Overview
overview
7Static
static
7setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Easy_Burning.exe
windows7-x64
7Easy_Burning.exe
windows10-2004-x64
7Uninst Eas...ng.exe
windows7-x64
7Uninst Eas...ng.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3VisualISO.exe
windows7-x64
3VisualISO.exe
windows10-2004-x64
3cdrecord.exe
windows7-x64
7cdrecord.exe
windows10-2004-x64
7check_file.exe
windows7-x64
7check_file.exe
windows10-2004-x64
7compare.exe
windows7-x64
1compare.exe
windows10-2004-x64
1cygwin1.dll
windows7-x64
7cygwin1.dll
windows10-2004-x64
7info.html
windows7-x64
1info.html
windows10-2004-x64
1language.exe
windows7-x64
7language.exe
windows10-2004-x64
7mkisofs.exe
windows7-x64
7mkisofs.exe
windows10-2004-x64
7problem.pdf
windows7-x64
1problem.pdf
windows10-2004-x64
1sh.exe
windows7-x64
7sh.exe
windows10-2004-x64
7Analysis
-
max time kernel
104s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 21:44
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
Easy_Burning.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Easy_Burning.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Uninst Easy_Burning.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Uninst Easy_Burning.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
VisualISO.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
VisualISO.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
cdrecord.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
cdrecord.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
check_file.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
check_file.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
compare.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
compare.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
cygwin1.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
cygwin1.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
info.html
Resource
win7-20240319-en
Behavioral task
behavioral24
Sample
info.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
language.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
language.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
mkisofs.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
mkisofs.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
problem.pdf
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
problem.pdf
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
sh.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
sh.exe
Resource
win10v2004-20240226-en
General
-
Target
cdrecord.exe
-
Size
134KB
-
MD5
597e917a40119d09cc5c68c5a9fc920a
-
SHA1
c9aa9498ccf4ff9b52c28f367a7f927ba7df9f88
-
SHA256
8da95200d274b49e7fa51da24d3896db9f899e1e02f4accc2b99837a033632d8
-
SHA512
3204d03d0a17bc9b6d49fcd1fe30ded59fe5cc0bf4e16cacf6cee1847a6fd2f1cfd299cffeaa2b807ba14c9677ced0581dcfa4fce21cf98ba5966a42c08373f0
-
SSDEEP
3072:NaSsjz4X5TsG/OGJtNZPjcbZKPQk0aum8iJ2/GNbCYJBExyWcUi+:Ntsjz4JmGTAEoBaum8iUGN3jLJ
Malware Config
Signatures
-
resource yara_rule behavioral16/memory/4280-0-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral16/memory/4280-1-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/4856-2-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/4932-3-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral16/memory/3116-4-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/2084-5-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/5096-6-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/5636-7-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/6720-8-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/6920-9-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/7432-10-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/9584-11-0x0000000061000000-0x000000006126B000-memory.dmp upx behavioral16/memory/14436-76-0x0000000061000000-0x000000006126B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4856 4280 cdrecord.exe 85 PID 4280 wrote to memory of 4856 4280 cdrecord.exe 85 PID 4280 wrote to memory of 4856 4280 cdrecord.exe 85 PID 4856 wrote to memory of 4840 4856 cdrecord.exe 86 PID 4856 wrote to memory of 4840 4856 cdrecord.exe 86 PID 4856 wrote to memory of 4840 4856 cdrecord.exe 86 PID 4840 wrote to memory of 4932 4840 cdrecord.exe 87 PID 4840 wrote to memory of 4932 4840 cdrecord.exe 87 PID 4840 wrote to memory of 4932 4840 cdrecord.exe 87 PID 4932 wrote to memory of 3192 4932 cdrecord.exe 88 PID 4932 wrote to memory of 3192 4932 cdrecord.exe 88 PID 4932 wrote to memory of 3192 4932 cdrecord.exe 88 PID 3192 wrote to memory of 3116 3192 cdrecord.exe 89 PID 3192 wrote to memory of 3116 3192 cdrecord.exe 89 PID 3192 wrote to memory of 3116 3192 cdrecord.exe 89 PID 3116 wrote to memory of 3536 3116 cdrecord.exe 90 PID 3116 wrote to memory of 3536 3116 cdrecord.exe 90 PID 3116 wrote to memory of 3536 3116 cdrecord.exe 90 PID 3536 wrote to memory of 2340 3536 cdrecord.exe 91 PID 3536 wrote to memory of 2340 3536 cdrecord.exe 91 PID 3536 wrote to memory of 2340 3536 cdrecord.exe 91 PID 2340 wrote to memory of 5024 2340 cdrecord.exe 92 PID 2340 wrote to memory of 5024 2340 cdrecord.exe 92 PID 2340 wrote to memory of 5024 2340 cdrecord.exe 92 PID 5024 wrote to memory of 4940 5024 cdrecord.exe 93 PID 5024 wrote to memory of 4940 5024 cdrecord.exe 93 PID 5024 wrote to memory of 4940 5024 cdrecord.exe 93 PID 4940 wrote to memory of 4912 4940 cdrecord.exe 94 PID 4940 wrote to memory of 4912 4940 cdrecord.exe 94 PID 4940 wrote to memory of 4912 4940 cdrecord.exe 94 PID 4912 wrote to memory of 2084 4912 cdrecord.exe 95 PID 4912 wrote to memory of 2084 4912 cdrecord.exe 95 PID 4912 wrote to memory of 2084 4912 cdrecord.exe 95 PID 2084 wrote to memory of 3324 2084 cdrecord.exe 96 PID 2084 wrote to memory of 3324 2084 cdrecord.exe 96 PID 2084 wrote to memory of 3324 2084 cdrecord.exe 96 PID 3324 wrote to memory of 1944 3324 cdrecord.exe 97 PID 3324 wrote to memory of 1944 3324 cdrecord.exe 97 PID 3324 wrote to memory of 1944 3324 cdrecord.exe 97 PID 1944 wrote to memory of 2536 1944 cdrecord.exe 98 PID 1944 wrote to memory of 2536 1944 cdrecord.exe 98 PID 1944 wrote to memory of 2536 1944 cdrecord.exe 98 PID 2536 wrote to memory of 1144 2536 cdrecord.exe 99 PID 2536 wrote to memory of 1144 2536 cdrecord.exe 99 PID 2536 wrote to memory of 1144 2536 cdrecord.exe 99 PID 1144 wrote to memory of 3560 1144 cdrecord.exe 100 PID 1144 wrote to memory of 3560 1144 cdrecord.exe 100 PID 1144 wrote to memory of 3560 1144 cdrecord.exe 100 PID 3560 wrote to memory of 2772 3560 cdrecord.exe 101 PID 3560 wrote to memory of 2772 3560 cdrecord.exe 101 PID 3560 wrote to memory of 2772 3560 cdrecord.exe 101 PID 2772 wrote to memory of 3360 2772 cdrecord.exe 102 PID 2772 wrote to memory of 3360 2772 cdrecord.exe 102 PID 2772 wrote to memory of 3360 2772 cdrecord.exe 102 PID 3360 wrote to memory of 2624 3360 cdrecord.exe 103 PID 3360 wrote to memory of 2624 3360 cdrecord.exe 103 PID 3360 wrote to memory of 2624 3360 cdrecord.exe 103 PID 2624 wrote to memory of 4920 2624 cdrecord.exe 104 PID 2624 wrote to memory of 4920 2624 cdrecord.exe 104 PID 2624 wrote to memory of 4920 2624 cdrecord.exe 104 PID 4920 wrote to memory of 2968 4920 cdrecord.exe 105 PID 4920 wrote to memory of 2968 4920 cdrecord.exe 105 PID 4920 wrote to memory of 2968 4920 cdrecord.exe 105 PID 2968 wrote to memory of 1572 2968 cdrecord.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"11⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"12⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"13⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"14⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"15⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"16⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"17⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"18⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"19⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"20⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"21⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"22⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"23⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"24⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"25⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"26⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"27⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"28⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"29⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"30⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"31⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"32⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"33⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"34⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"35⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"36⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"37⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"38⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"39⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"40⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"41⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"42⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"43⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"44⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"45⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"46⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"47⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"48⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"49⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"50⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"51⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"52⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"53⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"54⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"55⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"56⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"57⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"58⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"59⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"60⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"61⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"62⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"63⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"64⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"65⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"66⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"67⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"68⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"69⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"70⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"71⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"72⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"73⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"74⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"75⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"76⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"77⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"78⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"79⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"80⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"81⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"82⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"83⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"84⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"85⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"86⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"87⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"88⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"89⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"90⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"91⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"92⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"93⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"94⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"95⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"96⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"97⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"98⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"99⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"100⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"101⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"102⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"103⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"104⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"105⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"106⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"107⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"108⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"109⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"110⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"111⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"112⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"113⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"114⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"115⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"116⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"117⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"118⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"119⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"120⤵PID:5620
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"121⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"C:\Users\Admin\AppData\Local\Temp\cdrecord.exe"122⤵PID:5652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-