Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 11:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe
-
Size
527KB
-
MD5
90d36f3ef4404867271f25058663daa5
-
SHA1
09881375560b60295cb8b4f489a7991e0ee3a760
-
SHA256
5b05987edb639cd7ed26aaecd3dd593eac04dde3acef7c6b586f76f4b0d4640d
-
SHA512
70216b4fb46f835f9478e8623b94fc9977c64bad45016b63d2a8213b31e1d2fb787655f04f3c4fed0b982ef84e33a65355875d7658f6694155b68ba642c0beaf
-
SSDEEP
12288:fU5rCOTeid8qDKql+Ha1WnkAQYE7w4CMxe5DZu:fUQOJdxKql+61WnRE8P5Do
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 3 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/files/0x0008000000023140-8.dat family_anchor_dns behavioral2/files/0x0008000000023140-11.dat family_anchor_dns behavioral2/files/0x0008000000023140-10.dat family_anchor_dns -
Executes dropped EXE 64 IoCs
pid Process 3768 1F1C.tmp 4476 1FE7.tmp 1032 20D1.tmp 2084 2248.tmp 2188 22C5.tmp 4804 2362.tmp 4696 23FE.tmp 936 248A.tmp 3592 267E.tmp 680 270B.tmp 1456 27C7.tmp 1480 2872.tmp 4672 293E.tmp 3468 29DA.tmp 1196 2A57.tmp 1436 2AD4.tmp 4452 2B70.tmp 816 2C7A.tmp 4912 2D35.tmp 5060 2E10.tmp 3904 2EDB.tmp 3676 2F97.tmp 2420 3302.tmp 1460 342A.tmp 4840 35A1.tmp 3516 364D.tmp 4816 36F9.tmp 1536 3795.tmp 456 3880.tmp 3056 390C.tmp 4596 39F7.tmp 396 3F37.tmp 216 4496.tmp 3372 6136.tmp 3404 7B84.tmp 2124 7D97.tmp 3288 7EB1.tmp 228 7F5C.tmp 1808 8316.tmp 3908 83C1.tmp 4628 844E.tmp 2396 8558.tmp 3396 8623.tmp 680 86BF.tmp 4540 873C.tmp 2644 87D8.tmp 4716 8865.tmp 2788 8911.tmp 3100 898E.tmp 4700 8A0B.tmp 4288 8AA7.tmp 1716 8B34.tmp 5060 8BA1.tmp 4148 8C0E.tmp 3620 8C9B.tmp 4040 8D08.tmp 3272 8D85.tmp 4892 8DF3.tmp 5108 8E51.tmp 3736 8ECE.tmp 1712 8F4B.tmp 3328 8FB8.tmp 1844 9025.tmp 1288 9093.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3768 4336 2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe 86 PID 4336 wrote to memory of 3768 4336 2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe 86 PID 4336 wrote to memory of 3768 4336 2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe 86 PID 3768 wrote to memory of 4476 3768 1F1C.tmp 87 PID 3768 wrote to memory of 4476 3768 1F1C.tmp 87 PID 3768 wrote to memory of 4476 3768 1F1C.tmp 87 PID 4476 wrote to memory of 1032 4476 1FE7.tmp 88 PID 4476 wrote to memory of 1032 4476 1FE7.tmp 88 PID 4476 wrote to memory of 1032 4476 1FE7.tmp 88 PID 1032 wrote to memory of 2084 1032 20D1.tmp 89 PID 1032 wrote to memory of 2084 1032 20D1.tmp 89 PID 1032 wrote to memory of 2084 1032 20D1.tmp 89 PID 2084 wrote to memory of 2188 2084 2248.tmp 90 PID 2084 wrote to memory of 2188 2084 2248.tmp 90 PID 2084 wrote to memory of 2188 2084 2248.tmp 90 PID 2188 wrote to memory of 4804 2188 22C5.tmp 91 PID 2188 wrote to memory of 4804 2188 22C5.tmp 91 PID 2188 wrote to memory of 4804 2188 22C5.tmp 91 PID 4804 wrote to memory of 4696 4804 2362.tmp 92 PID 4804 wrote to memory of 4696 4804 2362.tmp 92 PID 4804 wrote to memory of 4696 4804 2362.tmp 92 PID 4696 wrote to memory of 936 4696 23FE.tmp 93 PID 4696 wrote to memory of 936 4696 23FE.tmp 93 PID 4696 wrote to memory of 936 4696 23FE.tmp 93 PID 936 wrote to memory of 3592 936 248A.tmp 94 PID 936 wrote to memory of 3592 936 248A.tmp 94 PID 936 wrote to memory of 3592 936 248A.tmp 94 PID 3592 wrote to memory of 680 3592 267E.tmp 95 PID 3592 wrote to memory of 680 3592 267E.tmp 95 PID 3592 wrote to memory of 680 3592 267E.tmp 95 PID 680 wrote to memory of 1456 680 270B.tmp 96 PID 680 wrote to memory of 1456 680 270B.tmp 96 PID 680 wrote to memory of 1456 680 270B.tmp 96 PID 1456 wrote to memory of 1480 1456 27C7.tmp 97 PID 1456 wrote to memory of 1480 1456 27C7.tmp 97 PID 1456 wrote to memory of 1480 1456 27C7.tmp 97 PID 1480 wrote to memory of 4672 1480 2872.tmp 98 PID 1480 wrote to memory of 4672 1480 2872.tmp 98 PID 1480 wrote to memory of 4672 1480 2872.tmp 98 PID 4672 wrote to memory of 3468 4672 293E.tmp 99 PID 4672 wrote to memory of 3468 4672 293E.tmp 99 PID 4672 wrote to memory of 3468 4672 293E.tmp 99 PID 3468 wrote to memory of 1196 3468 29DA.tmp 100 PID 3468 wrote to memory of 1196 3468 29DA.tmp 100 PID 3468 wrote to memory of 1196 3468 29DA.tmp 100 PID 1196 wrote to memory of 1436 1196 2A57.tmp 101 PID 1196 wrote to memory of 1436 1196 2A57.tmp 101 PID 1196 wrote to memory of 1436 1196 2A57.tmp 101 PID 1436 wrote to memory of 4452 1436 2AD4.tmp 102 PID 1436 wrote to memory of 4452 1436 2AD4.tmp 102 PID 1436 wrote to memory of 4452 1436 2AD4.tmp 102 PID 4452 wrote to memory of 816 4452 2B70.tmp 104 PID 4452 wrote to memory of 816 4452 2B70.tmp 104 PID 4452 wrote to memory of 816 4452 2B70.tmp 104 PID 816 wrote to memory of 4912 816 2C7A.tmp 105 PID 816 wrote to memory of 4912 816 2C7A.tmp 105 PID 816 wrote to memory of 4912 816 2C7A.tmp 105 PID 4912 wrote to memory of 5060 4912 2D35.tmp 106 PID 4912 wrote to memory of 5060 4912 2D35.tmp 106 PID 4912 wrote to memory of 5060 4912 2D35.tmp 106 PID 5060 wrote to memory of 3904 5060 2E10.tmp 107 PID 5060 wrote to memory of 3904 5060 2E10.tmp 107 PID 5060 wrote to memory of 3904 5060 2E10.tmp 107 PID 3904 wrote to memory of 3676 3904 2EDB.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_90d36f3ef4404867271f25058663daa5_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\248A.tmp"C:\Users\Admin\AppData\Local\Temp\248A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\27C7.tmp"C:\Users\Admin\AppData\Local\Temp\27C7.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\2872.tmp"C:\Users\Admin\AppData\Local\Temp\2872.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\2B70.tmp"C:\Users\Admin\AppData\Local\Temp\2B70.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"23⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"24⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"25⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"26⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\364D.tmp"C:\Users\Admin\AppData\Local\Temp\364D.tmp"27⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"28⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"29⤵
- Executes dropped EXE
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"30⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"31⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\39F7.tmp"C:\Users\Admin\AppData\Local\Temp\39F7.tmp"32⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\3F37.tmp"C:\Users\Admin\AppData\Local\Temp\3F37.tmp"33⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\4496.tmp"C:\Users\Admin\AppData\Local\Temp\4496.tmp"34⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"35⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\7B84.tmp"C:\Users\Admin\AppData\Local\Temp\7B84.tmp"36⤵
- Executes dropped EXE
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\7D97.tmp"C:\Users\Admin\AppData\Local\Temp\7D97.tmp"37⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"38⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"39⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\8316.tmp"C:\Users\Admin\AppData\Local\Temp\8316.tmp"40⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\83C1.tmp"C:\Users\Admin\AppData\Local\Temp\83C1.tmp"41⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\844E.tmp"C:\Users\Admin\AppData\Local\Temp\844E.tmp"42⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\8558.tmp"C:\Users\Admin\AppData\Local\Temp\8558.tmp"43⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\8623.tmp"C:\Users\Admin\AppData\Local\Temp\8623.tmp"44⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\86BF.tmp"C:\Users\Admin\AppData\Local\Temp\86BF.tmp"45⤵
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\873C.tmp"C:\Users\Admin\AppData\Local\Temp\873C.tmp"46⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\87D8.tmp"C:\Users\Admin\AppData\Local\Temp\87D8.tmp"47⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\8865.tmp"C:\Users\Admin\AppData\Local\Temp\8865.tmp"48⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\8911.tmp"C:\Users\Admin\AppData\Local\Temp\8911.tmp"49⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\898E.tmp"C:\Users\Admin\AppData\Local\Temp\898E.tmp"50⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\8A0B.tmp"C:\Users\Admin\AppData\Local\Temp\8A0B.tmp"51⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\8AA7.tmp"C:\Users\Admin\AppData\Local\Temp\8AA7.tmp"52⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\8B34.tmp"C:\Users\Admin\AppData\Local\Temp\8B34.tmp"53⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"54⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\8C0E.tmp"C:\Users\Admin\AppData\Local\Temp\8C0E.tmp"55⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\8C9B.tmp"C:\Users\Admin\AppData\Local\Temp\8C9B.tmp"56⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\8D08.tmp"C:\Users\Admin\AppData\Local\Temp\8D08.tmp"57⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\8D85.tmp"C:\Users\Admin\AppData\Local\Temp\8D85.tmp"58⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\8DF3.tmp"C:\Users\Admin\AppData\Local\Temp\8DF3.tmp"59⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\8E51.tmp"C:\Users\Admin\AppData\Local\Temp\8E51.tmp"60⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\8ECE.tmp"C:\Users\Admin\AppData\Local\Temp\8ECE.tmp"61⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\8F4B.tmp"C:\Users\Admin\AppData\Local\Temp\8F4B.tmp"62⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\8FB8.tmp"C:\Users\Admin\AppData\Local\Temp\8FB8.tmp"63⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\9025.tmp"C:\Users\Admin\AppData\Local\Temp\9025.tmp"64⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\9093.tmp"C:\Users\Admin\AppData\Local\Temp\9093.tmp"65⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\9100.tmp"C:\Users\Admin\AppData\Local\Temp\9100.tmp"66⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\919C.tmp"C:\Users\Admin\AppData\Local\Temp\919C.tmp"67⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\91FA.tmp"C:\Users\Admin\AppData\Local\Temp\91FA.tmp"68⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\9267.tmp"C:\Users\Admin\AppData\Local\Temp\9267.tmp"69⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\92C5.tmp"C:\Users\Admin\AppData\Local\Temp\92C5.tmp"70⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\9333.tmp"C:\Users\Admin\AppData\Local\Temp\9333.tmp"71⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\9390.tmp"C:\Users\Admin\AppData\Local\Temp\9390.tmp"72⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\93FE.tmp"C:\Users\Admin\AppData\Local\Temp\93FE.tmp"73⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\945B.tmp"C:\Users\Admin\AppData\Local\Temp\945B.tmp"74⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\94C9.tmp"C:\Users\Admin\AppData\Local\Temp\94C9.tmp"75⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\9536.tmp"C:\Users\Admin\AppData\Local\Temp\9536.tmp"76⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\95A4.tmp"C:\Users\Admin\AppData\Local\Temp\95A4.tmp"77⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\9601.tmp"C:\Users\Admin\AppData\Local\Temp\9601.tmp"78⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\966F.tmp"C:\Users\Admin\AppData\Local\Temp\966F.tmp"79⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\96EC.tmp"C:\Users\Admin\AppData\Local\Temp\96EC.tmp"80⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\9769.tmp"C:\Users\Admin\AppData\Local\Temp\9769.tmp"81⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\97D6.tmp"C:\Users\Admin\AppData\Local\Temp\97D6.tmp"82⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\9843.tmp"C:\Users\Admin\AppData\Local\Temp\9843.tmp"83⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\98A1.tmp"C:\Users\Admin\AppData\Local\Temp\98A1.tmp"84⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\990F.tmp"C:\Users\Admin\AppData\Local\Temp\990F.tmp"85⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\997C.tmp"C:\Users\Admin\AppData\Local\Temp\997C.tmp"86⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\99E9.tmp"C:\Users\Admin\AppData\Local\Temp\99E9.tmp"87⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\9A47.tmp"C:\Users\Admin\AppData\Local\Temp\9A47.tmp"88⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\9AD4.tmp"C:\Users\Admin\AppData\Local\Temp\9AD4.tmp"89⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\9B41.tmp"C:\Users\Admin\AppData\Local\Temp\9B41.tmp"90⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\9BAE.tmp"C:\Users\Admin\AppData\Local\Temp\9BAE.tmp"91⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\9C5A.tmp"C:\Users\Admin\AppData\Local\Temp\9C5A.tmp"92⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\9CC8.tmp"C:\Users\Admin\AppData\Local\Temp\9CC8.tmp"93⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\9D25.tmp"C:\Users\Admin\AppData\Local\Temp\9D25.tmp"94⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\9DA2.tmp"C:\Users\Admin\AppData\Local\Temp\9DA2.tmp"95⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\9E2F.tmp"C:\Users\Admin\AppData\Local\Temp\9E2F.tmp"96⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\9EBC.tmp"C:\Users\Admin\AppData\Local\Temp\9EBC.tmp"97⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\9F68.tmp"C:\Users\Admin\AppData\Local\Temp\9F68.tmp"98⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"99⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\A052.tmp"C:\Users\Admin\AppData\Local\Temp\A052.tmp"100⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\A0CF.tmp"C:\Users\Admin\AppData\Local\Temp\A0CF.tmp"101⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\A17B.tmp"C:\Users\Admin\AppData\Local\Temp\A17B.tmp"102⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\A1F8.tmp"C:\Users\Admin\AppData\Local\Temp\A1F8.tmp"103⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\A265.tmp"C:\Users\Admin\AppData\Local\Temp\A265.tmp"104⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\A2C3.tmp"C:\Users\Admin\AppData\Local\Temp\A2C3.tmp"105⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\A340.tmp"C:\Users\Admin\AppData\Local\Temp\A340.tmp"106⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\A3AD.tmp"C:\Users\Admin\AppData\Local\Temp\A3AD.tmp"107⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\A41B.tmp"C:\Users\Admin\AppData\Local\Temp\A41B.tmp"108⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\A498.tmp"C:\Users\Admin\AppData\Local\Temp\A498.tmp"109⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\A553.tmp"C:\Users\Admin\AppData\Local\Temp\A553.tmp"110⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"111⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\A67C.tmp"C:\Users\Admin\AppData\Local\Temp\A67C.tmp"112⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\A6E9.tmp"C:\Users\Admin\AppData\Local\Temp\A6E9.tmp"113⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\A776.tmp"C:\Users\Admin\AppData\Local\Temp\A776.tmp"114⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"115⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\A880.tmp"C:\Users\Admin\AppData\Local\Temp\A880.tmp"116⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\A8ED.tmp"C:\Users\Admin\AppData\Local\Temp\A8ED.tmp"117⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\A95A.tmp"C:\Users\Admin\AppData\Local\Temp\A95A.tmp"118⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\A9C8.tmp"C:\Users\Admin\AppData\Local\Temp\A9C8.tmp"119⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\AA54.tmp"C:\Users\Admin\AppData\Local\Temp\AA54.tmp"120⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\AAC2.tmp"C:\Users\Admin\AppData\Local\Temp\AAC2.tmp"121⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\AB20.tmp"C:\Users\Admin\AppData\Local\Temp\AB20.tmp"122⤵PID:3472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-