Analysis

  • max time kernel
    900s
  • max time network
    904s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2025, 18:07

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 64 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 18 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2504
    • C:\Users\Admin\AppData\Local\Temp\qiegvc.exe
      "C:\Users\Admin\AppData\Local\Temp\qiegvc.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\qiegvc.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2392
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qiegvc.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1588
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\qiegvc.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "qiegvc" /tr "C:\Users\Admin\AppData\Roaming\qiegvc.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2932
      • C:\Users\Admin\AppData\Local\Temp\esregj.exe
        "C:\Users\Admin\AppData\Local\Temp\esregj.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
      • C:\Users\Admin\AppData\Local\Temp\udbfsy.exe
        "C:\Users\Admin\AppData\Local\Temp\udbfsy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2460
      • C:\Users\Admin\AppData\Local\Temp\etfqyg.exe
        "C:\Users\Admin\AppData\Local\Temp\etfqyg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2828
      • C:\Users\Admin\AppData\Local\Temp\msypis.exe
        "C:\Users\Admin\AppData\Local\Temp\msypis.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
    • C:\Users\Admin\AppData\Local\Temp\qezopt.exe
      "C:\Users\Admin\AppData\Local\Temp\qezopt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
    • C:\Users\Admin\AppData\Local\Temp\wmioxo.exe
      "C:\Users\Admin\AppData\Local\Temp\wmioxo.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2476
    • C:\Users\Admin\AppData\Local\Temp\fcdkxa.exe
      "C:\Users\Admin\AppData\Local\Temp\fcdkxa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1400
    • C:\Users\Admin\AppData\Local\Temp\hsonxe.exe
      "C:\Users\Admin\AppData\Local\Temp\hsonxe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:968
    • C:\Users\Admin\AppData\Local\Temp\cxlvve.exe
      "C:\Users\Admin\AppData\Local\Temp\cxlvve.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3052
    • C:\Users\Admin\AppData\Local\Temp\pdbuqx.exe
      "C:\Users\Admin\AppData\Local\Temp\pdbuqx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3040
    • C:\Users\Admin\AppData\Local\Temp\yruvbj.exe
      "C:\Users\Admin\AppData\Local\Temp\yruvbj.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:940
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "yruvbj" /tr "C:\Users\Admin\AppData\Roaming\yruvbj.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3036
      • C:\Users\Admin\AppData\Local\Temp\oqmnhq.exe
        "C:\Users\Admin\AppData\Local\Temp\oqmnhq.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Users\Admin\AppData\Local\Temp\rdqxsg.exe
        "C:\Users\Admin\AppData\Local\Temp\rdqxsg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2224
      • C:\Users\Admin\AppData\Local\Temp\rnzwyj.exe
        "C:\Users\Admin\AppData\Local\Temp\rnzwyj.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2068
      • C:\Users\Admin\AppData\Local\Temp\gtiasi.exe
        "C:\Users\Admin\AppData\Local\Temp\gtiasi.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:948
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "gtiasi" /tr "C:\Users\Admin\AppData\Roaming\gtiasi.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2112
        • C:\Users\Admin\AppData\Local\Temp\qstswo.exe
          "C:\Users\Admin\AppData\Local\Temp\qstswo.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2520
        • C:\Users\Admin\AppData\Local\Temp\ndfxcf.exe
          "C:\Users\Admin\AppData\Local\Temp\ndfxcf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2700
        • C:\Users\Admin\AppData\Local\Temp\djwqbp.exe
          "C:\Users\Admin\AppData\Local\Temp\djwqbp.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:2164
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "djwqbp" /tr "C:\Users\Admin\AppData\Roaming\djwqbp.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2680
          • C:\Users\Admin\AppData\Local\Temp\erlhyx.exe
            "C:\Users\Admin\AppData\Local\Temp\erlhyx.exe"
            5⤵
              PID:2480
            • C:\Users\Admin\AppData\Local\Temp\ukysez.exe
              "C:\Users\Admin\AppData\Local\Temp\ukysez.exe"
              5⤵
                PID:2304
              • C:\Users\Admin\AppData\Local\Temp\zmftcx.exe
                "C:\Users\Admin\AppData\Local\Temp\zmftcx.exe"
                5⤵
                  PID:2800
                • C:\Users\Admin\AppData\Local\Temp\tzjncx.exe
                  "C:\Users\Admin\AppData\Local\Temp\tzjncx.exe"
                  5⤵
                  • Drops startup file
                  • Adds Run key to start application
                  PID:328
                  • C:\Windows\System32\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "tzjncx" /tr "C:\Users\Admin\AppData\Roaming\tzjncx.exe"
                    6⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2680
                  • C:\Users\Admin\AppData\Local\Temp\vkmuoy.exe
                    "C:\Users\Admin\AppData\Local\Temp\vkmuoy.exe"
                    6⤵
                      PID:912
                    • C:\Users\Admin\AppData\Local\Temp\zbnfxv.exe
                      "C:\Users\Admin\AppData\Local\Temp\zbnfxv.exe"
                      6⤵
                        PID:2116
                      • C:\Users\Admin\AppData\Local\Temp\wwfacc.exe
                        "C:\Users\Admin\AppData\Local\Temp\wwfacc.exe"
                        6⤵
                          PID:1140
                        • C:\Users\Admin\AppData\Local\Temp\ekahdx.exe
                          "C:\Users\Admin\AppData\Local\Temp\ekahdx.exe"
                          6⤵
                            PID:2068
                          • C:\Users\Admin\AppData\Local\Temp\usetld.exe
                            "C:\Users\Admin\AppData\Local\Temp\usetld.exe"
                            6⤵
                              PID:2336
                            • C:\Users\Admin\AppData\Local\Temp\lmaoev.exe
                              "C:\Users\Admin\AppData\Local\Temp\lmaoev.exe"
                              6⤵
                                PID:1700
                              • C:\Users\Admin\AppData\Local\Temp\cbelcz.exe
                                "C:\Users\Admin\AppData\Local\Temp\cbelcz.exe"
                                6⤵
                                • Drops startup file
                                • Adds Run key to start application
                                PID:1760
                                • C:\Windows\System32\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "cbelcz" /tr "C:\Users\Admin\AppData\Roaming\cbelcz.exe"
                                  7⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2544
                                • C:\Users\Admin\AppData\Local\Temp\iyypqj.exe
                                  "C:\Users\Admin\AppData\Local\Temp\iyypqj.exe"
                                  7⤵
                                  • Drops startup file
                                  • Adds Run key to start application
                                  PID:2636
                                  • C:\Windows\System32\schtasks.exe
                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "iyypqj" /tr "C:\Users\Admin\AppData\Roaming\iyypqj.exe"
                                    8⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2192
                                  • C:\Users\Admin\AppData\Local\Temp\unnorr.exe
                                    "C:\Users\Admin\AppData\Local\Temp\unnorr.exe"
                                    8⤵
                                      PID:2284
                                    • C:\Users\Admin\AppData\Local\Temp\zqgrft.exe
                                      "C:\Users\Admin\AppData\Local\Temp\zqgrft.exe"
                                      8⤵
                                        PID:2612
                                    • C:\Users\Admin\AppData\Local\Temp\vsulgt.exe
                                      "C:\Users\Admin\AppData\Local\Temp\vsulgt.exe"
                                      7⤵
                                        PID:1620
                                      • C:\Users\Admin\AppData\Local\Temp\jitdxf.exe
                                        "C:\Users\Admin\AppData\Local\Temp\jitdxf.exe"
                                        7⤵
                                          PID:1872
                                        • C:\Users\Admin\AppData\Local\Temp\jxgbpa.exe
                                          "C:\Users\Admin\AppData\Local\Temp\jxgbpa.exe"
                                          7⤵
                                          • Adds Run key to start application
                                          PID:1480
                                          • C:\Windows\System32\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jxgbpa" /tr "C:\Users\Admin\AppData\Roaming\jxgbpa.exe"
                                            8⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3024
                                        • C:\Users\Admin\AppData\Local\Temp\yqngvz.exe
                                          "C:\Users\Admin\AppData\Local\Temp\yqngvz.exe"
                                          7⤵
                                            PID:1824
                                        • C:\Users\Admin\AppData\Local\Temp\qrpium.exe
                                          "C:\Users\Admin\AppData\Local\Temp\qrpium.exe"
                                          6⤵
                                            PID:2316
                                          • C:\Users\Admin\AppData\Local\Temp\dxbfxz.exe
                                            "C:\Users\Admin\AppData\Local\Temp\dxbfxz.exe"
                                            6⤵
                                              PID:2820
                                            • C:\Users\Admin\AppData\Local\Temp\lnhpav.exe
                                              "C:\Users\Admin\AppData\Local\Temp\lnhpav.exe"
                                              6⤵
                                                PID:2276
                                              • C:\Users\Admin\AppData\Local\Temp\ufqkuk.exe
                                                "C:\Users\Admin\AppData\Local\Temp\ufqkuk.exe"
                                                6⤵
                                                  PID:2940
                                                • C:\Users\Admin\AppData\Local\Temp\vhrjya.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\vhrjya.exe"
                                                  6⤵
                                                    PID:956
                                                  • C:\Users\Admin\AppData\Local\Temp\yshbrl.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\yshbrl.exe"
                                                    6⤵
                                                      PID:2172
                                                    • C:\Users\Admin\AppData\Local\Temp\hlxrqn.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\hlxrqn.exe"
                                                      6⤵
                                                        PID:1556
                                                    • C:\Users\Admin\AppData\Local\Temp\xjclxp.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\xjclxp.exe"
                                                      5⤵
                                                        PID:2204
                                                      • C:\Users\Admin\AppData\Local\Temp\hqjkuy.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\hqjkuy.exe"
                                                        5⤵
                                                          PID:2964
                                                        • C:\Users\Admin\AppData\Local\Temp\qpmhpt.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\qpmhpt.exe"
                                                          5⤵
                                                            PID:540
                                                          • C:\Users\Admin\AppData\Local\Temp\lfvdxi.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\lfvdxi.exe"
                                                            5⤵
                                                              PID:2464
                                                            • C:\Users\Admin\AppData\Local\Temp\kadtzm.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\kadtzm.exe"
                                                              5⤵
                                                                PID:2552
                                                              • C:\Users\Admin\AppData\Local\Temp\prooko.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\prooko.exe"
                                                                5⤵
                                                                  PID:888
                                                                • C:\Users\Admin\AppData\Local\Temp\vjnilo.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\vjnilo.exe"
                                                                  5⤵
                                                                    PID:1264
                                                                  • C:\Users\Admin\AppData\Local\Temp\posgdn.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\posgdn.exe"
                                                                    5⤵
                                                                      PID:2820
                                                                    • C:\Users\Admin\AppData\Local\Temp\kmjpbw.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\kmjpbw.exe"
                                                                      5⤵
                                                                        PID:2864
                                                                      • C:\Users\Admin\AppData\Local\Temp\btltbx.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\btltbx.exe"
                                                                        5⤵
                                                                          PID:2828
                                                                        • C:\Users\Admin\AppData\Local\Temp\mnqwvc.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\mnqwvc.exe"
                                                                          5⤵
                                                                            PID:1748
                                                                          • C:\Users\Admin\AppData\Local\Temp\kcfxlg.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\kcfxlg.exe"
                                                                            5⤵
                                                                              PID:740
                                                                            • C:\Users\Admin\AppData\Local\Temp\gcuhnj.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\gcuhnj.exe"
                                                                              5⤵
                                                                                PID:1552
                                                                              • C:\Users\Admin\AppData\Local\Temp\qdwqin.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\qdwqin.exe"
                                                                                5⤵
                                                                                  PID:2008
                                                                                • C:\Users\Admin\AppData\Local\Temp\dzprmq.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\dzprmq.exe"
                                                                                  5⤵
                                                                                    PID:2036
                                                                                • C:\Users\Admin\AppData\Local\Temp\znlwpa.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\znlwpa.exe"
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:1592
                                                                                • C:\Users\Admin\AppData\Local\Temp\cwmzjd.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\cwmzjd.exe"
                                                                                  4⤵
                                                                                    PID:2504
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ykdiir.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\ykdiir.exe"
                                                                                    4⤵
                                                                                      PID:2432
                                                                                    • C:\Users\Admin\AppData\Local\Temp\fwnphc.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\fwnphc.exe"
                                                                                      4⤵
                                                                                        PID:1856
                                                                                      • C:\Users\Admin\AppData\Local\Temp\nrhfep.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\nrhfep.exe"
                                                                                        4⤵
                                                                                          PID:2916
                                                                                        • C:\Users\Admin\AppData\Local\Temp\egxpou.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\egxpou.exe"
                                                                                          4⤵
                                                                                            PID:548
                                                                                          • C:\Users\Admin\AppData\Local\Temp\vtdtqz.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\vtdtqz.exe"
                                                                                            4⤵
                                                                                              PID:1988
                                                                                            • C:\Users\Admin\AppData\Local\Temp\boucys.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\boucys.exe"
                                                                                              4⤵
                                                                                                PID:2512
                                                                                              • C:\Users\Admin\AppData\Local\Temp\bvaeke.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\bvaeke.exe"
                                                                                                4⤵
                                                                                                  PID:2736
                                                                                                • C:\Users\Admin\AppData\Local\Temp\bkgijy.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bkgijy.exe"
                                                                                                  4⤵
                                                                                                    PID:1044
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\swswvc.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\swswvc.exe"
                                                                                                    4⤵
                                                                                                      PID:2372
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fivinp.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fivinp.exe"
                                                                                                      4⤵
                                                                                                        PID:2788
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\omgnnt.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\omgnnt.exe"
                                                                                                        4⤵
                                                                                                          PID:2356
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ikspei.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ikspei.exe"
                                                                                                          4⤵
                                                                                                            PID:2452
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\pzwtoe.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\pzwtoe.exe"
                                                                                                            4⤵
                                                                                                              PID:2136
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\omkeat.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\omkeat.exe"
                                                                                                              4⤵
                                                                                                                PID:332
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hftswq.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hftswq.exe"
                                                                                                                4⤵
                                                                                                                  PID:2364
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xsilpy.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xsilpy.exe"
                                                                                                                  4⤵
                                                                                                                    PID:2140
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ynxmay.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ynxmay.exe"
                                                                                                                    4⤵
                                                                                                                      PID:2320
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fdsjhv.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fdsjhv.exe"
                                                                                                                      4⤵
                                                                                                                        PID:1512
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hsroos.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hsroos.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:2988
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\uwgukx.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\uwgukx.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:2928
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dpdups.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dpdups.exe"
                                                                                                                      3⤵
                                                                                                                      • Drops startup file
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Adds Run key to start application
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:1516
                                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dpdups" /tr "C:\Users\Admin\AppData\Roaming\dpdups.exe"
                                                                                                                        4⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:2332
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wwxxle.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\wwxxle.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:2528
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\utgwcv.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\utgwcv.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:2332
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rjxsxw.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\rjxsxw.exe"
                                                                                                                        4⤵
                                                                                                                          PID:2216
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\yvwmsl.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\yvwmsl.exe"
                                                                                                                          4⤵
                                                                                                                            PID:2620
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\lcfzsi.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\lcfzsi.exe"
                                                                                                                            4⤵
                                                                                                                              PID:924
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zmzwcx.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zmzwcx.exe"
                                                                                                                              4⤵
                                                                                                                                PID:2212
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hpvnru.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hpvnru.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:2604
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cyhnsu.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cyhnsu.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:608
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kkdpvn.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kkdpvn.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:2648
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\skemmj.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\skemmj.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:2916
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yubyxq.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yubyxq.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:1156
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wvgzli.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wvgzli.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:1692
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bkdckt.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bkdckt.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:972
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dyjlpi.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\dyjlpi.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:956
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ekqlds.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ekqlds.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:1508
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tvdlox.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tvdlox.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:2596
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sdbrrw.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\sdbrrw.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2968
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nkzuol.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\nkzuol.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:2352
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\kqakjn.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\kqakjn.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:1492
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\znettm.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\znettm.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1700
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\akrngp.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\akrngp.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2604
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ygmuff.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ygmuff.exe"
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                            PID:1692
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\sdsyua.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\sdsyua.exe"
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:2644
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\foyegp.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\foyegp.exe"
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:1348
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ycoxcv.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ycoxcv.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:1592
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\axdbsi.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\axdbsi.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:1724
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fldqcl.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fldqcl.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1560
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wmmmwl.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wmmmwl.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:632
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\avbfpv.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\avbfpv.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:1512
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zyjovm.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zyjovm.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:744
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\eadqui.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\eadqui.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2660
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bqkjsi.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bqkjsi.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:2276
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wpmmit.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wpmmit.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:1264
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cmgdxg.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cmgdxg.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2116
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\uuhicu.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\uuhicu.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:2828
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zqqrlb.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zqqrlb.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:884
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ifsdkf.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ifsdkf.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2872
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\arctia.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\arctia.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:2464
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jnqplj.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jnqplj.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:1564
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gbdwwz.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gbdwwz.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:912
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\btoqjc.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\btoqjc.exe"
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:1088
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\sfdkec.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\sfdkec.exe"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:1512
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bzbbcf.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bzbbcf.exe"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:2632
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dhkwtb.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dhkwtb.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:1776
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\agldzd.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\agldzd.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:2388
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ncgvlr.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ncgvlr.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:2660
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ibqeyu.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ibqeyu.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:2156
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nlmglg.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\nlmglg.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:1656
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gmqekq.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\gmqekq.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:804
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tgejvp.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tgejvp.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:2168
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmeygo.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tmeygo.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:2676
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\qcfdma.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\qcfdma.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:2972
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tyjqji.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tyjqji.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:2200
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ptuewn.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ptuewn.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:912
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mjrqbf.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\mjrqbf.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:944
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nygbll.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nygbll.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:332
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\poeypj.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\poeypj.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:2740
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bdzqll.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bdzqll.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:2648
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hcwvub.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hcwvub.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:2672
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\uoprmx.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\uoprmx.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:2636
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wabapn.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wabapn.exe"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:2676
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\urnxbu.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\urnxbu.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:916
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ereldt.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ereldt.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:1592
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nvxfiz.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nvxfiz.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:2824
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ireegx.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ireegx.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:2856
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vycgbp.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vycgbp.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:1140
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hanmwt.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hanmwt.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:2760
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\yjbcrd.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\yjbcrd.exe"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:844
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xjkweq.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xjkweq.exe"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:1536
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zqrcry.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zqrcry.exe"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:1988
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jplqbd.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jplqbd.exe"
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:1804
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rxpodd.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rxpodd.exe"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:2992
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gbzehz.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gbzehz.exe"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                      PID:2384
                                                                                                                                                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                                    taskeng.exe {6EA86317-B420-4B18-A2AD-328660612ECF} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                    PID:964
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1300
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1488
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:816
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2344
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2044
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:592
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1772
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2900
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2936
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2188
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2676
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2000
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2100
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:700
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2724
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2720
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2968
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2864
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:884
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1576
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2340
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1040
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:2140
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:3028
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:1996
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        PID:972
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:820
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:2348
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:2756
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:2284
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:2536
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:2332
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:2872
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                        PID:1576
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:2792
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:1748
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:2172
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:524
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:876
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:672
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:432
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:1340
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:2176
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:3052
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:1528
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:2996
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2744
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2240
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:1284
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\cbelcz.exe
                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\cbelcz.exe
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2024
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:1992
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2880
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:1712
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:2632
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:2944
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:2692
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:2612
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\iyypqj.exe
                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\iyypqj.exe
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:2696
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\cbelcz.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\cbelcz.exe
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:1592
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\tzjncx.exe
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:2860
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\dpdups.exe
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:2752
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\yruvbj.exe
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:1712
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\djwqbp.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:900
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\gtiasi.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:2736
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qiegvc.exe
                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                      PID:1800
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                        PID:1052

                                                                                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cwmzjd.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      30KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\gtiasi.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      166KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ikspei.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      161KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jxgbpa.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      159KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lnhpav.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      161KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qiegvc.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      34KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qstswo.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      156KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sdsyua.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      152KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wmmmwl.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      151KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\yruvbj.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      159KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      59KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                      1d07b8db2a6453717b97985c42ab6f62

                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                      d3ca98a5adcf591ba5075703133efc92de619a1c

                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                      6f863c4015e5809d839010f706df2e30498d32d50390d19468ad2d3ae24468fc

                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                      c1eea372667b857b58a1cc83ef1ba051961d89036126fb7e6946d2748233233b76ffab75040f048698abaa48a02943dd30a5e50ffd298a53b90b16eb06521757

                                                                                                                                                                                                                                                                                                                    • memory/328-394-0x0000000000880000-0x00000000008AC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/332-370-0x0000000000380000-0x000000000038E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/700-188-0x0000000000170000-0x0000000000186000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/804-225-0x00000000011E0000-0x0000000001210000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/816-76-0x00000000009E0000-0x00000000009F6000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/884-278-0x00000000011C0000-0x00000000011EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/912-311-0x0000000000F30000-0x0000000000F5C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/924-382-0x0000000000360000-0x000000000036E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/940-142-0x0000000000380000-0x00000000003AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/944-346-0x0000000000820000-0x000000000082E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/948-207-0x0000000000D30000-0x0000000000D60000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/968-120-0x00000000010D0000-0x00000000010DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/972-323-0x0000000000FA0000-0x0000000000FD0000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/1300-16-0x00000000000F0000-0x0000000000106000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/1348-301-0x0000000001160000-0x000000000118C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/1400-71-0x0000000000230000-0x000000000023E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1488-77-0x0000000000EE0000-0x0000000000EEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1516-247-0x0000000000BE0000-0x0000000000C0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/1560-386-0x0000000000A60000-0x0000000000A6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1576-351-0x0000000000F90000-0x0000000000FBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/1576-277-0x0000000000F70000-0x0000000000FA0000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/1588-43-0x00000000023A0000-0x00000000023A8000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                                                                    • memory/1588-42-0x000000001B2A0000-0x000000001B582000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                                                                                                                    • memory/1592-343-0x0000000001140000-0x000000000114E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1592-298-0x0000000000E20000-0x0000000000E4C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/1656-213-0x0000000000950000-0x0000000000980000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/1692-264-0x0000000000A10000-0x0000000000A3E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/1724-366-0x00000000003C0000-0x00000000003CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1772-110-0x0000000000220000-0x0000000000236000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/1776-156-0x00000000013C0000-0x00000000013EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/1832-23-0x00000000003A0000-0x00000000003AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1832-78-0x0000000002070000-0x000000000207A000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                                                                                                                    • memory/1856-383-0x0000000000D70000-0x0000000000D7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/1996-325-0x0000000000250000-0x000000000027E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2000-186-0x0000000000290000-0x000000000029E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2044-106-0x00000000012A0000-0x00000000012B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2068-194-0x0000000000F10000-0x0000000000F1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2100-187-0x0000000000D40000-0x0000000000D6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2112-50-0x000000001B140000-0x000000001B422000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                                                                                                                    • memory/2112-51-0x0000000002670000-0x0000000002678000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                                                                    • memory/2140-279-0x0000000000330000-0x000000000033E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2156-200-0x00000000011A0000-0x00000000011AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2164-284-0x00000000009D0000-0x00000000009FC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2168-242-0x0000000000910000-0x0000000000940000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/2188-136-0x00000000009A0000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2200-291-0x0000000000AB0000-0x0000000000ADC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2216-338-0x0000000000830000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2224-174-0x00000000009F0000-0x00000000009FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2284-349-0x0000000000180000-0x00000000001AC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2332-320-0x00000000001C0000-0x00000000001EC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2344-107-0x00000000012B0000-0x00000000012BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2348-324-0x00000000003A0000-0x00000000003CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2388-168-0x0000000000B70000-0x0000000000B7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2392-35-0x00000000022F0000-0x00000000022F8000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                                                                    • memory/2392-34-0x000000001B270000-0x000000001B552000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                                                                                                                    • memory/2424-11-0x000007FEF66E3000-0x000007FEF66E4000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                    • memory/2424-10-0x000007FEF66E0000-0x000007FEF70CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      9.9MB

                                                                                                                                                                                                                                                                                                                    • memory/2424-0-0x000007FEF66E3000-0x000007FEF66E4000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                    • memory/2424-12-0x000007FEF66E0000-0x000007FEF70CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      9.9MB

                                                                                                                                                                                                                                                                                                                    • memory/2424-1-0x0000000000100000-0x0000000000116000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2432-360-0x0000000000230000-0x000000000023E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2460-90-0x0000000000C20000-0x0000000000C36000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2476-56-0x0000000000810000-0x000000000081E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2480-332-0x0000000000F90000-0x0000000000F9E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2504-339-0x00000000012A0000-0x00000000012AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2520-250-0x0000000001100000-0x000000000112E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2528-317-0x0000000000D20000-0x0000000000D4C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2536-348-0x00000000001F0000-0x000000000021E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2552-103-0x00000000008B0000-0x00000000008C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2620-365-0x00000000013E0000-0x00000000013EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2644-287-0x0000000000A20000-0x0000000000A4C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2660-180-0x0000000000350000-0x000000000035E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2676-135-0x0000000000110000-0x000000000011E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2676-254-0x0000000000230000-0x000000000025E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2700-261-0x0000000000B10000-0x0000000000B3E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2720-237-0x00000000003B0000-0x00000000003E0000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/2724-235-0x0000000000EC0000-0x0000000000EEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2740-390-0x0000000000BB0000-0x0000000000BBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2768-84-0x0000000000D10000-0x0000000000D26000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2792-350-0x0000000001220000-0x0000000001236000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2800-375-0x00000000001A0000-0x00000000001AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2828-97-0x0000000000940000-0x0000000000956000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2864-236-0x00000000011A0000-0x00000000011B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2872-347-0x0000000001340000-0x000000000134E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2896-162-0x00000000013A0000-0x00000000013AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2900-114-0x0000000000210000-0x000000000021E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2916-399-0x0000000000160000-0x000000000018C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/2928-233-0x0000000001010000-0x0000000001040000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/2936-113-0x0000000000850000-0x0000000000866000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                    • memory/2968-238-0x00000000000D0000-0x00000000000DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/2972-270-0x0000000000030000-0x000000000005E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                                                                                                                    • memory/2988-218-0x0000000001070000-0x00000000010A0000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                                                                                    • memory/3028-322-0x0000000001030000-0x000000000105C000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                    • memory/3036-29-0x0000000000E50000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/3040-132-0x0000000000FF0000-0x0000000000FFE000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                                                    • memory/3052-126-0x0000000001310000-0x000000000131E000-memory.dmp

                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                      56KB