Analysis
-
max time kernel
151s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 14:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
af77d341bb1341exeexeexeex.exe
Resource
win7-20230703-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
af77d341bb1341exeexeexeex.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
af77d341bb1341exeexeexeex.exe
-
Size
486KB
-
MD5
af77d341bb1341fc42a66d9fe9a3c760
-
SHA1
462e9ff79946fa1d16699b4513f8543352a492ab
-
SHA256
03f99b9454f467c70f76affb1f562c8c88126de79fbf7132dded7747a71cb995
-
SHA512
0a1b6a6c06514d4d129101cad2cf816ed2eb005bdc724fe2fd2fd1eaeafb1cd99262b6b430f9df4f61127b92f7812d1ff3a07b902f3a25d987d24571d3096559
-
SSDEEP
12288:/U5rCOTeiDLwGm3JANLNKJkF6+1Atfv2dXKANZ:/UQOJD8GAAtNokF6dfdAN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1432 27F5.tmp 4880 28B1.tmp 4436 299B.tmp 912 2A57.tmp 4304 2B12.tmp 2492 2BED.tmp 4124 2C99.tmp 2732 2DA3.tmp 1944 2EDB.tmp 1884 2FB6.tmp 1292 3052.tmp 3348 312D.tmp 2264 31D9.tmp 3392 339E.tmp 4680 3469.tmp 4412 3553.tmp 4952 361E.tmp 1764 3728.tmp 944 3803.tmp 3912 390C.tmp 1948 39A9.tmp 3256 3A55.tmp 4288 3B2F.tmp 2636 3BDB.tmp 2504 3C97.tmp 3444 3D62.tmp 1520 3E1D.tmp 1068 3ED9.tmp 4592 3F65.tmp 1020 4050.tmp 3240 414A.tmp 1572 4263.tmp 1776 433E.tmp 2136 43DA.tmp 1932 4486.tmp 3232 4541.tmp 4044 45ED.tmp 1864 46C8.tmp 3648 4774.tmp 2820 48BC.tmp 808 4939.tmp 4688 49E5.tmp 2316 4A81.tmp 2652 4B3D.tmp 4160 4BC9.tmp 3776 4C66.tmp 860 4D02.tmp 1880 4D8E.tmp 1120 4E1B.tmp 636 4EA8.tmp 1296 4F44.tmp 3900 4FE0.tmp 1056 507C.tmp 3764 5119.tmp 5060 51B5.tmp 1064 5270.tmp 408 531C.tmp 3724 53D8.tmp 3284 54A3.tmp 3760 553F.tmp 4900 55BC.tmp 2472 5668.tmp 4436 56F5.tmp 4484 57B0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3284 wrote to memory of 1432 3284 af77d341bb1341exeexeexeex.exe 83 PID 3284 wrote to memory of 1432 3284 af77d341bb1341exeexeexeex.exe 83 PID 3284 wrote to memory of 1432 3284 af77d341bb1341exeexeexeex.exe 83 PID 1432 wrote to memory of 4880 1432 27F5.tmp 84 PID 1432 wrote to memory of 4880 1432 27F5.tmp 84 PID 1432 wrote to memory of 4880 1432 27F5.tmp 84 PID 4880 wrote to memory of 4436 4880 28B1.tmp 85 PID 4880 wrote to memory of 4436 4880 28B1.tmp 85 PID 4880 wrote to memory of 4436 4880 28B1.tmp 85 PID 4436 wrote to memory of 912 4436 299B.tmp 87 PID 4436 wrote to memory of 912 4436 299B.tmp 87 PID 4436 wrote to memory of 912 4436 299B.tmp 87 PID 912 wrote to memory of 4304 912 2A57.tmp 88 PID 912 wrote to memory of 4304 912 2A57.tmp 88 PID 912 wrote to memory of 4304 912 2A57.tmp 88 PID 4304 wrote to memory of 2492 4304 2B12.tmp 89 PID 4304 wrote to memory of 2492 4304 2B12.tmp 89 PID 4304 wrote to memory of 2492 4304 2B12.tmp 89 PID 2492 wrote to memory of 4124 2492 2BED.tmp 90 PID 2492 wrote to memory of 4124 2492 2BED.tmp 90 PID 2492 wrote to memory of 4124 2492 2BED.tmp 90 PID 4124 wrote to memory of 2732 4124 2C99.tmp 91 PID 4124 wrote to memory of 2732 4124 2C99.tmp 91 PID 4124 wrote to memory of 2732 4124 2C99.tmp 91 PID 2732 wrote to memory of 1944 2732 2DA3.tmp 92 PID 2732 wrote to memory of 1944 2732 2DA3.tmp 92 PID 2732 wrote to memory of 1944 2732 2DA3.tmp 92 PID 1944 wrote to memory of 1884 1944 2EDB.tmp 93 PID 1944 wrote to memory of 1884 1944 2EDB.tmp 93 PID 1944 wrote to memory of 1884 1944 2EDB.tmp 93 PID 1884 wrote to memory of 1292 1884 2FB6.tmp 94 PID 1884 wrote to memory of 1292 1884 2FB6.tmp 94 PID 1884 wrote to memory of 1292 1884 2FB6.tmp 94 PID 1292 wrote to memory of 3348 1292 3052.tmp 95 PID 1292 wrote to memory of 3348 1292 3052.tmp 95 PID 1292 wrote to memory of 3348 1292 3052.tmp 95 PID 3348 wrote to memory of 2264 3348 312D.tmp 96 PID 3348 wrote to memory of 2264 3348 312D.tmp 96 PID 3348 wrote to memory of 2264 3348 312D.tmp 96 PID 2264 wrote to memory of 3392 2264 31D9.tmp 97 PID 2264 wrote to memory of 3392 2264 31D9.tmp 97 PID 2264 wrote to memory of 3392 2264 31D9.tmp 97 PID 3392 wrote to memory of 4680 3392 339E.tmp 98 PID 3392 wrote to memory of 4680 3392 339E.tmp 98 PID 3392 wrote to memory of 4680 3392 339E.tmp 98 PID 4680 wrote to memory of 4412 4680 3469.tmp 99 PID 4680 wrote to memory of 4412 4680 3469.tmp 99 PID 4680 wrote to memory of 4412 4680 3469.tmp 99 PID 4412 wrote to memory of 4952 4412 3553.tmp 100 PID 4412 wrote to memory of 4952 4412 3553.tmp 100 PID 4412 wrote to memory of 4952 4412 3553.tmp 100 PID 4952 wrote to memory of 1764 4952 361E.tmp 101 PID 4952 wrote to memory of 1764 4952 361E.tmp 101 PID 4952 wrote to memory of 1764 4952 361E.tmp 101 PID 1764 wrote to memory of 944 1764 3728.tmp 102 PID 1764 wrote to memory of 944 1764 3728.tmp 102 PID 1764 wrote to memory of 944 1764 3728.tmp 102 PID 944 wrote to memory of 3912 944 3803.tmp 103 PID 944 wrote to memory of 3912 944 3803.tmp 103 PID 944 wrote to memory of 3912 944 3803.tmp 103 PID 3912 wrote to memory of 1948 3912 390C.tmp 104 PID 3912 wrote to memory of 1948 3912 390C.tmp 104 PID 3912 wrote to memory of 1948 3912 390C.tmp 104 PID 1948 wrote to memory of 3256 1948 39A9.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\af77d341bb1341exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\af77d341bb1341exeexeexeex.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\299B.tmp"C:\Users\Admin\AppData\Local\Temp\299B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\2C99.tmp"C:\Users\Admin\AppData\Local\Temp\2C99.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\31D9.tmp"C:\Users\Admin\AppData\Local\Temp\31D9.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\361E.tmp"C:\Users\Admin\AppData\Local\Temp\361E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"23⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"24⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"25⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\3C97.tmp"C:\Users\Admin\AppData\Local\Temp\3C97.tmp"26⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\3D62.tmp"C:\Users\Admin\AppData\Local\Temp\3D62.tmp"27⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"28⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"29⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"30⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"31⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"32⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp"33⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"34⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"35⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"36⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"37⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\45ED.tmp"C:\Users\Admin\AppData\Local\Temp\45ED.tmp"38⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\46C8.tmp"C:\Users\Admin\AppData\Local\Temp\46C8.tmp"39⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"40⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"41⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\4939.tmp"C:\Users\Admin\AppData\Local\Temp\4939.tmp"42⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"43⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"44⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"45⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"46⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"47⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\4D02.tmp"C:\Users\Admin\AppData\Local\Temp\4D02.tmp"48⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"49⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"50⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"51⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\4F44.tmp"C:\Users\Admin\AppData\Local\Temp\4F44.tmp"52⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"53⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"54⤵
- Executes dropped EXE
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\5119.tmp"C:\Users\Admin\AppData\Local\Temp\5119.tmp"55⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\51B5.tmp"C:\Users\Admin\AppData\Local\Temp\51B5.tmp"56⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\5270.tmp"C:\Users\Admin\AppData\Local\Temp\5270.tmp"57⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\531C.tmp"C:\Users\Admin\AppData\Local\Temp\531C.tmp"58⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"59⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\54A3.tmp"C:\Users\Admin\AppData\Local\Temp\54A3.tmp"60⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\553F.tmp"C:\Users\Admin\AppData\Local\Temp\553F.tmp"61⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\55BC.tmp"C:\Users\Admin\AppData\Local\Temp\55BC.tmp"62⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"63⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\56F5.tmp"C:\Users\Admin\AppData\Local\Temp\56F5.tmp"64⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\57B0.tmp"C:\Users\Admin\AppData\Local\Temp\57B0.tmp"65⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\582D.tmp"C:\Users\Admin\AppData\Local\Temp\582D.tmp"66⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"67⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"68⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"69⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"70⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"71⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"72⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"73⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"74⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"C:\Users\Admin\AppData\Local\Temp\5DEA.tmp"75⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\5E77.tmp"C:\Users\Admin\AppData\Local\Temp\5E77.tmp"76⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\5F22.tmp"C:\Users\Admin\AppData\Local\Temp\5F22.tmp"77⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"78⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\607A.tmp"C:\Users\Admin\AppData\Local\Temp\607A.tmp"79⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\6136.tmp"C:\Users\Admin\AppData\Local\Temp\6136.tmp"80⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"81⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\625F.tmp"C:\Users\Admin\AppData\Local\Temp\625F.tmp"82⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\62FB.tmp"C:\Users\Admin\AppData\Local\Temp\62FB.tmp"83⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\6397.tmp"C:\Users\Admin\AppData\Local\Temp\6397.tmp"84⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\6472.tmp"C:\Users\Admin\AppData\Local\Temp\6472.tmp"85⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\653D.tmp"C:\Users\Admin\AppData\Local\Temp\653D.tmp"86⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\65CA.tmp"C:\Users\Admin\AppData\Local\Temp\65CA.tmp"87⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"88⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"89⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\67EC.tmp"C:\Users\Admin\AppData\Local\Temp\67EC.tmp"90⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"91⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\68F6.tmp"C:\Users\Admin\AppData\Local\Temp\68F6.tmp"92⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\6973.tmp"C:\Users\Admin\AppData\Local\Temp\6973.tmp"93⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"C:\Users\Admin\AppData\Local\Temp\6A0F.tmp"94⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"95⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\6B38.tmp"C:\Users\Admin\AppData\Local\Temp\6B38.tmp"96⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"C:\Users\Admin\AppData\Local\Temp\6BE4.tmp"97⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"98⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\6D4B.tmp"C:\Users\Admin\AppData\Local\Temp\6D4B.tmp"99⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"100⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\6E84.tmp"C:\Users\Admin\AppData\Local\Temp\6E84.tmp"101⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\6F3F.tmp"C:\Users\Admin\AppData\Local\Temp\6F3F.tmp"102⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"103⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\7097.tmp"C:\Users\Admin\AppData\Local\Temp\7097.tmp"104⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"105⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\71D0.tmp"C:\Users\Admin\AppData\Local\Temp\71D0.tmp"106⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\726C.tmp"C:\Users\Admin\AppData\Local\Temp\726C.tmp"107⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\7318.tmp"C:\Users\Admin\AppData\Local\Temp\7318.tmp"108⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\7395.tmp"C:\Users\Admin\AppData\Local\Temp\7395.tmp"109⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\7460.tmp"C:\Users\Admin\AppData\Local\Temp\7460.tmp"110⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\74FC.tmp"C:\Users\Admin\AppData\Local\Temp\74FC.tmp"111⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\7598.tmp"C:\Users\Admin\AppData\Local\Temp\7598.tmp"112⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\7635.tmp"C:\Users\Admin\AppData\Local\Temp\7635.tmp"113⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\76D1.tmp"C:\Users\Admin\AppData\Local\Temp\76D1.tmp"114⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\775E.tmp"C:\Users\Admin\AppData\Local\Temp\775E.tmp"115⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\77FA.tmp"C:\Users\Admin\AppData\Local\Temp\77FA.tmp"116⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\78C5.tmp"C:\Users\Admin\AppData\Local\Temp\78C5.tmp"117⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7952.tmp"C:\Users\Admin\AppData\Local\Temp\7952.tmp"118⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\79DE.tmp"C:\Users\Admin\AppData\Local\Temp\79DE.tmp"119⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\7A6B.tmp"C:\Users\Admin\AppData\Local\Temp\7A6B.tmp"120⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\7B07.tmp"C:\Users\Admin\AppData\Local\Temp\7B07.tmp"121⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\7BB3.tmp"C:\Users\Admin\AppData\Local\Temp\7BB3.tmp"122⤵PID:1880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-