Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2023 16:49
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_189be5440a1ba4exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_189be5440a1ba4exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_189be5440a1ba4exeexe_JC.exe
-
Size
520KB
-
MD5
189be5440a1ba4778b4e7e719e4e23fb
-
SHA1
5c109e08f5379f215fe47b173557a920eecdbb94
-
SHA256
66d2cd5998a586f0fcebe1250799214ebaddd893c0f16d252f7b30a1711c1e25
-
SHA512
3fd9d8e0e07f06714d84c5d2e82c97e93838d816e6ef3fb8af34ed749bf112febbd69eca8044b9581b496f9a3209580158ace0c92b761aa741e3f275342281b7
-
SSDEEP
6144:VLPtvXTyzkYVFk+XbiADWOwHzrY2dFrIvUF9//pU2HCYa/ROn/f2WeCA2IoWOsHT:L4RXuADWOwY6FH0hgH2tCA2wfNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3272 6561.tmp 4756 65FD.tmp 3908 66C8.tmp 3924 67E2.tmp 116 68BC.tmp 212 69F5.tmp 4720 6AD0.tmp 3816 6B8B.tmp 3156 6C56.tmp 628 6F92.tmp 3208 704E.tmp 2420 70EA.tmp 3264 7251.tmp 1896 730D.tmp 3612 738A.tmp 3508 73E8.tmp 4328 7494.tmp 2000 7530.tmp 3756 75CC.tmp 3060 7659.tmp 4264 76F5.tmp 1580 77DF.tmp 5008 78BA.tmp 4912 79A4.tmp 4512 7A50.tmp 5080 7AFC.tmp 4192 7B6A.tmp 4956 7BD7.tmp 2952 7C73.tmp 1756 7CF0.tmp 1488 7EB5.tmp 1648 7F61.tmp 4968 7FFD.tmp 4964 808A.tmp 968 80F7.tmp 4616 8155.tmp 1296 81B3.tmp 4928 8230.tmp 2872 83C6.tmp 1116 8434.tmp 4232 84A1.tmp 4116 84FF.tmp 4800 857C.tmp 732 85F9.tmp 5108 8695.tmp 3924 8712.tmp 216 877F.tmp 2256 8CAF.tmp 3156 8D2C.tmp 4200 900B.tmp 3976 9078.tmp 4740 90E6.tmp 3160 9172.tmp 3264 91EF.tmp 1556 927C.tmp 3876 97AC.tmp 3884 98E4.tmp 2428 99FE.tmp 1924 9A4C.tmp 1580 9AB9.tmp 2412 9B36.tmp 3636 9BB3.tmp 4512 9C30.tmp 4516 9CBD.tmp -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{A4E02AD3-4FAC-438D-BB78-ADBC73459DB0}.catalogItem svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3272 4800 NA_NA_189be5440a1ba4exeexe_JC.exe 81 PID 4800 wrote to memory of 3272 4800 NA_NA_189be5440a1ba4exeexe_JC.exe 81 PID 4800 wrote to memory of 3272 4800 NA_NA_189be5440a1ba4exeexe_JC.exe 81 PID 3272 wrote to memory of 4756 3272 6561.tmp 82 PID 3272 wrote to memory of 4756 3272 6561.tmp 82 PID 3272 wrote to memory of 4756 3272 6561.tmp 82 PID 4756 wrote to memory of 3908 4756 65FD.tmp 83 PID 4756 wrote to memory of 3908 4756 65FD.tmp 83 PID 4756 wrote to memory of 3908 4756 65FD.tmp 83 PID 3908 wrote to memory of 3924 3908 66C8.tmp 84 PID 3908 wrote to memory of 3924 3908 66C8.tmp 84 PID 3908 wrote to memory of 3924 3908 66C8.tmp 84 PID 3924 wrote to memory of 116 3924 67E2.tmp 85 PID 3924 wrote to memory of 116 3924 67E2.tmp 85 PID 3924 wrote to memory of 116 3924 67E2.tmp 85 PID 116 wrote to memory of 212 116 68BC.tmp 86 PID 116 wrote to memory of 212 116 68BC.tmp 86 PID 116 wrote to memory of 212 116 68BC.tmp 86 PID 212 wrote to memory of 4720 212 69F5.tmp 87 PID 212 wrote to memory of 4720 212 69F5.tmp 87 PID 212 wrote to memory of 4720 212 69F5.tmp 87 PID 4720 wrote to memory of 3816 4720 6AD0.tmp 88 PID 4720 wrote to memory of 3816 4720 6AD0.tmp 88 PID 4720 wrote to memory of 3816 4720 6AD0.tmp 88 PID 3816 wrote to memory of 3156 3816 6B8B.tmp 89 PID 3816 wrote to memory of 3156 3816 6B8B.tmp 89 PID 3816 wrote to memory of 3156 3816 6B8B.tmp 89 PID 3156 wrote to memory of 628 3156 6C56.tmp 90 PID 3156 wrote to memory of 628 3156 6C56.tmp 90 PID 3156 wrote to memory of 628 3156 6C56.tmp 90 PID 628 wrote to memory of 3208 628 6F92.tmp 91 PID 628 wrote to memory of 3208 628 6F92.tmp 91 PID 628 wrote to memory of 3208 628 6F92.tmp 91 PID 3208 wrote to memory of 2420 3208 704E.tmp 92 PID 3208 wrote to memory of 2420 3208 704E.tmp 92 PID 3208 wrote to memory of 2420 3208 704E.tmp 92 PID 2420 wrote to memory of 3264 2420 70EA.tmp 93 PID 2420 wrote to memory of 3264 2420 70EA.tmp 93 PID 2420 wrote to memory of 3264 2420 70EA.tmp 93 PID 3264 wrote to memory of 1896 3264 7251.tmp 94 PID 3264 wrote to memory of 1896 3264 7251.tmp 94 PID 3264 wrote to memory of 1896 3264 7251.tmp 94 PID 1896 wrote to memory of 3612 1896 730D.tmp 95 PID 1896 wrote to memory of 3612 1896 730D.tmp 95 PID 1896 wrote to memory of 3612 1896 730D.tmp 95 PID 3612 wrote to memory of 3508 3612 738A.tmp 96 PID 3612 wrote to memory of 3508 3612 738A.tmp 96 PID 3612 wrote to memory of 3508 3612 738A.tmp 96 PID 3508 wrote to memory of 4328 3508 73E8.tmp 97 PID 3508 wrote to memory of 4328 3508 73E8.tmp 97 PID 3508 wrote to memory of 4328 3508 73E8.tmp 97 PID 4328 wrote to memory of 2000 4328 7494.tmp 98 PID 4328 wrote to memory of 2000 4328 7494.tmp 98 PID 4328 wrote to memory of 2000 4328 7494.tmp 98 PID 2000 wrote to memory of 3756 2000 7530.tmp 99 PID 2000 wrote to memory of 3756 2000 7530.tmp 99 PID 2000 wrote to memory of 3756 2000 7530.tmp 99 PID 3756 wrote to memory of 3060 3756 75CC.tmp 102 PID 3756 wrote to memory of 3060 3756 75CC.tmp 102 PID 3756 wrote to memory of 3060 3756 75CC.tmp 102 PID 3060 wrote to memory of 4264 3060 7659.tmp 103 PID 3060 wrote to memory of 4264 3060 7659.tmp 103 PID 3060 wrote to memory of 4264 3060 7659.tmp 103 PID 4264 wrote to memory of 1580 4264 76F5.tmp 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_189be5440a1ba4exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_189be5440a1ba4exeexe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\6561.tmp"C:\Users\Admin\AppData\Local\Temp\6561.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\65FD.tmp"C:\Users\Admin\AppData\Local\Temp\65FD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\66C8.tmp"C:\Users\Admin\AppData\Local\Temp\66C8.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\67E2.tmp"C:\Users\Admin\AppData\Local\Temp\67E2.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\68BC.tmp"C:\Users\Admin\AppData\Local\Temp\68BC.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\69F5.tmp"C:\Users\Admin\AppData\Local\Temp\69F5.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"C:\Users\Admin\AppData\Local\Temp\6AD0.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\6C56.tmp"C:\Users\Admin\AppData\Local\Temp\6C56.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\704E.tmp"C:\Users\Admin\AppData\Local\Temp\704E.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\70EA.tmp"C:\Users\Admin\AppData\Local\Temp\70EA.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\7251.tmp"C:\Users\Admin\AppData\Local\Temp\7251.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\730D.tmp"C:\Users\Admin\AppData\Local\Temp\730D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\738A.tmp"C:\Users\Admin\AppData\Local\Temp\738A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\7494.tmp"C:\Users\Admin\AppData\Local\Temp\7494.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\7530.tmp"C:\Users\Admin\AppData\Local\Temp\7530.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\75CC.tmp"C:\Users\Admin\AppData\Local\Temp\75CC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\7659.tmp"C:\Users\Admin\AppData\Local\Temp\7659.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\76F5.tmp"C:\Users\Admin\AppData\Local\Temp\76F5.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"23⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"24⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"25⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\7A50.tmp"C:\Users\Admin\AppData\Local\Temp\7A50.tmp"26⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"27⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"28⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"29⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"30⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"31⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"32⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\7F61.tmp"C:\Users\Admin\AppData\Local\Temp\7F61.tmp"33⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"C:\Users\Admin\AppData\Local\Temp\7FFD.tmp"34⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\808A.tmp"C:\Users\Admin\AppData\Local\Temp\808A.tmp"35⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"36⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"37⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\81B3.tmp"C:\Users\Admin\AppData\Local\Temp\81B3.tmp"38⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\8230.tmp"C:\Users\Admin\AppData\Local\Temp\8230.tmp"39⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\83C6.tmp"C:\Users\Admin\AppData\Local\Temp\83C6.tmp"40⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\8434.tmp"C:\Users\Admin\AppData\Local\Temp\8434.tmp"41⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\84A1.tmp"C:\Users\Admin\AppData\Local\Temp\84A1.tmp"42⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"43⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"44⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\85F9.tmp"C:\Users\Admin\AppData\Local\Temp\85F9.tmp"45⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\8695.tmp"C:\Users\Admin\AppData\Local\Temp\8695.tmp"46⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\8712.tmp"C:\Users\Admin\AppData\Local\Temp\8712.tmp"47⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\877F.tmp"C:\Users\Admin\AppData\Local\Temp\877F.tmp"48⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"49⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"50⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\900B.tmp"C:\Users\Admin\AppData\Local\Temp\900B.tmp"51⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"52⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\90E6.tmp"C:\Users\Admin\AppData\Local\Temp\90E6.tmp"53⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\9172.tmp"C:\Users\Admin\AppData\Local\Temp\9172.tmp"54⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\91EF.tmp"C:\Users\Admin\AppData\Local\Temp\91EF.tmp"55⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\927C.tmp"C:\Users\Admin\AppData\Local\Temp\927C.tmp"56⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\97AC.tmp"C:\Users\Admin\AppData\Local\Temp\97AC.tmp"57⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\98E4.tmp"C:\Users\Admin\AppData\Local\Temp\98E4.tmp"58⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\99FE.tmp"C:\Users\Admin\AppData\Local\Temp\99FE.tmp"59⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"60⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"61⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\9B36.tmp"C:\Users\Admin\AppData\Local\Temp\9B36.tmp"62⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\9BB3.tmp"C:\Users\Admin\AppData\Local\Temp\9BB3.tmp"63⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\9C30.tmp"C:\Users\Admin\AppData\Local\Temp\9C30.tmp"64⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\9CBD.tmp"C:\Users\Admin\AppData\Local\Temp\9CBD.tmp"65⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"66⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"67⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"68⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"69⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"70⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"71⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\A170.tmp"C:\Users\Admin\AppData\Local\Temp\A170.tmp"72⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"73⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\A374.tmp"C:\Users\Admin\AppData\Local\Temp\A374.tmp"74⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"75⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\A49C.tmp"C:\Users\Admin\AppData\Local\Temp\A49C.tmp"76⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"77⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"78⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\A78A.tmp"C:\Users\Admin\AppData\Local\Temp\A78A.tmp"79⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"80⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\A930.tmp"C:\Users\Admin\AppData\Local\Temp\A930.tmp"81⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"82⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"C:\Users\Admin\AppData\Local\Temp\AAB7.tmp"83⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"84⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"85⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"86⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"87⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"88⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"89⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"90⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"91⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"92⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"93⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"94⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"95⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"96⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"97⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\B70B.tmp"C:\Users\Admin\AppData\Local\Temp\B70B.tmp"98⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"99⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"100⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"101⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"102⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"103⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"104⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"105⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\BC99.tmp"C:\Users\Admin\AppData\Local\Temp\BC99.tmp"106⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"107⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"108⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\BE10.tmp"C:\Users\Admin\AppData\Local\Temp\BE10.tmp"109⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BE8D.tmp"C:\Users\Admin\AppData\Local\Temp\BE8D.tmp"110⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"111⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\BF97.tmp"C:\Users\Admin\AppData\Local\Temp\BF97.tmp"112⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"113⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"114⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"115⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\C17B.tmp"C:\Users\Admin\AppData\Local\Temp\C17B.tmp"116⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"117⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\C43A.tmp"C:\Users\Admin\AppData\Local\Temp\C43A.tmp"118⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"119⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\C525.tmp"C:\Users\Admin\AppData\Local\Temp\C525.tmp"120⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"121⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\C66D.tmp"C:\Users\Admin\AppData\Local\Temp\C66D.tmp"122⤵PID:4260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-