Resubmissions

17-01-2025 19:13

250117-xxlcdszpbv 10

17-01-2025 19:09

250117-xt892sznbw 10

Analysis

  • max time kernel
    622s
  • max time network
    617s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 19:13

General

  • Target

    DiscordXploit.exe

  • Size

    3.3MB

  • MD5

    95da0645204d22bd9daf4e337ebeeaaa

  • SHA1

    58182d8cf8e83335a5b7312d0d4af79f4bd64212

  • SHA256

    ae5470b407120f90cd4c830260c8e965877199368d4a2982ff1a1769a2e08682

  • SHA512

    9257076c55b3cc6100f3299766bf7bf0be1e0b330c1cadca1d7ca46ff859e4afefeff3635fc15811cc2c7d6debd2fcb808cf5f96314c681b1dbc32d2a7305f9e

  • SSDEEP

    49152:jv2lL26AaNeWgPhlmVqvMQ7XSK2BVOzho9vJxOoGdzTHHB72eh2NTsd:jv2L26AaNeWgPhlmVqkQ7XSKS8oond

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

client0001

C2

hxp7-48924.portmap.host:48924

Mutex

dfda6d3b-23ed-4a2b-b0c4-4361d434ec5c

Attributes
  • encryption_key

    0F17464091E1835B99CC4D3E93D8043B9AE2FAF4

  • install_name

    Windows-Graphics-Loader.exe

  • log_directory

    Logs

  • reconnect_delay

    10000

  • startup_key

    Windows Graphics Loader

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 34 IoCs
  • Executes dropped EXE 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DiscordXploit.exe
    "C:\Users\Admin\AppData\Local\Temp\DiscordXploit.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2380
    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2292
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\qXZ5x3G5dPoe.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2720
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2124
          • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2832
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2620
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\OJd3QT782dTq.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2648
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2176
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1916
                • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:2300
                  • C:\Windows\system32\schtasks.exe
                    "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2836
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\vwW5IAQTJwsm.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2036
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:2888
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:896
                      • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:1908
                        • C:\Windows\system32\schtasks.exe
                          "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3056
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\XAwu7ZRw80Rw.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1420
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:2544
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:856
                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:576
                              • C:\Windows\system32\schtasks.exe
                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:1132
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\8W4LwA7gZcQ5.bat" "
                                11⤵
                                  PID:1064
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    12⤵
                                      PID:2580
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      12⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:2096
                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                      12⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:1740
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                        13⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1216
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\c7JoWwjFjPO4.bat" "
                                        13⤵
                                          PID:1548
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            14⤵
                                              PID:2948
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              14⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:1716
                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                              14⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:2240
                                              • C:\Windows\system32\schtasks.exe
                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                15⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1264
                                              • C:\Windows\system32\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\dsSJTxQVZ7WB.bat" "
                                                15⤵
                                                  PID:2040
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    16⤵
                                                      PID:2392
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 10 localhost
                                                      16⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:2436
                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                      16⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:1664
                                                      • C:\Windows\system32\schtasks.exe
                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                        17⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:1616
                                                      • C:\Windows\system32\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\qsNCaJujVgnW.bat" "
                                                        17⤵
                                                          PID:836
                                                          • C:\Windows\system32\chcp.com
                                                            chcp 65001
                                                            18⤵
                                                              PID:864
                                                            • C:\Windows\system32\PING.EXE
                                                              ping -n 10 localhost
                                                              18⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:2356
                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                              18⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:1232
                                                              • C:\Windows\system32\schtasks.exe
                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                19⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:1956
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\deZblS4ciePw.bat" "
                                                                19⤵
                                                                  PID:2216
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    20⤵
                                                                      PID:2828
                                                                    • C:\Windows\system32\PING.EXE
                                                                      ping -n 10 localhost
                                                                      20⤵
                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                      • Runs ping.exe
                                                                      PID:2872
                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                      20⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2744
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                        21⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:2764
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\kz6c876wqnlv.bat" "
                                                                        21⤵
                                                                          PID:2852
                                                                          • C:\Windows\system32\chcp.com
                                                                            chcp 65001
                                                                            22⤵
                                                                              PID:2120
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping -n 10 localhost
                                                                              22⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:2968
                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                              22⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:2584
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                23⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2964
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\GAv5PP5pq2Gm.bat" "
                                                                                23⤵
                                                                                  PID:1592
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp 65001
                                                                                    24⤵
                                                                                      PID:2328
                                                                                    • C:\Windows\system32\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      24⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:536
                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                      24⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      • Suspicious use of SendNotifyMessage
                                                                                      PID:1552
                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                        25⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:2848
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Xw4kRtyqI85l.bat" "
                                                                                        25⤵
                                                                                          PID:1920
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            26⤵
                                                                                              PID:2404
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              26⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:1060
                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                              26⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SendNotifyMessage
                                                                                              PID:856
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                27⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2896
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\IZhEUci5DqVm.bat" "
                                                                                                27⤵
                                                                                                  PID:2444
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    28⤵
                                                                                                      PID:1316
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      28⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:2024
                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                      28⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                      PID:1824
                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                        29⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:904
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\okTPIVLHeCxv.bat" "
                                                                                                        29⤵
                                                                                                          PID:2480
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            30⤵
                                                                                                              PID:916
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              30⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:1104
                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                              30⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                              PID:2144
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                31⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:2676
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ng6uz08dwKft.bat" "
                                                                                                                31⤵
                                                                                                                  PID:872
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    32⤵
                                                                                                                      PID:2424
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      ping -n 10 localhost
                                                                                                                      32⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:3040
                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                      32⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                      PID:1496
                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                        33⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:2436
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\gXVSQaDclbgR.bat" "
                                                                                                                        33⤵
                                                                                                                          PID:884
                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                            chcp 65001
                                                                                                                            34⤵
                                                                                                                              PID:2188
                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                              ping -n 10 localhost
                                                                                                                              34⤵
                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                              • Runs ping.exe
                                                                                                                              PID:1612
                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                              34⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                              PID:1628
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                35⤵
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:1776
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\YgAhoCutALa7.bat" "
                                                                                                                                35⤵
                                                                                                                                  PID:1964
                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                    chcp 65001
                                                                                                                                    36⤵
                                                                                                                                      PID:2468
                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                      ping -n 10 localhost
                                                                                                                                      36⤵
                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                      • Runs ping.exe
                                                                                                                                      PID:1980
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                      36⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                      PID:2532
                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                        37⤵
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:2856
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\jfqsLxkeJ3uI.bat" "
                                                                                                                                        37⤵
                                                                                                                                          PID:1120
                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                            chcp 65001
                                                                                                                                            38⤵
                                                                                                                                              PID:2612
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping -n 10 localhost
                                                                                                                                              38⤵
                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:2796
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                              38⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                              PID:1376
                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                39⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:2968
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\pdyo4kglQZLr.bat" "
                                                                                                                                                39⤵
                                                                                                                                                  PID:792
                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                    chcp 65001
                                                                                                                                                    40⤵
                                                                                                                                                      PID:1816
                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                      40⤵
                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                      • Runs ping.exe
                                                                                                                                                      PID:2860
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                      40⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                      PID:2980
                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                        41⤵
                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                        PID:536
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\OYUTlatW5fk0.bat" "
                                                                                                                                                        41⤵
                                                                                                                                                          PID:1796
                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                            chcp 65001
                                                                                                                                                            42⤵
                                                                                                                                                              PID:2636
                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                              42⤵
                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                              • Runs ping.exe
                                                                                                                                                              PID:1028
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                              42⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                              PID:580
                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                43⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:1500
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\XUfhiMkP13hy.bat" "
                                                                                                                                                                43⤵
                                                                                                                                                                  PID:2156
                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                    chcp 65001
                                                                                                                                                                    44⤵
                                                                                                                                                                      PID:1544
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                      44⤵
                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                      PID:2580
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                      44⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                      PID:920
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                        45⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:352
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\SvmQivGvhHX7.bat" "
                                                                                                                                                                        45⤵
                                                                                                                                                                          PID:1800
                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                            chcp 65001
                                                                                                                                                                            46⤵
                                                                                                                                                                              PID:908
                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                              46⤵
                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                              PID:2008
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                              46⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                              PID:2052
                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                47⤵
                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                PID:1648
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ppshbrz0G1V9.bat" "
                                                                                                                                                                                47⤵
                                                                                                                                                                                  PID:1792
                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                    48⤵
                                                                                                                                                                                      PID:2312
                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                      48⤵
                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                      PID:2504
                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                      48⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                      PID:872
                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                        49⤵
                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                        PID:2064
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\E1puKvDvhqpW.bat" "
                                                                                                                                                                                        49⤵
                                                                                                                                                                                          PID:1952
                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                            50⤵
                                                                                                                                                                                              PID:2380
                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                              50⤵
                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                              PID:1704
                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                              50⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                              PID:2056
                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                51⤵
                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                PID:2288
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\xB4vz7z4qzJT.bat" "
                                                                                                                                                                                                51⤵
                                                                                                                                                                                                  PID:2236
                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                    52⤵
                                                                                                                                                                                                      PID:2456
                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                      52⤵
                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                      PID:956
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                      52⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                      PID:1232
                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                        53⤵
                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                        PID:1664
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\BuobQYq96Md6.bat" "
                                                                                                                                                                                                        53⤵
                                                                                                                                                                                                          PID:2864
                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                            54⤵
                                                                                                                                                                                                              PID:2192
                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                              54⤵
                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                              PID:1384
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                              54⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                              PID:2996
                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                55⤵
                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                PID:2708
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\N4Fv64T6jTDj.bat" "
                                                                                                                                                                                                                55⤵
                                                                                                                                                                                                                  PID:2120
                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                    56⤵
                                                                                                                                                                                                                      PID:2624
                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                      56⤵
                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                      PID:1080
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                      56⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                      PID:2684
                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                        57⤵
                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                        PID:2460
                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\099SQ7EjDLba.bat" "
                                                                                                                                                                                                                        57⤵
                                                                                                                                                                                                                          PID:2932
                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                            58⤵
                                                                                                                                                                                                                              PID:1592
                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                              58⤵
                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                              PID:2888
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                              58⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                              PID:1660
                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                59⤵
                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                PID:1484
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\BbBaUiRhrD7Q.bat" "
                                                                                                                                                                                                                                59⤵
                                                                                                                                                                                                                                  PID:2316
                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                    60⤵
                                                                                                                                                                                                                                      PID:840
                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                      60⤵
                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                      PID:1644
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                      60⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                      PID:1084
                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                        61⤵
                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                        PID:1152
                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\1j7eGpv9SDmC.bat" "
                                                                                                                                                                                                                                        61⤵
                                                                                                                                                                                                                                          PID:2580
                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                            62⤵
                                                                                                                                                                                                                                              PID:308
                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                              62⤵
                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                              PID:3004
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                              62⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                              PID:2496
                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                63⤵
                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                PID:2576
                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Aie7y3Wnj9DI.bat" "
                                                                                                                                                                                                                                                63⤵
                                                                                                                                                                                                                                                  PID:1560
                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                    64⤵
                                                                                                                                                                                                                                                      PID:2676
                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                      64⤵
                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                      PID:2044
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                      64⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                      PID:1436
                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                        65⤵
                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                        PID:1236
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\qSMgVIVEqFdJ.bat" "
                                                                                                                                                                                                                                                        65⤵
                                                                                                                                                                                                                                                          PID:2452
                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                            66⤵
                                                                                                                                                                                                                                                              PID:1656
                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                              66⤵
                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                              PID:2436
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                              66⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                              PID:2420
                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                67⤵
                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                PID:1280
                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\oTC2bQTpPxom.bat" "
                                                                                                                                                                                                                                                                67⤵
                                                                                                                                                                                                                                                                  PID:1604
                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                    68⤵
                                                                                                                                                                                                                                                                      PID:2388
                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                      68⤵
                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                      PID:2344
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                      68⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                      PID:928
                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                        69⤵
                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                        PID:2752
                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\pYqbjRQwhgny.bat" "
                                                                                                                                                                                                                                                                        69⤵
                                                                                                                                                                                                                                                                          PID:2584
                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                            70⤵
                                                                                                                                                                                                                                                                              PID:2940
                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                              70⤵
                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                              PID:1432
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                              70⤵
                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                              PID:1908
                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                71⤵
                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                PID:2820
                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\7mRltRJZEVk9.bat" "
                                                                                                                                                                                                                                                                                71⤵
                                                                                                                                                                                                                                                                                  PID:2520
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                    72⤵
                                                                                                                                                                                                                                                                                      PID:1980
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                      72⤵
                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                      PID:1932
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                      72⤵
                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                      PID:2732
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                        73⤵
                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                        PID:2936
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\dLRvZIXXnFZc.bat" "
                                                                                                                                                                                                                                                                                        73⤵
                                                                                                                                                                                                                                                                                          PID:2900
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                            74⤵
                                                                                                                                                                                                                                                                                              PID:2204
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                              74⤵
                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                              PID:2120
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                              74⤵
                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                              PID:1632
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                75⤵
                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                PID:2328
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\MWmci2UYUXiz.bat" "
                                                                                                                                                                                                                                                                                                75⤵
                                                                                                                                                                                                                                                                                                  PID:536
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                    76⤵
                                                                                                                                                                                                                                                                                                      PID:2668
                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                      76⤵
                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                      PID:680
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                      76⤵
                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                      PID:2636
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                        77⤵
                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                        PID:2516
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\GFR4YadaffxV.bat" "
                                                                                                                                                                                                                                                                                                        77⤵
                                                                                                                                                                                                                                                                                                          PID:1152
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                            78⤵
                                                                                                                                                                                                                                                                                                              PID:1240
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                              78⤵
                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                              PID:2540
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                              78⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                              PID:3024
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                79⤵
                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                PID:1556
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\CzJPytoV1m3V.bat" "
                                                                                                                                                                                                                                                                                                                79⤵
                                                                                                                                                                                                                                                                                                                  PID:1724
                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                    80⤵
                                                                                                                                                                                                                                                                                                                      PID:844
                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                      80⤵
                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                      PID:1320
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                      80⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                      PID:2676
                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                        81⤵
                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                        PID:1648
                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\J2uUPUgfJONU.bat" "
                                                                                                                                                                                                                                                                                                                        81⤵
                                                                                                                                                                                                                                                                                                                          PID:704
                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                            82⤵
                                                                                                                                                                                                                                                                                                                              PID:2312
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                              82⤵
                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                              PID:1148
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                              82⤵
                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                              PID:2276
                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                83⤵
                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                PID:2452
                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\om9WHIYP77fM.bat" "
                                                                                                                                                                                                                                                                                                                                83⤵
                                                                                                                                                                                                                                                                                                                                  PID:1600
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                    84⤵
                                                                                                                                                                                                                                                                                                                                      PID:2076
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                      84⤵
                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                      PID:2388
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                      84⤵
                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                      PID:2720
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                        85⤵
                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                        PID:1704
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\74K5ybMRe4xd.bat" "
                                                                                                                                                                                                                                                                                                                                        85⤵
                                                                                                                                                                                                                                                                                                                                          PID:2784
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                            86⤵
                                                                                                                                                                                                                                                                                                                                              PID:2940
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                              86⤵
                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                              PID:944
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                              86⤵
                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                              PID:1740
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                87⤵
                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                PID:2820
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\aZWxv4NXHW6K.bat" "
                                                                                                                                                                                                                                                                                                                                                87⤵
                                                                                                                                                                                                                                                                                                                                                  PID:1808
                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                    88⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2612
                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                      88⤵
                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                      PID:1932
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                      88⤵
                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                      PID:2628
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                        89⤵
                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                        PID:2644
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\5v3zMgqdPDdX.bat" "
                                                                                                                                                                                                                                                                                                                                                        89⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1248
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                            90⤵
                                                                                                                                                                                                                                                                                                                                                              PID:1080
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                              90⤵
                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                              PID:2900
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                              90⤵
                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                              PID:2328
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                91⤵
                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                PID:1068
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\j0D4LnBiipYL.bat" "
                                                                                                                                                                                                                                                                                                                                                                91⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:1040
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                    92⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1636
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                      92⤵
                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                      PID:2932
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                      92⤵
                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                      PID:1500
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                        93⤵
                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                        PID:764
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\fKJ8e3wjDDyH.bat" "
                                                                                                                                                                                                                                                                                                                                                                        93⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:1316
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                            94⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:268
                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                              94⤵
                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                              PID:2164
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                              94⤵
                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                              PID:952
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                95⤵
                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                PID:288
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\chYQSKguJp3c.bat" "
                                                                                                                                                                                                                                                                                                                                                                                95⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:3016
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                    96⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2384
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                      96⤵
                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                      PID:1800
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                      96⤵
                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                      PID:1792
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                        PID:1696
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\8yvVNcEUoq0b.bat" "
                                                                                                                                                                                                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:1756
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2452
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                              98⤵
                                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                              PID:936
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                              98⤵
                                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                              PID:2380
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                99⤵
                                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                PID:1280
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\4SSCNednsvJ7.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                99⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:2988
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                    100⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:2696
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                      100⤵
                                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                      PID:1856
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      100⤵
                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                      PID:884
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                        101⤵
                                                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2100
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\aR2DMQLZ0Yi4.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                        101⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:2884
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                            102⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:576
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                              102⤵
                                                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                              PID:784
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                              102⤵
                                                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                              PID:1072
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                PID:1512
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\gs68aSVNbcPF.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1960
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                    104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2760
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                      104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2624
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                      104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2140
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                        105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1080
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\jtnQUd2Re81Y.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                        105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1156
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                            106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:596
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                              106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:680
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                              106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2308
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                107⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:536
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\dRfTSOHwn3HO.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                107⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1796
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                    108⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2256
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                      108⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:264
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                      108⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2692
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                        109⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1484
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\XvkvR9GFlmbo.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                        109⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2488
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                            110⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1728
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                              110⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1216
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                              110⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:444
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                111⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2384
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\rQuuDVkrl3Vj.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                111⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1656
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                    112⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1300
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                      112⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1088
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      112⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2064
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                        113⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2304
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\45FC6ZZLozMJ.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                        113⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3032
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                            114⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1608
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                              114⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2504
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                              114⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:956
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                115⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2552
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\TNpnvxwom5sX.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                115⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2000
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    116⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:932
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      116⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2236
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      116⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:576
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        117⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:784
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\zYCrQ4jNLtUA.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        117⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2644
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            118⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2864
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              118⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1384
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              118⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2764
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                119⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2964
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\ENEDbVqEVnGr.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                119⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1592
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    120⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1248
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      120⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2324
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      120⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1924
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        121⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2984
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\WOYpvfiRr34y.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          121⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2648
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              122⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3020
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                122⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2256
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                122⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1972
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  123⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:908
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\cTyNQDkIOiaR.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  123⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1240
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      124⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1728
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        124⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1544
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        124⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:572
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          125⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1800
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\pAgqBNoNz36N.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          125⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2008
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              126⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1300
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                126⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1640
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                126⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1028
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  127⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2312
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ow1IknZ4wHI5.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  127⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:936
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      128⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:640
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        128⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:880
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        128⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2512
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "schtasks" /create /tn "Windows Graphics Loader" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe" /rl HIGHEST /f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          129⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2504
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\JRR8nix9piUF.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          129⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2368
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              chcp 65001
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              130⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1432
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                ping -n 10 localhost
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                130⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2456

                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\099SQ7EjDLba.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              0ec0cbf190ed1e7d9fabf4a2aaa98666

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              e1baaecb09e4052668677502fe33b42a97347b39

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              39d3adac44992a9a69c5bce889b44f742be93a5ee141129091aee8c96f67daa4

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              9d81d4895f522cb67f34f5f0c636d56db59a4c91b61dd623bdd002d83cd54790941fc6a409eac1e423263a9535349144c7a4ba4703885e265eb03727801b87e5

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1j7eGpv9SDmC.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              d56c13f1e2deb0da371d1dc402e4ff04

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              188c0d23773d3f048507a7ffc845082aed2e07ab

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              2a619dbe7b8711eb4901441102ef01d12641da98c9ebf18fa7f5509f207f54c6

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              dd8ff21f431da5ac38ac8af950a3579613207a2e8601e1484cf58aa7686af20056ba89e98bb3c0b65aed44f6d3741ab4e47e35a3f2b17daf886535163d72cbf7

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\45FC6ZZLozMJ.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              01758b5e4738fc66b42ef3d6e3435f11

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              edd40aa15a9d894da1756942f1a6cdaf96ee49d8

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              24f82a8343d3e7128a9031c70673d3613b289822905f8fc214f3c294d77ed6eb

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              7d68b28ca5a04a4e4212d63d751f15ac1deddf436fa31193f1604f3a4ae1de82b81fc9c331f6dce3ca2bc3c729972124869f3ce5c0d57d3baffa6f70297b48fb

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\4SSCNednsvJ7.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              3f380478e96c34853f65385ac79cc2c8

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              d0f1685874c2bd9fd7bbc349fbd7fabaac5a108c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              46fa6087aba5e6b34b189530c4f5e458ec1cd2fbea9fbdc679f24224691ffb87

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              b3d577d5ade549320738dfb26a38b36ddaeecce2ad8e2127639214b0c349aef8cead069d270a52cb8bde242de748cb92ad6b302a8cf39864bba5bc099a0e18b0

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\5v3zMgqdPDdX.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              187983524ab5297f718656b97c22a067

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              43e6043c8a467794bfe6cdcb881296e676cf69d8

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              82ee92954c0a37e56d2f1b79b0f25b1d19338e9796252b4e426cdde05c76d9ce

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              1a3884ff99c9c66db99546087ea3ed3f973ce88af441534ca3d72bca91a77bede1f1fa16ae4cdf6169e180158e146ac7846778c0cc2630d6d6a1edfb36776ace

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\74K5ybMRe4xd.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              1edc61170dff3bf7620b7f01a9d9a1b3

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              5bf52bf076a5a678f7fed5dec083d1c3216e2d12

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              d16f43ba0e11be85514878a833b1d1fa55853cb57f7290d04b3328a6764da709

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              9c492fbbb35debe001757f734e65c12a4edda2794aef588ae7430675b2c3d72c11f003f2fbdcba94ee25a09d0c708c75a9b984910088c07f5d7ec2704b62cd32

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7mRltRJZEVk9.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              2932116e0468f976572af0199d490755

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              083936d494e37ce4e2a5d6ee336875741b605a9d

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0923218d0fe618a780b1bdd2daec0de7f156e82b9b3e1b643f7272a0d866d071

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              8d1d448ef7df7cb86b3e9ace4b279592f6b0442e06d46017497c4a988c76c2de8fa1baeddfe7ddb98ce89f4ee168ed438c1bd202705795e93a75ca761c4994ca

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\8W4LwA7gZcQ5.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              6ad089da2e3c869b5cce2ccb13f0931a

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              04cc19abc9d87d941f112a06f1a462729519bc59

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              09f055ceca2b80f00bc41348dfa0231b32b5eba8e08af51397c951987eb3f228

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              f8bac9b3e3da8feb304d8daf68b2764087b9efbe7c07d45845e19f1c8f2db5723b511d1269f92719d8de80cd9203c8d24ca482117074f543321ae3094ec62220

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\8yvVNcEUoq0b.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              a804ab673491c952d0360d47ae2d2c28

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              5604e331bceb1b2a68a60d2392c28bb17ecb7140

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              4b3e7a91193382d1e9f885c9f786b17da099cfface341d3f3f82b125bb5a5100

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              2b90e8471c5e1875d3dec2e968e7aadbfa482da4cf6f3f9d8d33a72d9c352aedfc911f2be1142f0884b101e1db6522b6e5d32ceea42c43bcedcb65ba786fe4f1

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Aie7y3Wnj9DI.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              6bcf61c79f2b138f44c901fc306304d9

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              fecc27178b3ccb0ed43dfae9f33aecb309cd8293

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              535458dd5d355a26de66d7b6802fb0d0c819a7c80a12a278be668724195f0432

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              77b01f4e25e60b7cefbe4c8273abafe6d2adf0b70c77a7ad73ced8e0f1a4ef14560dcfbeeb853267ac7b782f112b5c3004122970d1b3a71a5de01f1ae65796af

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\BbBaUiRhrD7Q.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              c6b872b52ed268f4436f14a07b2225cd

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              c7eeaea33d9f8a95c00dc96c9f84d71814c9043a

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              db47d8ba2eebf568c3ce1ace33dc7d387f479f2870a1387bae6e2bac7324df41

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              d91cc411d1e5fffd87c6e545806bb9b256ce882cd8fa3956d6a48353f518f448ca9e56a05eea2b22b60b8aeb01f4de701865e7162250c73c2c009b3555aad3d5

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\BuobQYq96Md6.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              6c368ec3fc2a177a333399f652e53823

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              bd51b5ab521773c4844bf35971aac8f31cad9d41

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              c7af0dc6e88e5e1e26996d3a17ed78b7697a8c08fd292d369854a9f10bffd432

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              b8b8f94e193765c577706dbaae91d259fc0c969b39c2f972095fea09a73ddb816220a8b1660cc1a5b9c1edc2aac4e22c6592a9edbc08d24c11bc311f3909bdfa

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\CzJPytoV1m3V.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              7c2036a4c95ec8b8932e2a341adf07f9

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              a23fa680e09ae0f9cceaa63f828395216489285e

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0e05e05ec7913ccf617dcc5d662fda42dd9a1dd4338461cb238bfb99b2711662

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              fee887e09babe18ecec31e0058630938116d56b2ea27d92b6b569d1b602bdd0b8c19125b49371f0d41c580a333fad0e7bd53cf10e80f972146433cbb241eec77

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\E1puKvDvhqpW.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              4cd008bc829a4e0562db2e247305e10d

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              589f25726b13ff689190e8c601daed3ba8f8dd3b

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0962498bc081437c04e5e7be379237d1f1915cd353300444795551228194d95f

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              967cc16f18dc5e8e68c637e7c0ea3ea85cad7afb9caa21c7fe8864a860f91d536a8b9e56e52ebcbe2ad7ef3d114347e349756ff0f8553bf364bb2ddb6cced926

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ENEDbVqEVnGr.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              2bbab168eaa0a1bcf4a6f73dfe4d7b0d

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              5c7f9e0db1f4b6bd9ae15a8f56b8a866a0afe392

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              73eec11993b8b608003a71f8c1afc6ac1ed6e08fae345a36c22cd13d72cae6ad

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              19c734015764611b9141ee647a1bd1d618c3b670f2369c4a1050e51b6c2a9b8b755ddae540857b09d65050913c882eb006a748dc302f36b2913aeecf39ef2684

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\GAv5PP5pq2Gm.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              d27ed8e228881b0004eab359bb9f493a

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              d044bfcc4384f858719f365744d78840956713bc

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              d10e3e838e98092ccf153be3a2f783d343ff9ce1d82f40cd2371e52d90316fff

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              837564608e73262a0815715de7dce5f99008ea925bcd16316f6dab3fb24772453105bd7c3c9635b21d9e7adc8ebbcca97d20b15f82c6e8ebc3683ac95dd22b39

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\GFR4YadaffxV.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              01b084949448e8323ac918b166660d5f

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              cf9335527573f785aaa3a99aaf93d566747f5b2c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              eacb10bfe07680902dd38afb3d99aaefedeeaffe64329b86c1ee407e89658190

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              12fd6c3aee6e79f6bf17598d54752925bbde07424c584902fe303674185e3d8ad3c12d923a8100437b510e62df5b0016266b3a3872b431bf13d7b769d85eedca

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\IZhEUci5DqVm.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              fa266be1788983a0e2be7d6dcd6bc5f2

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              36da7b1083d85e326ac7d88a5e388ba4d99f4db1

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              84d6e4d534c33a1a1fc9d84e169ca2d08d64baabafb25fb776cb37a2c0cda35b

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              9d071433eebe1c4273b843a31aaebab3ad23a7abc88dc19fd835d4a224d2578bdc2329c5e84d545f4dd3b55d368647c07daab714c062fd7e51f55740bce23482

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\J2uUPUgfJONU.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              ae5b7d0c57f4aa154a5100d7dad2cc56

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              7dc64b58fb71997891e0a4650cc30f3803517d0c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              b5e7504ebb1b881992cbd62575efa756272398a1c410a2b738acc597d54f04e8

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              9afc54c33bf28d3ac1d783f8a9bba7ac2927871ebf0c01957edb18687c4c9f0ecf58d80df0a11263682d4fbda60a2c95a58c6491a7224e2de7dffcfd441ef4a3

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\JRR8nix9piUF.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              d95399b01e2478ac8f5bc0947f442ed2

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              a49d9d87a3388bea2058a2fa9c8aea8f1825754b

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              7fe13160621472e518f520e2ff976f54655faecf228868deecf72164a9c4f127

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              061ba7d1ab1ce7700518cb747273ef8562a2fa137bd4f4aeeb8b1d04c3b47469bd3ad80d3f54b9d6658fadd3e9afa3145848d38fac86afed76cf24edd2a63568

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MWmci2UYUXiz.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              d0dda924e3e23c9060cf788ea291497f

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              d2c4c391b33faed6ada6def90eb265932b95f543

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0def3185b0572e895a130d25dce65e0e653887f04f6c01b9f5cee984d28b346b

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              fd663b71ad1d5d12a45fbb8f2b41aa9f8f7f0ef4d9ab40f747496b6bb7c567fcc0dbacd0ce671214925286111b23f29354b6e56704d29d08cba251cfad847265

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\N4Fv64T6jTDj.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              844316e1ea8993a2ce8ce777c24ba4be

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              545e57464e77db12821ade505c96568b8efe3c5f

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              9cc956a650fd9026a95ee5baa43d8a8d98e0a78937e562e189f9b12357fd9597

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              e8b0e8f3f3d8685886c8c63bf15cffe0763cf743c3c91ebeba4ef370183805ce8003607bcf1955167462d8afe53dfae55701246788e871a391969be44d223612

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Ng6uz08dwKft.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              9eb80d31c36e5cfd1144f01d1c9007ea

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              ae656663ae006306f5dedda34e1ba2caa5df0736

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              728b29690001c635c4e3fac3ae579b527ad72b0ea3778b8bddad3aa076f80781

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              41cf70d86eca3084518d0b289e701300a22207aa37584be0b878e6061b314147e45c13db64cb032fdcb950b6e9a1fc843dff88d8bf90edca3aafb28960fb9388

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\OJd3QT782dTq.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              b24688d95c355ece411f7d308918bd81

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              06d1a8992c11ba549f49f5e90002f0ea31083727

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              108813862f45a10b4e678b5af24eaff27d609ca4ed86903ec1293e686340aa4b

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              85e0fb3b029ba195dd7589588d410555d80d2094bf042e7a588d19976cdd18f80f67f499605b06a6fe582d0d067a76a0676a55fc37cc2d5028c2daab68ae3d75

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\OYUTlatW5fk0.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              81a5e6c8727d1010484041bc00116517

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              64b9d7306bd6128d894b8c62592204ea97ce9b5c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              1f8ed98f49f9600402c51fa1b9b9653110c4dc57db99f6e5f7ea9dd96d3029a8

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              06ec76489822f9c3c6d73d284662512b91310a7f96212ada6841e8ae97d291f727c8bd5dfcfb114ff73ae7d2bee42612305a18d881329451e968eae6d257d4b6

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Ow1IknZ4wHI5.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              a0dbb80caa540c5f128990a93e91b7df

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              54bf756b8d14fb33934321a7b875e4b488536964

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0bf425ec61fbf69d18d2c53eb553063d3fcffd99a647b135de0743f399f98be8

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              12bf97f3d245ebc2b747b4bbdee0c9632beca7ccc9f466d4db7d766c810ca9e01d18e8371c0397bde7ba7b485b5195d0273a9dd3e9c1c83376b24e3900c40ee3

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Ppshbrz0G1V9.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              2aa9712c1d48676207b4ccf3bdf57a68

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              3ffc3467a1639404a36e070fb4b713012c68406f

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              4bb236c3821591bae42c01933f4d56dd727a3dead0568a35c07563ab2ad1cd60

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              bf989cc98f2e55a75b335437b4f2000cfec34879137ad3482647fafafcf187c1c7b78a89e287494b979a46302a18aee3cd6d677c015b89b976abdf6cf6c1c82d

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SvmQivGvhHX7.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              6ef7004056235b0e12db896a31c9268e

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              896b7c3c669cc4a44dcd2f146ceefc7361e2731a

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              35a4cdc57afc17d3754f2b9956924275b9caa2658231ed0990f5eabfedb48c36

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              ce620cf0927926e63e4736a702d31e3d469be534893b877d56f01839fc7a32177d7ff1969a40a1f1fc5bac872907b0bc037d02b910eeae46b795369576dd970e

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\TNpnvxwom5sX.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              eec1f42a3497ac7e4bcc6ea361ce3075

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              20f76ae55e47ecd99ee0b90924538c62721ba88a

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              d941d54c905a74565a42ced6cedfd4f345f692653fa7ad6f5469b12e9a83e8b0

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              5f882e66bc5d9a174695fdefccbdf55219088624ba4d7f5c2a9b0184821e580f18778c175f6101003dca7a6ae360f9554dc6c829e29177ecbc1dbdb70c6a539e

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\WOYpvfiRr34y.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              92709caabae83a794d9b7f8d79e65b19

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              00cbc5fae7021f02c6737afadc52c4d5518ad520

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              184067e6f67bc7a66dc0a1beda7d89e4884dca03c338642eff3115d339b1c7fb

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              0d793f9e096fa4e3045cf0f31fef66af1608ed80c72c398a4ea681bdf593f308e9feab7f5e4c29e00d5967f0a5ba09e9d82b27d08ee565acf21490c5da3ff547

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XAwu7ZRw80Rw.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              f1729210424bfbe70c2eee8b89cc264e

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              f196c99243cce874789647518be284b26ddad49a

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              6af1cb9616f0796daa0aeab230b4d3ac2c513c6d8788b797990886b0ed90388d

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              f774d6fee8fd656f2c4784d8bbab0e67d615ae408a00a66f35259fc6e993135b789ade864a2d8d81de0e34b4668e8282878eaa849e587a071ed4807189df2373

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XUfhiMkP13hy.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              594c358f3cb1b7d37bb4332916d6735f

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              e3b7fd230e1ce7f3b9274299aa7cfd399380b5ca

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              67aab90c2a80f7c668d0cdb56ca2d0e4a698929392e2c789e8e77dc2e7421d73

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              d52fbfcd4737967807cad4591763dcb343e1e0cd4b3de2f69b082a5f426878538b11525a4af641129ea198a21d884eb9aa11ea5f9606010c6ae3706fc615ca1c

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XvkvR9GFlmbo.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              3efd1c4cf1b095bde29649ce62f9c641

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              bb76afd348a9b0aa128059fee8cb5e0246f3e7d0

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              8e637284442b202cd60e1b716c6a1b8ad8c6f6a998aee8b38ccff6a5244a8773

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              ebb9b3c2eb17f35552459c580755983d075d5df4388696baae9ed7e382dcaf4784f079f9d88a1110e94d1ce8a31105c1148b6bc99e3757e7aea27b4e66c5a18f

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xw4kRtyqI85l.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              45a9e78f7363b261073c5bc13be1206e

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              94963bb5d9e154ae7be3392c6b5f797c15e433e8

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              e559511388bf65ce13f0d53564a4092c99c049704728a4b2f971fe1db09ad2ad

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              0059b268f96b233050702ce141d4a9dcc5d02a4bab68da10b901a47fc1dc72e235d795af40618c1b494441f35db30f3653f5868d8c591dff0a017e199ec675df

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\YgAhoCutALa7.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              d08f2ad2ac1aeda5d606b268b7ee868d

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              0529963bd53f054510b40d96806a04fa3d936593

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              9be3a58d50cc5fbff216120db71c9458dd51f3cec1dec101d628ff1a7e2deb7e

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              01d862c413c7ad31e83c1096bc4b13ac5761ec602e0bbeaec6404be3948c8ca877723410de3595f995c35f8c479e8c21ca8fce74efde08e2aeeaaa89813d44d1

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\aR2DMQLZ0Yi4.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              f15952dd7a21abdab9ecccafb63022ad

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              f9b5aa3210f1ff21e60145d268f814b319d1f9ae

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              58e1d7d4fc44dfea5d67868195620c86678a608abc98c3428834e25b23e3bd32

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              5a0fb1353b4a116d262569773547234a06784e0e1749685feacb836f27b813a54ee82b1901f5432605f90cea8a390ea775169314a28c3f43d80a01d59715b0d7

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\aZWxv4NXHW6K.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              68084b85e3a6fb8db80918bc37378ba4

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              c6dac326a102997be4777046ca969a80c56b048a

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              e06269922bb1dae353c90ded8c7a514bfd4877d01207d9114cde47adacb93eaa

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              9d33877129411f7100a273ae6259650f5d296ccf05ba8fa92f39b1fd13a594a755c9e9e31d0c27119ff9bc387f7c003383a91add5db5617306a5379d3c51e480

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\c7JoWwjFjPO4.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              dedc80595eaa2a66442760e60661c38d

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              5131a593a86a7d7acd9efc5183250a2cd46fb64c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              34cbebde1d86eca6ee3c2014b65cdf12033d27f6e264a0d4c2f142f83c1b25a1

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              d6282857495d6a63afa06aa0557e801a75cf7b728ebc4924c6b010a54fdec45efe4622f1ca156ee814fee304f13b75aa5f79c552ca33173938ce1e84412e4b07

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cTyNQDkIOiaR.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              963de4f6336d84a397637ba126da1d50

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              e66388df799f02f7628f1d1cb9105351d17f53e2

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              62786ac44bafc4c719d1b0b245ce87d0b78e91cac3621d03d85c1fd737e6bb6a

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              5d67d05da0429df668823be4262c041fd87a4bf050c962f13f58182c94083d9adb681c780561fbb3d49f5cc12e26c6221ba45aa8a7bda805aaa2d94be2c13805

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\chYQSKguJp3c.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              7bf89c74b9326c4d8c65b2ef9c63faeb

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              fa27ad9a36514830bba70f6691bab769c5c46e05

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0d183ab57b7206f2c7d21d1c971d51f405feeffa7fb50f627da0f01ddd99f7cb

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              d59536f09106c32c297f4b00bdae7413d4b2d28c77b90faa8accf67c1cf7a33c42d5f3671f98048054c74605bbb8561579efa576fc48546520a9c5a74133c1f6

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dLRvZIXXnFZc.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              f977bf1397e7ed219d0d650a0e38dcb3

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              f33f43ca0dbca8cadb38f919924d34111114d886

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              cc13f3b2d477610522d72b6ebcc09f766e255c5d5025280f8ee5dd671cc2678c

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              294b8c60df27f1ddee948fd526529d6100d7f1d7526e69f9a541c7ee4dedb3059f68aae5c150f1de6b5865ef983b365f43174046f7885a805f4ff131df41521b

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dRfTSOHwn3HO.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              7987075bebc09c9b3906a324dc1ae3c8

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              b0a5bca44c70b708430a99568852f8051163542a

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              39f2867dfeffdc0ec35e63a9f24791b9548966ccd22bca5f31ea61d920b860b4

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              a2e40497f44ff9e4e353ecc96fa68b18081da9cd430c43d2f8acf51f05c86054fce6598c8aa80d6abdc6a544b1231cfff34e3f2c9b852527bd9a16dfcdd670d1

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\deZblS4ciePw.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              d086e0e2be9e57be60dfc07d331ff805

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              f523f528759bdc92c54000fb2a60dc932a75a673

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              d36b774fd32f5e59648b5c8cb2987586fc5ac3bd4b387a80f209b4ed74a69ef0

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              7e1ea63e9d91a9e716082f0cca6c37223c717942546b7da363c3a513af5bf1639e60e72fa01762a2639e32ede2248d76687ca953f9c0fae5f44d0c4c2d200e31

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dsSJTxQVZ7WB.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              c68a7af52aecc03c20163cb2c4a8983a

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              02195b27a1f38010168c035a2de8365ee8a8c4e3

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              f403b3af2931ece2015abcf4cc0b1c6bc91219ae8d6050f572fb0fbb8e0efcbe

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              6258aafc426db54e572975afca4d569a1165e8889aa4a6aeed6cbb5f4097d5252e7b7beac66c0642141fd30d620928eed307abd1c3dfd009c1f6b5756be318eb

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fKJ8e3wjDDyH.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              5a256781a5f8969f7ec9af8a6916977e

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              8e8e42a354c6600dfc5bd9d9ef743e9ca4743251

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              bdcdfba530f711ea70100f01730164106679b23f62f5b1949bd095d42dc8fd39

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              bdfa00d4cd7a591b9fd8d46ecb744a084aed07a7a08adbf577848f4d1d361550008775182c2e82f4fd97a040bb1e1e4aade01855241c9d88944019ea13e7e345

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\gXVSQaDclbgR.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              efea10ae5516bd0ddcaf800e118d3998

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              23a0dab7c68c500f06b941133475d130cdeb5f9c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              e983be67f215a3df9c9d87d12be19c410852aa1989aedcdc33ac010c12f3e456

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              7c2f6911155033dd83f17d70642b598142ad119e3a39f77f3a8f1570bd66eeb5b257c7ba26121c3a53c66c62bfc3287677380353fe45a1085d4580940e944b28

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\gs68aSVNbcPF.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              a5876082f12edd29c820fe6ed648ff22

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              eb51d2d21a64c5c90fdc4d7701bb01408e3d6aa3

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              29c42f78b2a770dbcca6d24f460cce5563525c2c004c7270655f69b4d5a0301e

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              3661b15171bd9f0952891113c2fb0cf6f6702a193058c35c0cfd8c8b859ec00d3539ff58114aec1c82106e6ec4e637150411acb8663733277d98c1db0b417674

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\j0D4LnBiipYL.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              7f25c905edfdb6b76ee0484c544b45a2

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              f1ac44775a37cea86f6bf63dc6edfc792b287eae

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0ed9b0bac2938a3d5c498d697b9681751fafdeb3f6fe35c3a12e292f6a6a1cdc

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              03b8f8f2ab644a731153d16a4b75bcfa0062543972473e6815f187880f898db5f01b029312ac069b1b946a49567a3352a65d4fe2bcfcd9a54ac61347a7884147

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jfqsLxkeJ3uI.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              92a28a21fc359e4eb40aaccbb0814f0b

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              95ae8ae3426b9badce10c341a96516ef5b4d0a11

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              6802c2d9520cbd781bf95d9317de77a4465f68bd5468a3eaddc2d4343c312077

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              38355c0a1877fa6655fb0489ef64512e2c402e7242329040c81b10db698c7beffd7472e4c008a732d2a1924a251a5a6643f5f5a9b33e8666a7236505cff6e302

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jtnQUd2Re81Y.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              a58fc8f2d9dcd1665b1210c2d5082b5e

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              8b3f94d9bd8b0d3129a9cc4968f0f24f4b570636

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              d79890502967b56cbdaee8136b09f16fd30b523c81ce41f2c5b5873569b0989d

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              f0138655b5119bbddafeb83081a7f6d46205e3d7bcf7a8304dd43baf09ca39a888f8c5ed20eef7078df036385bb2ccb4137e896bcb2b9ed26e23041cae52ddd4

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kz6c876wqnlv.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              924b7942af91d715d0817e47a087d19c

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              fc8f15ff385a697962e97062d0994c7ff1086eb8

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              064ccadf3d7f98fc912eeb86467f89e438932d7af289bafe888e044a49bb60ea

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              feaa55cd2d2b4625b732052e737ef4e4f4723764267176e755cc6d36a31add2acfa6cfa44fdb8e19882808b55fe40cf7d97dd769cda374ba214ecd87fbc8a4d8

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\oTC2bQTpPxom.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              51850ad4479b51b48cfba18e18012821

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              5a7177166b40e92774aaeec59b60185463050372

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              9b49d3dc3fcb13a1c0649a633127df114c2229edaea8714e2ce4808790887f74

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              171a302d81971a0cf90db04219a8b86bb63c0b334d0b28c4b2185fd61a5e591b18686510559a2f471debe7d233bca11dc300176b1b0fe8a3e408e986b7195536

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\okTPIVLHeCxv.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              8d787d27cf28a68ac1036450fdeb9e2d

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              7d073e3663c1703408b010c15b63c9f245f8d563

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              586abe6f381527c06ae1f024a7b84b504a85b8b2418fa0c5c1bde2bb35bc438f

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              2bdbc7c23b87edcbbad7e484cffb2cb5ffa6af75886e3b151a6a10b24286d1b34118cf9a9d118e4f306f3b549238a1aa77b16f2445860099c3b9386bdc800851

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\om9WHIYP77fM.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              c3fa5b5eecaed75fb69089f7ac1675c6

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              9f61d4bd385ce3fd556422cdccb528460b76518f

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0697974e366c1e503fe6f53bad90103820ea6bea28a90e2f5c9be718a0d0bba4

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              6089d486c45b3f6a32abd9a75c978d98059a11cee25bfb2e9cdaac98c2d54c5a18b516c7d30ae718fbb6d3f8f5632e0c7ee8280c4d842321f62576dcc72e31c6

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pAgqBNoNz36N.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              3d5a278dce0e9aa72dd5ead941d8916a

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              777ef38ac6a1b75afc08f9eb0b4c32dd3004ec8c

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              a76607d4ceddd8fa96777ca8a1d976709bfcd050025b8e0a3099825a105787b6

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              daa4dd2020bb8d50a1c2790d194b60b97578aa9f1489b916e04f4793a1aacebab3af60bc4dde9d82e52eb0d4e0f4bbdc57ced548e9f692c6e4ddf8bbbf0e10cc

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pYqbjRQwhgny.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              7f2420d6c6a89b867e86eeadb91b5ed8

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              d4be1c4e31a32137672cd19add1cc2f60c7165b1

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              cb7b5f1a9fd89ec54b1f2df9a8c46d27c9bbfe1144586c5c1b9e45262b24c48c

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              4bc24fc3045d1006f603bbfe0b158c39a59af5857e42fefa21a3cf700c895c157800bbd12efaacf4d935fc0abea422f3630448cff83417223fba966c19eb5037

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pdyo4kglQZLr.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              106fa2d3201f8fa2759c3a59d2cf92c1

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              97c8a36b755283cdbcb19dff7c03cc05143b540d

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              c07d89cb58760f888b0ca0c3c3e464811bbdcb9442c887198700334bb6751dab

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              2cb4b0e76e7c668562a775aed2c038fd6f40a57a3c77e576012d86edf474e05c952e65e268b41192ea37b2fc6793b56ae23c981e203b14fcef774327b2bc39c2

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qSMgVIVEqFdJ.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              2f5429ca7e0b2026205eb7991bc17e5c

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              e2653f053d0c5eba6d49311545de3064d41ca999

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              3e9865b4533694f21f265d679c429e95a4fa8000e52a8710b2506b0c1097dc53

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              145b0a69f5c3228962a0867359eba83cc8bdbb8b977775e503fb4157c3d5805dd65950bbda3fd4109ff41253309f2ed0f10bb64616ba4d140365008fd1361a1d

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qXZ5x3G5dPoe.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              9ccc56c159f7ee8710278573393b9bef

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              7012c7cd63a32fbb3733612627e098d399148ab9

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              7e3ea4ba8ab34e1e2ef824132348e579d2f7668597a966a23d4fa0d74971d125

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              ff4403913e35e664d6fcdc232c8946af45232653de1acc818dbf7506e3c42e0db0e11a83a2c41841bad65cb5fa8d89b6681e0e005486246e0b48906bd68b948f

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qsNCaJujVgnW.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              0e60bf26d5df8a883d9f2528645199ac

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              0396ba5ae02224c76841269bbd64b2c37bca3b83

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              4636aaf296dbee63a5d0b018c6ae298a3f75361c52f967aa62d17411d84712da

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              d499a9536e9a777aeda5c908e1e5678dbc801173da669801909e3097a4a56b5be647178d3865f01bf39e3151f62bab3e5170243c788178d3ac139a783a16f7ff

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\rQuuDVkrl3Vj.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              ff232d8d92f062288fbc7490e5fe09a3

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              5151845fbf5e0cd25e3ebd5b0f4f64acda5b971f

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              ca3adf659c46970cc68ddc733cb7cd9d3e610c4379220bea67c6eaaf9bf4b329

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              952be18bb842f96b401dd0d7a7dab51b7cc081285c5ec326eae27db02e0a18a44c6e68a7cb5c8e22495e56296321ccaf08dc7d60d44fa440b3be46cbd987b9be

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vwW5IAQTJwsm.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              7c4ef85d78361822dec284207d2d1436

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              a0f6e861252c3f6f25e82a2f123f91c88bb59c00

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              dbb35da9f84bd14d04b5428bd5f2d64f4d2bd1b89b9d29dc829798410a4d5122

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              d1cea85dcd91b9fef680cec8d2ac3d6a28c2ed3c69a631c0136b41b0eebcb006e5186db51f471268cd0ebd9b3ead85d3a75a6c51c07e87923f4defebff50a794

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xB4vz7z4qzJT.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              5979a35fa4a2663479e19c7bd94dd539

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              12040b0e06e3a796f66282a45a196037c6892150

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              0eedd3f9b04b1485d2ca5bbbcaca4ef8703d2507fb2cf24345b3c66452cb9c8b

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              a1f9afd747b79ee7fa489a1a37a753e6ef47e57d6479b5638b22526cb72090dceaf1372699c39f590bd85256f4c57685c33fde6d3b5a2260e9d7819c256871a7

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zYCrQ4jNLtUA.bat

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              224B

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              9aa90903afcee3aa268e693ab98e1c01

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              940ed49b88b0bbf3d502a6f5b71d5260f4ae77b4

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              25e5ab529dc8b122090dae63667d0a38b1273797d0389721f43279a3c19a3369

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              822932011d9a06fe5cbae5816e9a10673ef4f589cde565f283e39d3920656e9e699ef4a8e0b539e94da368ac2b005979123e2a304d55273ccd92c63a3eef1b4a

                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\Windows-Graphics-Loader.exe

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                              95da0645204d22bd9daf4e337ebeeaaa

                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                              58182d8cf8e83335a5b7312d0d4af79f4bd64212

                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                              ae5470b407120f90cd4c830260c8e965877199368d4a2982ff1a1769a2e08682

                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                              9257076c55b3cc6100f3299766bf7bf0be1e0b330c1cadca1d7ca46ff859e4afefeff3635fc15811cc2c7d6debd2fcb808cf5f96314c681b1dbc32d2a7305f9e

                                                                                                                                                                                                                                                            • memory/444-525-0x0000000000F90000-0x00000000012D8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/576-551-0x0000000000340000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/576-56-0x0000000000E80000-0x00000000011C8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/856-142-0x00000000003D0000-0x0000000000718000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/872-263-0x0000000001180000-0x00000000014C8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/952-456-0x0000000000830000-0x0000000000B78000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1084-313-0x00000000002B0000-0x00000000005F8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1232-99-0x0000000001370000-0x00000000016B8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1376-209-0x0000000000820000-0x0000000000B68000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1496-176-0x00000000008A0000-0x0000000000BE8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1500-447-0x00000000003B0000-0x00000000006F8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1792-465-0x0000000001120000-0x0000000001468000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1824-154-0x0000000000F30000-0x0000000001278000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/1924-569-0x00000000012F0000-0x0000000001638000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2064-534-0x0000000001260000-0x00000000015A8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2140-498-0x0000000000270000-0x00000000005B8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2144-165-0x00000000001C0000-0x0000000000508000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2236-2-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                            • memory/2236-8-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                            • memory/2236-0-0x000007FEF5AA3000-0x000007FEF5AA4000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                            • memory/2236-1-0x00000000009C0000-0x0000000000D08000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2240-78-0x00000000012D0000-0x0000000001618000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2276-404-0x0000000000D00000-0x0000000001048000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2300-34-0x0000000001030000-0x0000000001378000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2308-507-0x0000000000150000-0x0000000000498000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2328-438-0x0000000001300000-0x0000000001648000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2496-322-0x00000000013B0000-0x00000000016F8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2512-602-0x0000000000140000-0x0000000000488000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2532-21-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                            • memory/2532-9-0x0000000000320000-0x0000000000668000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2532-10-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                            • memory/2532-11-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                            • memory/2532-198-0x0000000000170000-0x00000000004B8000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2628-429-0x00000000000C0000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2676-395-0x0000000000300000-0x0000000000648000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2692-516-0x00000000002D0000-0x0000000000618000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2764-560-0x0000000000040000-0x0000000000388000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2832-23-0x0000000000FF0000-0x0000000001338000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                            • memory/2980-221-0x0000000001110000-0x0000000001458000-memory.dmp

                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                              3.3MB