Analysis

  • max time kernel
    895s
  • max time network
    904s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 64 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:856
    • C:\Users\Admin\AppData\Local\Temp\jjwdsk.exe
      "C:\Users\Admin\AppData\Local\Temp\jjwdsk.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\jjwdsk.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2280
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'jjwdsk.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1200
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\jjwdsk.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:932
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jjwdsk" /tr "C:\Users\Admin\AppData\Roaming\jjwdsk.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2400
    • C:\Users\Admin\AppData\Local\Temp\fdmpfc.exe
      "C:\Users\Admin\AppData\Local\Temp\fdmpfc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2092
    • C:\Users\Admin\AppData\Local\Temp\zztbcq.exe
      "C:\Users\Admin\AppData\Local\Temp\zztbcq.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Users\Admin\AppData\Local\Temp\luvtlv.exe
      "C:\Users\Admin\AppData\Local\Temp\luvtlv.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "luvtlv" /tr "C:\Users\Admin\AppData\Roaming\luvtlv.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:584
      • C:\Users\Admin\AppData\Local\Temp\ppfbjd.exe
        "C:\Users\Admin\AppData\Local\Temp\ppfbjd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1248
      • C:\Users\Admin\AppData\Local\Temp\bordcc.exe
        "C:\Users\Admin\AppData\Local\Temp\bordcc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
      • C:\Users\Admin\AppData\Local\Temp\iiyhsz.exe
        "C:\Users\Admin\AppData\Local\Temp\iiyhsz.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2084
      • C:\Users\Admin\AppData\Local\Temp\atiemw.exe
        "C:\Users\Admin\AppData\Local\Temp\atiemw.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:924
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "atiemw" /tr "C:\Users\Admin\AppData\Roaming\atiemw.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1128
        • C:\Users\Admin\AppData\Local\Temp\eqkfzw.exe
          "C:\Users\Admin\AppData\Local\Temp\eqkfzw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2288
        • C:\Users\Admin\AppData\Local\Temp\treruo.exe
          "C:\Users\Admin\AppData\Local\Temp\treruo.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\xqrgsd.exe
          "C:\Users\Admin\AppData\Local\Temp\xqrgsd.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:952
        • C:\Users\Admin\AppData\Local\Temp\cjyytx.exe
          "C:\Users\Admin\AppData\Local\Temp\cjyytx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1640
        • C:\Users\Admin\AppData\Local\Temp\txkcun.exe
          "C:\Users\Admin\AppData\Local\Temp\txkcun.exe"
          4⤵
          • Executes dropped EXE
          PID:1648
        • C:\Users\Admin\AppData\Local\Temp\tzirxw.exe
          "C:\Users\Admin\AppData\Local\Temp\tzirxw.exe"
          4⤵
            PID:2632
          • C:\Users\Admin\AppData\Local\Temp\wuklof.exe
            "C:\Users\Admin\AppData\Local\Temp\wuklof.exe"
            4⤵
              PID:2264
            • C:\Users\Admin\AppData\Local\Temp\yurkrl.exe
              "C:\Users\Admin\AppData\Local\Temp\yurkrl.exe"
              4⤵
                PID:2600
              • C:\Users\Admin\AppData\Local\Temp\fcmnoy.exe
                "C:\Users\Admin\AppData\Local\Temp\fcmnoy.exe"
                4⤵
                  PID:2012
                • C:\Users\Admin\AppData\Local\Temp\ggxnlc.exe
                  "C:\Users\Admin\AppData\Local\Temp\ggxnlc.exe"
                  4⤵
                    PID:972
                  • C:\Users\Admin\AppData\Local\Temp\mqwryu.exe
                    "C:\Users\Admin\AppData\Local\Temp\mqwryu.exe"
                    4⤵
                      PID:1632
                    • C:\Users\Admin\AppData\Local\Temp\ffsujx.exe
                      "C:\Users\Admin\AppData\Local\Temp\ffsujx.exe"
                      4⤵
                        PID:2788
                      • C:\Users\Admin\AppData\Local\Temp\trutzy.exe
                        "C:\Users\Admin\AppData\Local\Temp\trutzy.exe"
                        4⤵
                          PID:3060
                        • C:\Users\Admin\AppData\Local\Temp\gjfyxs.exe
                          "C:\Users\Admin\AppData\Local\Temp\gjfyxs.exe"
                          4⤵
                            PID:2756
                          • C:\Users\Admin\AppData\Local\Temp\afkjkr.exe
                            "C:\Users\Admin\AppData\Local\Temp\afkjkr.exe"
                            4⤵
                              PID:2648
                            • C:\Users\Admin\AppData\Local\Temp\zjihyx.exe
                              "C:\Users\Admin\AppData\Local\Temp\zjihyx.exe"
                              4⤵
                                PID:2088
                              • C:\Users\Admin\AppData\Local\Temp\ihwwem.exe
                                "C:\Users\Admin\AppData\Local\Temp\ihwwem.exe"
                                4⤵
                                  PID:1068
                                • C:\Users\Admin\AppData\Local\Temp\sksoux.exe
                                  "C:\Users\Admin\AppData\Local\Temp\sksoux.exe"
                                  4⤵
                                    PID:3000
                                  • C:\Users\Admin\AppData\Local\Temp\dngygc.exe
                                    "C:\Users\Admin\AppData\Local\Temp\dngygc.exe"
                                    4⤵
                                      PID:2984
                                    • C:\Users\Admin\AppData\Local\Temp\xnteqs.exe
                                      "C:\Users\Admin\AppData\Local\Temp\xnteqs.exe"
                                      4⤵
                                        PID:2560
                                      • C:\Users\Admin\AppData\Local\Temp\jwvbua.exe
                                        "C:\Users\Admin\AppData\Local\Temp\jwvbua.exe"
                                        4⤵
                                          PID:1712
                                        • C:\Users\Admin\AppData\Local\Temp\plsxls.exe
                                          "C:\Users\Admin\AppData\Local\Temp\plsxls.exe"
                                          4⤵
                                            PID:3020
                                          • C:\Users\Admin\AppData\Local\Temp\cjftfm.exe
                                            "C:\Users\Admin\AppData\Local\Temp\cjftfm.exe"
                                            4⤵
                                              PID:1964
                                            • C:\Users\Admin\AppData\Local\Temp\zmlngx.exe
                                              "C:\Users\Admin\AppData\Local\Temp\zmlngx.exe"
                                              4⤵
                                                PID:1244
                                              • C:\Users\Admin\AppData\Local\Temp\kacgjl.exe
                                                "C:\Users\Admin\AppData\Local\Temp\kacgjl.exe"
                                                4⤵
                                                  PID:2460
                                                • C:\Users\Admin\AppData\Local\Temp\edqdmh.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\edqdmh.exe"
                                                  4⤵
                                                    PID:1636
                                                  • C:\Users\Admin\AppData\Local\Temp\qrqszi.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\qrqszi.exe"
                                                    4⤵
                                                      PID:952
                                                    • C:\Users\Admin\AppData\Local\Temp\egbowx.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\egbowx.exe"
                                                      4⤵
                                                        PID:700
                                                    • C:\Users\Admin\AppData\Local\Temp\dbacem.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\dbacem.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1984
                                                    • C:\Users\Admin\AppData\Local\Temp\rqqrun.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\rqqrun.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1468
                                                    • C:\Users\Admin\AppData\Local\Temp\pyopnm.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\pyopnm.exe"
                                                      3⤵
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2136
                                                      • C:\Windows\System32\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "pyopnm" /tr "C:\Users\Admin\AppData\Roaming\pyopnm.exe"
                                                        4⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:1776
                                                      • C:\Users\Admin\AppData\Local\Temp\vmbmiw.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\vmbmiw.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1608
                                                      • C:\Users\Admin\AppData\Local\Temp\jloljn.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\jloljn.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2764
                                                      • C:\Users\Admin\AppData\Local\Temp\rvhuzj.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\rvhuzj.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:1476
                                                      • C:\Users\Admin\AppData\Local\Temp\zmsacb.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\zmsacb.exe"
                                                        4⤵
                                                          PID:1604
                                                        • C:\Users\Admin\AppData\Local\Temp\sozazr.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\sozazr.exe"
                                                          4⤵
                                                            PID:792
                                                          • C:\Users\Admin\AppData\Local\Temp\qnpxku.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\qnpxku.exe"
                                                            4⤵
                                                              PID:2560
                                                            • C:\Users\Admin\AppData\Local\Temp\kcerww.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\kcerww.exe"
                                                              4⤵
                                                                PID:2060
                                                              • C:\Users\Admin\AppData\Local\Temp\ihpuzh.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\ihpuzh.exe"
                                                                4⤵
                                                                  PID:2112
                                                                • C:\Users\Admin\AppData\Local\Temp\zmgeir.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\zmgeir.exe"
                                                                  4⤵
                                                                    PID:1324
                                                                  • C:\Users\Admin\AppData\Local\Temp\tvjatu.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\tvjatu.exe"
                                                                    4⤵
                                                                      PID:2760
                                                                    • C:\Users\Admin\AppData\Local\Temp\wimxvw.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\wimxvw.exe"
                                                                      4⤵
                                                                        PID:2624
                                                                      • C:\Users\Admin\AppData\Local\Temp\yulnjw.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\yulnjw.exe"
                                                                        4⤵
                                                                          PID:848
                                                                        • C:\Users\Admin\AppData\Local\Temp\ehqvsu.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\ehqvsu.exe"
                                                                          4⤵
                                                                            PID:2336
                                                                          • C:\Users\Admin\AppData\Local\Temp\lypsbm.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\lypsbm.exe"
                                                                            4⤵
                                                                              PID:684
                                                                            • C:\Users\Admin\AppData\Local\Temp\klfxdp.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\klfxdp.exe"
                                                                              4⤵
                                                                                PID:2924
                                                                              • C:\Users\Admin\AppData\Local\Temp\kkikvn.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\kkikvn.exe"
                                                                                4⤵
                                                                                  PID:3032
                                                                                • C:\Users\Admin\AppData\Local\Temp\jkmtwf.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\jkmtwf.exe"
                                                                                  4⤵
                                                                                    PID:2732
                                                                                  • C:\Users\Admin\AppData\Local\Temp\wldjza.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\wldjza.exe"
                                                                                    4⤵
                                                                                      PID:2924
                                                                                    • C:\Users\Admin\AppData\Local\Temp\bycpov.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\bycpov.exe"
                                                                                      4⤵
                                                                                        PID:2876
                                                                                      • C:\Users\Admin\AppData\Local\Temp\fehamj.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\fehamj.exe"
                                                                                        4⤵
                                                                                          PID:2652
                                                                                        • C:\Users\Admin\AppData\Local\Temp\raqvcz.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\raqvcz.exe"
                                                                                          4⤵
                                                                                            PID:2892
                                                                                          • C:\Users\Admin\AppData\Local\Temp\oumcmh.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\oumcmh.exe"
                                                                                            4⤵
                                                                                              PID:776
                                                                                            • C:\Users\Admin\AppData\Local\Temp\irbjvp.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\irbjvp.exe"
                                                                                              4⤵
                                                                                                PID:2936
                                                                                              • C:\Users\Admin\AppData\Local\Temp\jblevf.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\jblevf.exe"
                                                                                                4⤵
                                                                                                  PID:1408
                                                                                                • C:\Users\Admin\AppData\Local\Temp\mvvmfq.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\mvvmfq.exe"
                                                                                                  4⤵
                                                                                                    PID:1732
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fjyccv.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\fjyccv.exe"
                                                                                                    4⤵
                                                                                                      PID:2408
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\givuzj.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\givuzj.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1884
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fdkovh.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\fdkovh.exe"
                                                                                                    3⤵
                                                                                                    • Drops startup file
                                                                                                    • Executes dropped EXE
                                                                                                    • Adds Run key to start application
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2488
                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "fdkovh" /tr "C:\Users\Admin\AppData\Roaming\fdkovh.exe"
                                                                                                      4⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:2512
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\eiiisv.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\eiiisv.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:1056
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\twrfdf.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\twrfdf.exe"
                                                                                                      4⤵
                                                                                                        PID:1740
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xqnwdt.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xqnwdt.exe"
                                                                                                        4⤵
                                                                                                          PID:2052
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bkbpaj.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bkbpaj.exe"
                                                                                                          4⤵
                                                                                                          • Drops startup file
                                                                                                          • Adds Run key to start application
                                                                                                          PID:2192
                                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "bkbpaj" /tr "C:\Users\Admin\AppData\Roaming\bkbpaj.exe"
                                                                                                            5⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:2020
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dexlag.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dexlag.exe"
                                                                                                            5⤵
                                                                                                              PID:3004
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\uysvkn.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\uysvkn.exe"
                                                                                                              5⤵
                                                                                                                PID:2956
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\iashor.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\iashor.exe"
                                                                                                                5⤵
                                                                                                                  PID:1612
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dqazxf.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dqazxf.exe"
                                                                                                                  5⤵
                                                                                                                    PID:2680
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sxexaw.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\sxexaw.exe"
                                                                                                                    5⤵
                                                                                                                      PID:1156
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bhlyep.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bhlyep.exe"
                                                                                                                      5⤵
                                                                                                                        PID:2320
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hdnlsc.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hdnlsc.exe"
                                                                                                                        5⤵
                                                                                                                        • Drops startup file
                                                                                                                        • Adds Run key to start application
                                                                                                                        PID:1592
                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hdnlsc" /tr "C:\Users\Admin\AppData\Roaming\hdnlsc.exe"
                                                                                                                          6⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:1964
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dzcmon.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dzcmon.exe"
                                                                                                                          6⤵
                                                                                                                            PID:536
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ccclme.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ccclme.exe"
                                                                                                                            6⤵
                                                                                                                              PID:904
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mayatk.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mayatk.exe"
                                                                                                                              6⤵
                                                                                                                                PID:1244
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jnjzor.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jnjzor.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:1064
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zmjaro.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zmjaro.exe"
                                                                                                                                  6⤵
                                                                                                                                    PID:2716
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tsyxdm.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tsyxdm.exe"
                                                                                                                                    6⤵
                                                                                                                                      PID:2692
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\reungr.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\reungr.exe"
                                                                                                                                      6⤵
                                                                                                                                        PID:1064
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lixgwj.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lixgwj.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:1612
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ymjqwq.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ymjqwq.exe"
                                                                                                                                          6⤵
                                                                                                                                            PID:1432
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wvixlc.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wvixlc.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:2728
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\lhlnna.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\lhlnna.exe"
                                                                                                                                            5⤵
                                                                                                                                              PID:3044
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bdgstc.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bdgstc.exe"
                                                                                                                                              5⤵
                                                                                                                                              • Drops startup file
                                                                                                                                              • Adds Run key to start application
                                                                                                                                              PID:1140
                                                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "bdgstc" /tr "C:\Users\Admin\AppData\Roaming\bdgstc.exe"
                                                                                                                                                6⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:2336
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rproak.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\rproak.exe"
                                                                                                                                                6⤵
                                                                                                                                                • Drops startup file
                                                                                                                                                • Adds Run key to start application
                                                                                                                                                PID:988
                                                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "rproak" /tr "C:\Users\Admin\AppData\Roaming\rproak.exe"
                                                                                                                                                  7⤵
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:3032
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vqxrlf.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vqxrlf.exe"
                                                                                                                                                  7⤵
                                                                                                                                                    PID:2060
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\meybia.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\meybia.exe"
                                                                                                                                                    7⤵
                                                                                                                                                      PID:1148
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\aymddv.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\aymddv.exe"
                                                                                                                                                      7⤵
                                                                                                                                                        PID:2568
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gpgpxm.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gpgpxm.exe"
                                                                                                                                                        7⤵
                                                                                                                                                          PID:2580
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\uyjnxq.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\uyjnxq.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:1116
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cemerp.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\cemerp.exe"
                                                                                                                                                          6⤵
                                                                                                                                                            PID:2408
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dazago.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dazago.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:2968
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\oajang.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\oajang.exe"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:1688
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\knbrvf.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\knbrvf.exe"
                                                                                                                                                                6⤵
                                                                                                                                                                  PID:1280
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bwxvud.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bwxvud.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:2412
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cjwdak.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cjwdak.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:2672
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\esxxcb.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\esxxcb.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:2420
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wumcmt.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wumcmt.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:2084
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lnukxa.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lnukxa.exe"
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:2276
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jokkjv.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jokkjv.exe"
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:1508
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\fbbfvb.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\fbbfvb.exe"
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:2360
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fihbju.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\fihbju.exe"
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:2368
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\nvwtnk.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\nvwtnk.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:1488
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xadkxq.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xadkxq.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:2328
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uctphl.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\uctphl.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:2436
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\niyqpi.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\niyqpi.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:1276
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\iwmcpq.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\iwmcpq.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:1740
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cphzvx.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\cphzvx.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:2760
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zzjhhc.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zzjhhc.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:2368
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cmtwbb.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cmtwbb.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:2904
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\amcpcs.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\amcpcs.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:1308
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\lwfnlr.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\lwfnlr.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:644
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yulmih.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\yulmih.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:1196
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ivhwqi.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ivhwqi.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1016
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cfavoc.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cfavoc.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:2816
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\plulcc.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\plulcc.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:1196
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nmnpny.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nmnpny.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:2848
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rlorjn.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rlorjn.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:628
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qpelnf.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\qpelnf.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:1396
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tdwunw.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tdwunw.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:792
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rpidyz.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rpidyz.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:3048
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xnsizw.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xnsizw.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:684
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\akdixi.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\akdixi.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                    PID:2648
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cyjeml.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\cyjeml.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    PID:2512
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lqokru.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\lqokru.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:2656
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kkgwyd.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kkgwyd.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:2224
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bicqxb.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bicqxb.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:2988
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bcviqj.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bcviqj.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:2208
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jhagmp.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jhagmp.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:3024
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cbvkji.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cbvkji.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:1064
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vulqdk.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\vulqdk.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:2732
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bemzhp.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bemzhp.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2420
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gmaidj.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gmaidj.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:2580
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\pcaebk.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\pcaebk.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:2272
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\texrtw.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\texrtw.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:3056
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\hqztvc.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\hqztvc.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:2656
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qlykhl.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qlykhl.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:2596
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\wkalaa.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\wkalaa.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:2856
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ouymug.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ouymug.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:2368
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iqtbxz.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\iqtbxz.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:2604
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nklqrq.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nklqrq.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:1396
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\pmqxrr.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\pmqxrr.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:1480
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\kevoiq.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\kevoiq.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:844
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jhdwcy.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jhdwcy.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2084
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xvwtle.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xvwtle.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:264
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\joozxx.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\joozxx.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:1460
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\agskvn.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\agskvn.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:1940
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\phuecx.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\phuecx.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1992
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\lauoru.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\lauoru.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1920
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\oceery.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\oceery.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1308
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ngnswb.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ngnswb.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2172
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gggcnp.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\gggcnp.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1996
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jqxbnl.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jqxbnl.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2072
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\qaboee.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\qaboee.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:1956
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hkhyna.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hkhyna.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2876
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mgcwgf.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\mgcwgf.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2500
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hwksyv.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hwksyv.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:2616
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rjmffb.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\rjmffb.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                PID:3016
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xmosor.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xmosor.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:808
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wycill.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wycill.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:2272
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\titfqh.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\titfqh.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:1548
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nmjstq.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nmjstq.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2316
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\axcgxv.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\axcgxv.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:904
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scfgba.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\scfgba.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:1132
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mtrlzi.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mtrlzi.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:1432
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dylzzq.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dylzzq.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:1656
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\clsfrt.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\clsfrt.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:2508
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\retxsr.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\retxsr.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2848
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pqagqj.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pqagqj.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:584
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gngstx.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gngstx.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:1100
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\pcmbov.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\pcmbov.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:1888
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fbxlem.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fbxlem.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:764
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cnklow.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\cnklow.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2688
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hoazwj.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hoazwj.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:1984
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hwhbtm.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hwhbtm.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:2900
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jjrvpp.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jjrvpp.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:2948
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gqpxrr.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\gqpxrr.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:2924
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\udmned.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\udmned.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:2460
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zuykle.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zuykle.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                      • Drops startup file
                                                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                                                      PID:1488
                                                                                                                                                                                                                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zuykle" /tr "C:\Users\Admin\AppData\Roaming\zuykle.exe"
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                        PID:2264
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cwygcq.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\cwygcq.exe"
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:2900
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ogrlxb.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ogrlxb.exe"
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:2424
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\yuzzyw.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\yuzzyw.exe"
                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                              PID:960
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wpgdus.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wpgdus.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:1732
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ndilcu.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ndilcu.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:1300
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vgyuey.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\vgyuey.exe"
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:2428
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                                                                                                                taskeng.exe {5D0F4207-0415-4C9B-843C-DB35959FEDBD} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                                                PID:2872
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2600
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2988
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2804
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2824
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1484
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1008
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:872
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:904
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1828
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2440
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1532
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:680
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:572
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2284
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2040
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1976
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2236
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1612
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2280
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1092
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1484
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:2632
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:872
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:1684
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:2424
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:1552
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:1396
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:828
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:1140
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                      PID:1560
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                        PID:2292
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                          PID:1536
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                            PID:1952
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                              PID:584
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                PID:2992
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                  PID:1432
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                    PID:684
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                      PID:2988
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                        PID:2456
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                          PID:2652
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                            PID:2860
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                              PID:2996
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                PID:2988
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2320
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                    PID:2124
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2012
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2436
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1656
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                            PID:1608
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                              PID:2836
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                PID:2264
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:1652
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2740
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1908
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:1532
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:2856
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:1548
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:2736
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:2556
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rproak.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rproak.exe
                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:1684
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:2916
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2424
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:2396
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:1148
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:1836
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2716
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:2008
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:644
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:1248
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zuykle.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\zuykle.exe
                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:2512
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\rproak.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\rproak.exe
                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:1984
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:1688
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:2936
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:1672
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:1560
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1740
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1652
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:684
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2028
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2484
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zuykle.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\zuykle.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2368
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\rproak.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\rproak.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3060
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bdgstc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1012
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\hdnlsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2716
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fdkovh.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1280
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\bkbpaj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2968
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\atiemw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1612
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\pyopnm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1652
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\jjwdsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2384
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\luvtlv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2956
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2708

                                                                                                                                                                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\amcpcs.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\atiemw.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dzcmon.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hwksyv.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jhdwcy.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jjwdsk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jnjzor.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\luvtlv.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pyopnm.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\txkcun.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yurkrl.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                              3b338e2f9c5a04470d8a05e93ed7c326

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                              4df9ff7c5269aeebd3309ae300319fb863c56f82

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                              f09b1058687cefe73eff397b4d3fa98e726c60d935e6ee16a2245148c732aa4b

                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                              6ec04aea2c6eda77450a8c07af00204bfe5b6323644f17bad9c9907993ced981cd19264b91fdf64f04a81b7a5ebde3026a9d6bf17f66623639d1a2b514e22892

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/572-233-0x0000000001310000-0x0000000001340000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/584-396-0x0000000000BE0000-0x0000000000C10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/680-236-0x0000000000FF0000-0x000000000101E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/792-336-0x00000000009E0000-0x00000000009EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/808-304-0x0000000000BC0000-0x0000000000BCE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/872-121-0x00000000002E0000-0x00000000002F6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/872-305-0x0000000000380000-0x00000000003AC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/904-181-0x0000000000CA0000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/924-141-0x0000000000370000-0x00000000003A0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/952-247-0x0000000000F30000-0x0000000000F5C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/972-414-0x0000000000170000-0x000000000017E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1056-289-0x0000000000C80000-0x0000000000C8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1064-434-0x0000000000A80000-0x0000000000A8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1072-25-0x0000000000CB0000-0x0000000000CBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1092-282-0x00000000012F0000-0x0000000001306000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1132-417-0x0000000000200000-0x000000000020E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1140-397-0x00000000010E0000-0x000000000110C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1200-45-0x0000000002310000-0x0000000002318000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1200-44-0x000000001B240000-0x000000001B522000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              2.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1248-97-0x0000000000FC0000-0x0000000000FCE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1308-114-0x0000000000960000-0x000000000096E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1324-431-0x0000000001090000-0x000000000109E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1468-173-0x0000000000D40000-0x0000000000D70000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1476-294-0x00000000000F0000-0x00000000000FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1484-120-0x0000000000160000-0x000000000018E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1484-281-0x0000000000390000-0x00000000003C0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1488-370-0x0000000000080000-0x00000000000AC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1532-188-0x0000000000C50000-0x0000000000C66000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1548-346-0x0000000000DB0000-0x0000000000DBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1560-395-0x0000000001170000-0x000000000119C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1604-319-0x0000000000B00000-0x0000000000B0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1608-273-0x0000000000800000-0x000000000082C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1640-259-0x0000000000F50000-0x0000000000F7C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1648-298-0x0000000000E90000-0x0000000000E9E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1740-310-0x00000000001C0000-0x00000000001CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1744-109-0x0000000000210000-0x000000000021E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1764-1-0x0000000000DA0000-0x0000000000DB6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1764-10-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1764-11-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1764-16-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1764-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1828-186-0x0000000001150000-0x000000000117E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1836-50-0x0000000000D00000-0x0000000000D0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1884-215-0x00000000001C0000-0x00000000001EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1920-102-0x0000000001220000-0x000000000122E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1956-185-0x00000000008D0000-0x0000000000900000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1976-235-0x0000000000150000-0x000000000015E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1984-153-0x0000000000970000-0x00000000009A0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1992-86-0x0000000000C70000-0x0000000000C9E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1996-146-0x00000000010C0000-0x00000000010F0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2012-383-0x0000000000BA0000-0x0000000000BCC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2040-234-0x00000000001C0000-0x00000000001D6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2052-330-0x0000000001380000-0x000000000138E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2060-385-0x0000000000CD0000-0x0000000000CFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2060-223-0x0000000000F50000-0x0000000000F7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2072-162-0x00000000013A0000-0x00000000013D0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2084-128-0x0000000000060000-0x000000000006E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2092-31-0x0000000000E10000-0x0000000000E1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2112-407-0x0000000001110000-0x000000000111E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2136-195-0x0000000000920000-0x000000000094E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2172-133-0x0000000000950000-0x000000000095E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2192-350-0x0000000000D10000-0x0000000000D3C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2208-384-0x0000000000310000-0x000000000033C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2224-343-0x0000000000C40000-0x0000000000C4E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2236-279-0x0000000000D90000-0x0000000000DBC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2264-340-0x0000000000F80000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2272-326-0x0000000001140000-0x000000000114E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2280-37-0x0000000002290000-0x0000000002298000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2280-36-0x000000001B360000-0x000000001B642000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              2.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2280-280-0x00000000012D0000-0x00000000012FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2288-206-0x0000000000970000-0x000000000099E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2316-363-0x0000000001210000-0x000000000123C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2328-401-0x0000000000F90000-0x0000000000F9E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2424-306-0x0000000000AD0000-0x0000000000B00000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2440-184-0x00000000000B0000-0x00000000000BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2488-241-0x0000000000190000-0x00000000001BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2500-226-0x0000000000800000-0x000000000082E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2512-301-0x0000000000C00000-0x0000000000C0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2560-356-0x0000000000B70000-0x0000000000B9C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2600-15-0x0000000000020000-0x0000000000036000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2600-361-0x0000000000A20000-0x0000000000A4C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2616-248-0x0000000000390000-0x00000000003BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2632-320-0x0000000000F40000-0x0000000000F4E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2632-283-0x0000000000F10000-0x0000000000F1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2648-256-0x0000000000870000-0x000000000089C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2656-323-0x0000000000DC0000-0x0000000000DCE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2764-277-0x0000000000970000-0x000000000099C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2804-69-0x0000000001050000-0x000000000105E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2824-68-0x00000000009F0000-0x0000000000A06000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2876-200-0x0000000000310000-0x000000000033E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2944-76-0x00000000009E0000-0x0000000000A0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2988-19-0x00000000000D0000-0x00000000000E6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2988-366-0x0000000000270000-0x000000000029C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3004-424-0x0000000000B10000-0x0000000000B1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3016-262-0x0000000000B20000-0x0000000000B4C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3024-411-0x0000000000920000-0x000000000092E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB