55dc9b178aaecbfb07e56a9b8c50114c_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1B34.tmp"C:\Users\Admin\AppData\Local\Temp\1B34.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\2054.tmp"C:\Users\Admin\AppData\Local\Temp\2054.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\2229.tmp"C:\Users\Admin\AppData\Local\Temp\2229.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\248A.tmp"C:\Users\Admin\AppData\Local\Temp\248A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\2565.tmp"C:\Users\Admin\AppData\Local\Temp\2565.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\2621.tmp"C:\Users\Admin\AppData\Local\Temp\2621.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\2815.tmp"C:\Users\Admin\AppData\Local\Temp\2815.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\28FF.tmp"C:\Users\Admin\AppData\Local\Temp\28FF.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"23⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\2C99.tmp"C:\Users\Admin\AppData\Local\Temp\2C99.tmp"24⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\2D83.tmp"C:\Users\Admin\AppData\Local\Temp\2D83.tmp"25⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"26⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"27⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"28⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\314C.tmp"C:\Users\Admin\AppData\Local\Temp\314C.tmp"29⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\3256.tmp"C:\Users\Admin\AppData\Local\Temp\3256.tmp"30⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"31⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"32⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"33⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\366D.tmp"C:\Users\Admin\AppData\Local\Temp\366D.tmp"34⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"35⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\37A5.tmp"C:\Users\Admin\AppData\Local\Temp\37A5.tmp"36⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\3851.tmp"C:\Users\Admin\AppData\Local\Temp\3851.tmp"37⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"38⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"39⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"40⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"41⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"42⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"43⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"44⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"45⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"46⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\3F27.tmp"C:\Users\Admin\AppData\Local\Temp\3F27.tmp"47⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"48⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"49⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"50⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\4225.tmp"C:\Users\Admin\AppData\Local\Temp\4225.tmp"51⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"52⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"53⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\43EA.tmp"C:\Users\Admin\AppData\Local\Temp\43EA.tmp"54⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\4476.tmp"C:\Users\Admin\AppData\Local\Temp\4476.tmp"55⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\4503.tmp"C:\Users\Admin\AppData\Local\Temp\4503.tmp"56⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"57⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"58⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\46A9.tmp"C:\Users\Admin\AppData\Local\Temp\46A9.tmp"59⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\4726.tmp"C:\Users\Admin\AppData\Local\Temp\4726.tmp"60⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\47E1.tmp"C:\Users\Admin\AppData\Local\Temp\47E1.tmp"61⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"62⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"63⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"64⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"65⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"66⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"67⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"C:\Users\Admin\AppData\Local\Temp\4CF2.tmp"68⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"69⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\4E3A.tmp"C:\Users\Admin\AppData\Local\Temp\4E3A.tmp"70⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"71⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp"72⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"73⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\505D.tmp"C:\Users\Admin\AppData\Local\Temp\505D.tmp"74⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\50DA.tmp"C:\Users\Admin\AppData\Local\Temp\50DA.tmp"75⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"76⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\51E4.tmp"C:\Users\Admin\AppData\Local\Temp\51E4.tmp"77⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\5270.tmp"C:\Users\Admin\AppData\Local\Temp\5270.tmp"78⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\52FD.tmp"C:\Users\Admin\AppData\Local\Temp\52FD.tmp"79⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"80⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\5464.tmp"C:\Users\Admin\AppData\Local\Temp\5464.tmp"81⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"82⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\559D.tmp"C:\Users\Admin\AppData\Local\Temp\559D.tmp"83⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"84⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"85⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"86⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\57FE.tmp"C:\Users\Admin\AppData\Local\Temp\57FE.tmp"87⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"88⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"89⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"90⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"91⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"92⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"93⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\5C54.tmp"C:\Users\Admin\AppData\Local\Temp\5C54.tmp"94⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"95⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"96⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\5E86.tmp"C:\Users\Admin\AppData\Local\Temp\5E86.tmp"97⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\5F51.tmp"C:\Users\Admin\AppData\Local\Temp\5F51.tmp"98⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"99⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\6099.tmp"C:\Users\Admin\AppData\Local\Temp\6099.tmp"100⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"101⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\61E2.tmp"C:\Users\Admin\AppData\Local\Temp\61E2.tmp"102⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"103⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\6359.tmp"C:\Users\Admin\AppData\Local\Temp\6359.tmp"104⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"105⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\64B0.tmp"C:\Users\Admin\AppData\Local\Temp\64B0.tmp"106⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\656C.tmp"C:\Users\Admin\AppData\Local\Temp\656C.tmp"107⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\6627.tmp"C:\Users\Admin\AppData\Local\Temp\6627.tmp"108⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\66B4.tmp"C:\Users\Admin\AppData\Local\Temp\66B4.tmp"109⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\6760.tmp"C:\Users\Admin\AppData\Local\Temp\6760.tmp"110⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"111⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\68C7.tmp"C:\Users\Admin\AppData\Local\Temp\68C7.tmp"112⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"113⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"114⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\6B38.tmp"C:\Users\Admin\AppData\Local\Temp\6B38.tmp"115⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\6C13.tmp"C:\Users\Admin\AppData\Local\Temp\6C13.tmp"116⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\6C90.tmp"C:\Users\Admin\AppData\Local\Temp\6C90.tmp"117⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"118⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\6DD8.tmp"C:\Users\Admin\AppData\Local\Temp\6DD8.tmp"119⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\6E65.tmp"C:\Users\Admin\AppData\Local\Temp\6E65.tmp"120⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\6F01.tmp"C:\Users\Admin\AppData\Local\Temp\6F01.tmp"121⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\6F6E.tmp"C:\Users\Admin\AppData\Local\Temp\6F6E.tmp"122⤵PID:2736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-