Analysis

  • max time kernel
    899s
  • max time network
    899s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 64 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2088
    • C:\Users\Admin\AppData\Local\Temp\eqbhpo.exe
      "C:\Users\Admin\AppData\Local\Temp\eqbhpo.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\eqbhpo.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2912
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'eqbhpo.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\eqbhpo.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1232
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "eqbhpo" /tr "C:\Users\Admin\AppData\Roaming\eqbhpo.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2864
    • C:\Users\Admin\AppData\Local\Temp\vwvmqu.exe
      "C:\Users\Admin\AppData\Local\Temp\vwvmqu.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2828
    • C:\Users\Admin\AppData\Local\Temp\wzxbdp.exe
      "C:\Users\Admin\AppData\Local\Temp\wzxbdp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2436
    • C:\Users\Admin\AppData\Local\Temp\ugzcok.exe
      "C:\Users\Admin\AppData\Local\Temp\ugzcok.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ugzcok" /tr "C:\Users\Admin\AppData\Roaming\ugzcok.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\koonim.exe
        "C:\Users\Admin\AppData\Local\Temp\koonim.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
      • C:\Users\Admin\AppData\Local\Temp\uqksoy.exe
        "C:\Users\Admin\AppData\Local\Temp\uqksoy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\zupfxc.exe
        "C:\Users\Admin\AppData\Local\Temp\zupfxc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:108
      • C:\Users\Admin\AppData\Local\Temp\poweul.exe
        "C:\Users\Admin\AppData\Local\Temp\poweul.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "poweul" /tr "C:\Users\Admin\AppData\Roaming\poweul.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2068
        • C:\Users\Admin\AppData\Local\Temp\eepdsn.exe
          "C:\Users\Admin\AppData\Local\Temp\eepdsn.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1856
        • C:\Users\Admin\AppData\Local\Temp\zjmqzn.exe
          "C:\Users\Admin\AppData\Local\Temp\zjmqzn.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1852
        • C:\Users\Admin\AppData\Local\Temp\ndfgga.exe
          "C:\Users\Admin\AppData\Local\Temp\ndfgga.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:912
        • C:\Users\Admin\AppData\Local\Temp\uzsvbj.exe
          "C:\Users\Admin\AppData\Local\Temp\uzsvbj.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2896
        • C:\Users\Admin\AppData\Local\Temp\ufsevs.exe
          "C:\Users\Admin\AppData\Local\Temp\ufsevs.exe"
          4⤵
          • Executes dropped EXE
          PID:1388
        • C:\Users\Admin\AppData\Local\Temp\xptday.exe
          "C:\Users\Admin\AppData\Local\Temp\xptday.exe"
          4⤵
            PID:968
          • C:\Users\Admin\AppData\Local\Temp\pzabmq.exe
            "C:\Users\Admin\AppData\Local\Temp\pzabmq.exe"
            4⤵
              PID:1032
            • C:\Users\Admin\AppData\Local\Temp\nvfwfk.exe
              "C:\Users\Admin\AppData\Local\Temp\nvfwfk.exe"
              4⤵
                PID:1512
              • C:\Users\Admin\AppData\Local\Temp\ezptih.exe
                "C:\Users\Admin\AppData\Local\Temp\ezptih.exe"
                4⤵
                  PID:2240
                • C:\Users\Admin\AppData\Local\Temp\fjcgjn.exe
                  "C:\Users\Admin\AppData\Local\Temp\fjcgjn.exe"
                  4⤵
                    PID:2576
                  • C:\Users\Admin\AppData\Local\Temp\uuotsj.exe
                    "C:\Users\Admin\AppData\Local\Temp\uuotsj.exe"
                    4⤵
                      PID:1032
                    • C:\Users\Admin\AppData\Local\Temp\ujdhqg.exe
                      "C:\Users\Admin\AppData\Local\Temp\ujdhqg.exe"
                      4⤵
                        PID:1988
                      • C:\Users\Admin\AppData\Local\Temp\asmchg.exe
                        "C:\Users\Admin\AppData\Local\Temp\asmchg.exe"
                        4⤵
                          PID:1872
                        • C:\Users\Admin\AppData\Local\Temp\exahav.exe
                          "C:\Users\Admin\AppData\Local\Temp\exahav.exe"
                          4⤵
                            PID:2464
                          • C:\Users\Admin\AppData\Local\Temp\dehlxq.exe
                            "C:\Users\Admin\AppData\Local\Temp\dehlxq.exe"
                            4⤵
                              PID:2080
                            • C:\Users\Admin\AppData\Local\Temp\vjqmgs.exe
                              "C:\Users\Admin\AppData\Local\Temp\vjqmgs.exe"
                              4⤵
                                PID:944
                              • C:\Users\Admin\AppData\Local\Temp\bucvbv.exe
                                "C:\Users\Admin\AppData\Local\Temp\bucvbv.exe"
                                4⤵
                                  PID:2856
                                • C:\Users\Admin\AppData\Local\Temp\hwjitp.exe
                                  "C:\Users\Admin\AppData\Local\Temp\hwjitp.exe"
                                  4⤵
                                    PID:2632
                                  • C:\Users\Admin\AppData\Local\Temp\vdcwcl.exe
                                    "C:\Users\Admin\AppData\Local\Temp\vdcwcl.exe"
                                    4⤵
                                      PID:2952
                                    • C:\Users\Admin\AppData\Local\Temp\nmuspn.exe
                                      "C:\Users\Admin\AppData\Local\Temp\nmuspn.exe"
                                      4⤵
                                        PID:2980
                                      • C:\Users\Admin\AppData\Local\Temp\bilmlh.exe
                                        "C:\Users\Admin\AppData\Local\Temp\bilmlh.exe"
                                        4⤵
                                          PID:628
                                        • C:\Users\Admin\AppData\Local\Temp\qnluam.exe
                                          "C:\Users\Admin\AppData\Local\Temp\qnluam.exe"
                                          4⤵
                                            PID:3036
                                          • C:\Users\Admin\AppData\Local\Temp\divead.exe
                                            "C:\Users\Admin\AppData\Local\Temp\divead.exe"
                                            4⤵
                                              PID:2056
                                            • C:\Users\Admin\AppData\Local\Temp\mvlsqu.exe
                                              "C:\Users\Admin\AppData\Local\Temp\mvlsqu.exe"
                                              4⤵
                                                PID:2244
                                              • C:\Users\Admin\AppData\Local\Temp\ozhfzu.exe
                                                "C:\Users\Admin\AppData\Local\Temp\ozhfzu.exe"
                                                4⤵
                                                  PID:2876
                                                • C:\Users\Admin\AppData\Local\Temp\yieott.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\yieott.exe"
                                                  4⤵
                                                    PID:2088
                                                  • C:\Users\Admin\AppData\Local\Temp\jvlbsf.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\jvlbsf.exe"
                                                    4⤵
                                                      PID:2856
                                                    • C:\Users\Admin\AppData\Local\Temp\dbdpst.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\dbdpst.exe"
                                                      4⤵
                                                        PID:1908
                                                    • C:\Users\Admin\AppData\Local\Temp\pwdmyr.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\pwdmyr.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:764
                                                    • C:\Users\Admin\AppData\Local\Temp\kzceag.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\kzceag.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2772
                                                    • C:\Users\Admin\AppData\Local\Temp\orznin.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\orznin.exe"
                                                      3⤵
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2616
                                                      • C:\Windows\System32\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "orznin" /tr "C:\Users\Admin\AppData\Roaming\orznin.exe"
                                                        4⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:2840
                                                      • C:\Users\Admin\AppData\Local\Temp\wbzxys.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\wbzxys.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2680
                                                      • C:\Users\Admin\AppData\Local\Temp\zygigb.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\zygigb.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2176
                                                      • C:\Users\Admin\AppData\Local\Temp\fatvnp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\fatvnp.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:1336
                                                      • C:\Users\Admin\AppData\Local\Temp\xwikyj.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\xwikyj.exe"
                                                        4⤵
                                                          PID:2012
                                                        • C:\Users\Admin\AppData\Local\Temp\cwhkjh.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\cwhkjh.exe"
                                                          4⤵
                                                            PID:2228
                                                          • C:\Users\Admin\AppData\Local\Temp\unehiq.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\unehiq.exe"
                                                            4⤵
                                                              PID:2364
                                                            • C:\Users\Admin\AppData\Local\Temp\fhrmix.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\fhrmix.exe"
                                                              4⤵
                                                                PID:2032
                                                              • C:\Users\Admin\AppData\Local\Temp\scxnxs.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\scxnxs.exe"
                                                                4⤵
                                                                  PID:2184
                                                                • C:\Users\Admin\AppData\Local\Temp\hdpeea.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\hdpeea.exe"
                                                                  4⤵
                                                                    PID:2544
                                                                  • C:\Users\Admin\AppData\Local\Temp\dlcquc.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\dlcquc.exe"
                                                                    4⤵
                                                                      PID:3024
                                                                    • C:\Users\Admin\AppData\Local\Temp\looynt.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\looynt.exe"
                                                                      4⤵
                                                                        PID:1764
                                                                      • C:\Users\Admin\AppData\Local\Temp\xxrcqf.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\xxrcqf.exe"
                                                                        4⤵
                                                                          PID:2756
                                                                        • C:\Users\Admin\AppData\Local\Temp\xloksw.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\xloksw.exe"
                                                                          4⤵
                                                                            PID:904
                                                                          • C:\Users\Admin\AppData\Local\Temp\lpyodf.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\lpyodf.exe"
                                                                            4⤵
                                                                              PID:3068
                                                                            • C:\Users\Admin\AppData\Local\Temp\sqiddx.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\sqiddx.exe"
                                                                              4⤵
                                                                                PID:1908
                                                                              • C:\Users\Admin\AppData\Local\Temp\nonpbt.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\nonpbt.exe"
                                                                                4⤵
                                                                                  PID:692
                                                                                • C:\Users\Admin\AppData\Local\Temp\juoepz.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\juoepz.exe"
                                                                                  4⤵
                                                                                    PID:772
                                                                                  • C:\Users\Admin\AppData\Local\Temp\aenjgt.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\aenjgt.exe"
                                                                                    4⤵
                                                                                      PID:1088
                                                                                    • C:\Users\Admin\AppData\Local\Temp\mttgfe.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\mttgfe.exe"
                                                                                      4⤵
                                                                                        PID:1376
                                                                                      • C:\Users\Admin\AppData\Local\Temp\dwlifx.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\dwlifx.exe"
                                                                                        4⤵
                                                                                          PID:2388
                                                                                        • C:\Users\Admin\AppData\Local\Temp\kutuoc.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\kutuoc.exe"
                                                                                          4⤵
                                                                                            PID:300
                                                                                          • C:\Users\Admin\AppData\Local\Temp\rijuby.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\rijuby.exe"
                                                                                            4⤵
                                                                                              PID:1544
                                                                                            • C:\Users\Admin\AppData\Local\Temp\hgzzoy.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\hgzzoy.exe"
                                                                                              4⤵
                                                                                                PID:2828
                                                                                              • C:\Users\Admin\AppData\Local\Temp\sjjprk.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\sjjprk.exe"
                                                                                                4⤵
                                                                                                  PID:2392
                                                                                                • C:\Users\Admin\AppData\Local\Temp\dhjilf.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dhjilf.exe"
                                                                                                  4⤵
                                                                                                    PID:408
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\iaoquv.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\iaoquv.exe"
                                                                                                    4⤵
                                                                                                      PID:2928
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uqtlhd.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\uqtlhd.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1716
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qvobpz.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qvobpz.exe"
                                                                                                    3⤵
                                                                                                    • Drops startup file
                                                                                                    • Executes dropped EXE
                                                                                                    • Adds Run key to start application
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2096
                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "qvobpz" /tr "C:\Users\Admin\AppData\Roaming\qvobpz.exe"
                                                                                                      4⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:2456
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jnhlif.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jnhlif.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:1276
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rrkqaz.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rrkqaz.exe"
                                                                                                      4⤵
                                                                                                        PID:2912
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hoecwh.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hoecwh.exe"
                                                                                                        4⤵
                                                                                                          PID:2524
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zvkqiq.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zvkqiq.exe"
                                                                                                          4⤵
                                                                                                          • Drops startup file
                                                                                                          • Adds Run key to start application
                                                                                                          PID:2156
                                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zvkqiq" /tr "C:\Users\Admin\AppData\Roaming\zvkqiq.exe"
                                                                                                            5⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:1004
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\asfkbp.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\asfkbp.exe"
                                                                                                            5⤵
                                                                                                              PID:2580
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bujcwh.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bujcwh.exe"
                                                                                                              5⤵
                                                                                                                PID:1784
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\sqtmsb.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\sqtmsb.exe"
                                                                                                                5⤵
                                                                                                                  PID:552
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ylpwpq.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ylpwpq.exe"
                                                                                                                  5⤵
                                                                                                                    PID:2900
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mkxjrc.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\mkxjrc.exe"
                                                                                                                    5⤵
                                                                                                                      PID:1872
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rrrufx.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rrrufx.exe"
                                                                                                                      5⤵
                                                                                                                        PID:896
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rxizns.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\rxizns.exe"
                                                                                                                        5⤵
                                                                                                                          PID:1560
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\aipqnx.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\aipqnx.exe"
                                                                                                                          5⤵
                                                                                                                            PID:2916
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\atctuu.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\atctuu.exe"
                                                                                                                            5⤵
                                                                                                                              PID:1280
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cecoyq.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cecoyq.exe"
                                                                                                                              5⤵
                                                                                                                                PID:2832
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\srdhke.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\srdhke.exe"
                                                                                                                                5⤵
                                                                                                                                  PID:2200
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pxkwvv.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pxkwvv.exe"
                                                                                                                                  5⤵
                                                                                                                                    PID:704
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\syxwvh.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\syxwvh.exe"
                                                                                                                                    5⤵
                                                                                                                                      PID:944
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bvxzix.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bvxzix.exe"
                                                                                                                                      5⤵
                                                                                                                                        PID:1252
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\zyxxsb.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\zyxxsb.exe"
                                                                                                                                        5⤵
                                                                                                                                          PID:2020
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vczshv.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vczshv.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:2728
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ptxkaq.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ptxkaq.exe"
                                                                                                                                            5⤵
                                                                                                                                              PID:1692
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mexhbv.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mexhbv.exe"
                                                                                                                                              5⤵
                                                                                                                                                PID:1396
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\etbjiv.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\etbjiv.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:2192
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\sammto.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\sammto.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:1752
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rbczoe.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rbczoe.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:2756
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ieheuq.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ieheuq.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2340
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\uckxpw.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\uckxpw.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:2036
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\steqho.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\steqho.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:1104
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dhjoya.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dhjoya.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2012
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mvvpkv.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mvvpkv.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2972
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\eahfhd.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\eahfhd.exe"
                                                                                                                                                              4⤵
                                                                                                                                                              • Drops startup file
                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                              PID:2860
                                                                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "eahfhd" /tr "C:\Users\Admin\AppData\Roaming\eahfhd.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:304
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\okpxtn.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\okpxtn.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                • Drops startup file
                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                PID:2228
                                                                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "okpxtn" /tr "C:\Users\Admin\AppData\Roaming\okpxtn.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                  PID:1104
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pbviim.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pbviim.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:1368
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mtwrrf.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\mtwrrf.exe"
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:2436
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ndsroc.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ndsroc.exe"
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:1576
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bfqvma.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bfqvma.exe"
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:2888
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\eepvux.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\eepvux.exe"
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:1732
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rojxzm.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rojxzm.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:2464
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vghipx.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\vghipx.exe"
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:1092
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ckzjvj.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ckzjvj.exe"
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:1236
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hipgcq.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hipgcq.exe"
                                                                                                                                                                                5⤵
                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                PID:1720
                                                                                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hipgcq" /tr "C:\Users\Admin\AppData\Roaming\hipgcq.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                  PID:2200
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qnijic.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qnijic.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                    PID:1596
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\auunuf.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\auunuf.exe"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:2040
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vzyymb.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vzyymb.exe"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:568
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qklihc.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\qklihc.exe"
                                                                                                                                                                                        6⤵
                                                                                                                                                                                          PID:2476
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ersuty.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ersuty.exe"
                                                                                                                                                                                        5⤵
                                                                                                                                                                                          PID:3024
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ipviop.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ipviop.exe"
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:2456
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dnfzwz.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dnfzwz.exe"
                                                                                                                                                                                            5⤵
                                                                                                                                                                                              PID:3024
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vbjvik.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vbjvik.exe"
                                                                                                                                                                                              5⤵
                                                                                                                                                                                                PID:1920
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tarkah.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tarkah.exe"
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:980
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jzzkpf.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jzzkpf.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:848
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lukqta.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lukqta.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:1880
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\katovg.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\katovg.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:2460
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vughrz.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vughrz.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:2436
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vfrpso.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vfrpso.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:1908
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pnmahi.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pnmahi.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:1028
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\pssddd.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\pssddd.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:780
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pwcvfk.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\pwcvfk.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:1860
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bqfakn.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bqfakn.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:300
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xbhzoj.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xbhzoj.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:2436
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ovbvag.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ovbvag.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:2972
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\oftdym.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\oftdym.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                    PID:1708
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jhrtho.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jhrtho.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    PID:1188
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vuujqf.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\vuujqf.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:2440
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cbfikd.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cbfikd.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:1800
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rdoavc.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\rdoavc.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1684
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cjkdqu.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\cjkdqu.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:2852
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mktmeb.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mktmeb.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:2664
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vajfpm.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vajfpm.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:1956
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jhfiyn.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jhfiyn.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:2896
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tfvpmu.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tfvpmu.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2488
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xjlpqy.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xjlpqy.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:2704
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\esezwf.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\esezwf.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:676
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lqxenj.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lqxenj.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:1008
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\umnbqo.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\umnbqo.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:2540
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xukwkk.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xukwkk.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:1860
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zwyzov.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zwyzov.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:2460
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\pgkkax.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\pgkkax.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1504
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iklawi.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\iklawi.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:2836
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qpsmva.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qpsmva.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:1692
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hwsxrw.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hwsxrw.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:2576
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ohitzz.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ohitzz.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:3052
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gmbcog.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gmbcog.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2792
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\yklptg.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\yklptg.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:2388
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cxxbgu.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cxxbgu.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:1288
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rnbyrs.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\rnbyrs.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:1032
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zqldjg.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zqldjg.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1700
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\quupsf.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\quupsf.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:552
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gaoyfl.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\gaoyfl.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1400
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xgmtbj.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xgmtbj.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2312
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zrxyvk.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zrxyvk.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1800
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hccqiy.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hccqiy.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2560
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dsnovv.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dsnovv.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2036
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zhgsud.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zhgsud.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2524
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bvbnfh.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bvbnfh.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1896
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xfober.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xfober.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2124
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jrzkhp.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jrzkhp.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2656
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dqspvn.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dqspvn.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:1784
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yikrtu.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\yikrtu.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:636
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\chwuxa.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\chwuxa.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:2656
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jtwusc.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jtwusc.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:264
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jbovfe.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jbovfe.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:1712
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wpzqod.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\wpzqod.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:2324
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\klaopw.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\klaopw.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:1452
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wgmtyw.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wgmtyw.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:1860
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vouybo.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vouybo.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:772
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tiyqgt.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tiyqgt.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:864
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ycdgue.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ycdgue.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2876
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vlsskm.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\vlsskm.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:1520
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zueayl.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zueayl.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:1096
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ppcraq.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ppcraq.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:2988
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jxnlxg.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jxnlxg.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2812
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ftfhpm.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ftfhpm.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:1000
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\spmhym.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\spmhym.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:3068
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ecdizg.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ecdizg.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:1664
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jtkmaq.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jtkmaq.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:1132
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qgcmww.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qgcmww.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:2764
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qkomnq.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\qkomnq.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                      • Drops startup file
                                                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                                                      PID:2224
                                                                                                                                                                                                                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "qkomnq" /tr "C:\Users\Admin\AppData\Roaming\qkomnq.exe"
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                        PID:3056
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yddejp.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yddejp.exe"
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:264
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tisuvn.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tisuvn.exe"
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:2024
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hxgfvu.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hxgfvu.exe"
                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                              PID:848
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hsfrhi.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hsfrhi.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:2920
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yarpim.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yarpim.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:1576
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yirpmy.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\yirpmy.exe"
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:1028
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                                                                                                                taskeng.exe {A2B21FF6-5A57-4CEE-B530-A5C6F72829A9} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                                                PID:2904
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2632
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1708
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2680
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2700
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2240
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2684
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:628
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1752
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2508
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1060
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2928
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:448
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2348
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2860
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:940
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1940
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1884
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:292
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2888
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:3024
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1368
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:724
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:1708
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2676
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:1280
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:2040
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:1192
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:2900
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:2592
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                      PID:2788
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                        PID:2656
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                          PID:2176
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                            PID:2272
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                              PID:2408
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                PID:1992
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                  PID:2988
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                    PID:1132
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                      PID:2836
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                        PID:2892
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                          PID:568
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                            PID:2340
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                              PID:1692
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                PID:2876
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2920
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                    PID:2200
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2688
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1088
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1896
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                            PID:2848
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                              PID:676
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                PID:1092
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:2056
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2520
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:2200
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:2308
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:2540
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:2360
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:2436
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:184
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hipgcq.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\hipgcq.exe
                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:1708
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:1772
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2436
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3024
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:2916
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:2476
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1936
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:1860
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:2404
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:2756
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qkomnq.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qkomnq.exe
                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:2968
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\hipgcq.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\hipgcq.exe
                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:1632
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:2856
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:3056
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2144
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:1032
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1544
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1800
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2592
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:888
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3060
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qkomnq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\qkomnq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:636
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\hipgcq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\hipgcq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1236
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\okpxtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1028
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\zvkqiq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1664
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\orznin.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:984
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\eahfhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2944
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qvobpz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3064
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\poweul.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1556
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ugzcok.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2704
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\eqbhpo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1544
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1928

                                                                                                                                                                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\eahfhd.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\eqbhpo.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\gmbcog.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\katovg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\orznin.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\poweul.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qvobpz.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\syxwvh.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ufsevs.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ugzcok.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\unehiq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NN9XS2DAZPVOPC29003V.temp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              0eaf1deac3764f1ca65f7bc4540cf8cd

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              0c0a686c177db958018d9b3b67df409c3a9585be

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              ac4285edf1caf057abb308757a5f22cfdb771fdab497f6129aa167dde035c467

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              63e1d99e3ee47c1c8408f2ea9549a5e0bba8f9254236d18d72fcd9b11229be7b1022ca4bee4be2876bb7e1ce28d4a31933012061496bf544f9af1016c4b81194

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/108-127-0x00000000000A0000-0x00000000000AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/264-354-0x0000000000920000-0x000000000094C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/448-232-0x00000000011E0000-0x000000000120E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/552-101-0x0000000000BC0000-0x0000000000BCE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/628-120-0x00000000003B0000-0x00000000003C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/636-321-0x0000000000A40000-0x0000000000A4E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/652-42-0x000000001B750000-0x000000001BA32000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              2.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/652-43-0x0000000002330000-0x0000000002338000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/724-278-0x0000000000F20000-0x0000000000F36000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/764-154-0x0000000000280000-0x00000000002B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/912-243-0x00000000010D0000-0x00000000010FC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/940-231-0x0000000000370000-0x0000000000386000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/968-312-0x0000000000C10000-0x0000000000C1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1032-334-0x00000000009A0000-0x00000000009AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1032-432-0x0000000000B20000-0x0000000000B2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1060-170-0x0000000000B70000-0x0000000000B86000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1188-296-0x00000000013B0000-0x00000000013BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1192-108-0x0000000000BD0000-0x0000000000BDE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1192-299-0x0000000001310000-0x0000000001340000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1276-283-0x00000000008B0000-0x00000000008BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1280-298-0x0000000000A30000-0x0000000000A5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1336-289-0x0000000000ED0000-0x0000000000EDE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1368-277-0x00000000003D0000-0x00000000003FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1388-292-0x0000000000FE0000-0x0000000000FEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1400-113-0x0000000000300000-0x000000000030E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1452-438-0x0000000000D70000-0x0000000000D7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1512-357-0x0000000001270000-0x000000000129C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1684-362-0x00000000010F0000-0x000000000111C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1700-89-0x0000000001000000-0x000000000102E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1708-259-0x0000000000160000-0x000000000018C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1708-297-0x0000000000180000-0x00000000001AC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1712-383-0x0000000000F80000-0x0000000000FAC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1716-221-0x00000000010C0000-0x00000000010EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1752-398-0x0000000000290000-0x000000000029E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1752-171-0x00000000010D0000-0x0000000001100000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1784-302-0x0000000000C00000-0x0000000000C0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1800-338-0x00000000011E0000-0x00000000011EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1800-145-0x0000000000E40000-0x0000000000E70000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1852-216-0x00000000001C0000-0x00000000001EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1856-204-0x0000000000A80000-0x0000000000AAE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1884-276-0x0000000000910000-0x000000000093C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1896-224-0x0000000000F30000-0x0000000000F5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1940-234-0x00000000012B0000-0x00000000012BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1956-435-0x00000000010A0000-0x00000000010AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1964-186-0x0000000002040000-0x000000000204A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1964-24-0x00000000000B0000-0x00000000000BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2012-315-0x00000000002D0000-0x00000000002DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2032-374-0x0000000000EB0000-0x0000000000EDC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2036-185-0x0000000000220000-0x0000000000250000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2096-240-0x0000000000190000-0x00000000001BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2124-246-0x0000000001090000-0x00000000010BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2156-346-0x00000000013C0000-0x00000000013EC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2176-262-0x0000000001080000-0x00000000010AC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2184-404-0x0000000000830000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2192-365-0x0000000000F70000-0x0000000000F9C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2216-95-0x0000000000020000-0x000000000002E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2228-331-0x0000000000FD0000-0x0000000000FDE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2240-119-0x00000000010D0000-0x00000000010FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2240-380-0x0000000000230000-0x000000000025C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2272-394-0x0000000001350000-0x000000000137E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2312-132-0x0000000000F50000-0x0000000000F5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2324-414-0x00000000009D0000-0x00000000009DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2364-349-0x0000000000CF0000-0x0000000000D1C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2384-0-0x000007FEF5E43000-0x000007FEF5E44000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2384-11-0x000007FEF5E43000-0x000007FEF5E44000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2384-10-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2384-16-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2384-1-0x0000000001360000-0x0000000001376000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2408-392-0x0000000001090000-0x00000000010BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2436-56-0x00000000011C0000-0x00000000011CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2440-318-0x0000000000930000-0x000000000093E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2524-325-0x0000000000890000-0x000000000089E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2524-198-0x0000000000EA0000-0x0000000000ECE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2544-428-0x0000000000120000-0x000000000012E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2556-140-0x0000000001140000-0x0000000001170000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2560-159-0x0000000000350000-0x0000000000380000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2576-408-0x0000000001320000-0x000000000132E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2580-419-0x0000000001110000-0x000000000111E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2592-393-0x00000000013B0000-0x00000000013DC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2616-193-0x00000000013D0000-0x00000000013FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2632-15-0x0000000000F80000-0x0000000000F96000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2656-341-0x0000000000310000-0x000000000031E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2664-411-0x0000000000D60000-0x0000000000D6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2680-250-0x0000000000AE0000-0x0000000000B0C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2680-68-0x0000000000080000-0x000000000008E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2700-66-0x0000000000110000-0x0000000000126000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2720-75-0x0000000001190000-0x00000000011BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2756-422-0x0000000000F40000-0x0000000000F4E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2772-180-0x0000000000B60000-0x0000000000B90000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2788-391-0x00000000000B0000-0x00000000000DC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2828-36-0x0000000000180000-0x000000000018E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2852-377-0x0000000000EC0000-0x0000000000EEC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2860-233-0x0000000001100000-0x000000000112E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2896-265-0x0000000000A70000-0x0000000000A9C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2912-31-0x00000000022C0000-0x00000000022C8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2912-30-0x000000001B620000-0x000000001B902000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              2.9MB