Analysis

  • max time kernel
    900s
  • max time network
    898s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2025, 18:12

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 64 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\rbfvdq.exe
      "C:\Users\Admin\AppData\Local\Temp\rbfvdq.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\rbfvdq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2916
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'rbfvdq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1908
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\rbfvdq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:376
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "rbfvdq" /tr "C:\Users\Admin\AppData\Roaming\rbfvdq.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1792
    • C:\Users\Admin\AppData\Local\Temp\fwyshr.exe
      "C:\Users\Admin\AppData\Local\Temp\fwyshr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
    • C:\Users\Admin\AppData\Local\Temp\yagdqd.exe
      "C:\Users\Admin\AppData\Local\Temp\yagdqd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3020
    • C:\Users\Admin\AppData\Local\Temp\velkpm.exe
      "C:\Users\Admin\AppData\Local\Temp\velkpm.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "velkpm" /tr "C:\Users\Admin\AppData\Roaming\velkpm.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2848
      • C:\Users\Admin\AppData\Local\Temp\usdprx.exe
        "C:\Users\Admin\AppData\Local\Temp\usdprx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2236
      • C:\Users\Admin\AppData\Local\Temp\xvtykk.exe
        "C:\Users\Admin\AppData\Local\Temp\xvtykk.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Users\Admin\AppData\Local\Temp\iheyxm.exe
        "C:\Users\Admin\AppData\Local\Temp\iheyxm.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
      • C:\Users\Admin\AppData\Local\Temp\agbikz.exe
        "C:\Users\Admin\AppData\Local\Temp\agbikz.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2372
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "agbikz" /tr "C:\Users\Admin\AppData\Roaming\agbikz.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:764
        • C:\Users\Admin\AppData\Local\Temp\lvjxsf.exe
          "C:\Users\Admin\AppData\Local\Temp\lvjxsf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\evchoh.exe
          "C:\Users\Admin\AppData\Local\Temp\evchoh.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2808
        • C:\Users\Admin\AppData\Local\Temp\cdflob.exe
          "C:\Users\Admin\AppData\Local\Temp\cdflob.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:884
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "cdflob" /tr "C:\Users\Admin\AppData\Roaming\cdflob.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1604
          • C:\Users\Admin\AppData\Local\Temp\gwovpl.exe
            "C:\Users\Admin\AppData\Local\Temp\gwovpl.exe"
            5⤵
            • Executes dropped EXE
            PID:1168
          • C:\Users\Admin\AppData\Local\Temp\mzdied.exe
            "C:\Users\Admin\AppData\Local\Temp\mzdied.exe"
            5⤵
            • Executes dropped EXE
            PID:268
          • C:\Users\Admin\AppData\Local\Temp\irzvvz.exe
            "C:\Users\Admin\AppData\Local\Temp\irzvvz.exe"
            5⤵
              PID:2228
            • C:\Users\Admin\AppData\Local\Temp\mnhrbq.exe
              "C:\Users\Admin\AppData\Local\Temp\mnhrbq.exe"
              5⤵
              • Drops startup file
              • Adds Run key to start application
              PID:1724
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mnhrbq" /tr "C:\Users\Admin\AppData\Roaming\mnhrbq.exe"
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2220
              • C:\Users\Admin\AppData\Local\Temp\hvxpeq.exe
                "C:\Users\Admin\AppData\Local\Temp\hvxpeq.exe"
                6⤵
                  PID:2644
                • C:\Users\Admin\AppData\Local\Temp\lsjrpl.exe
                  "C:\Users\Admin\AppData\Local\Temp\lsjrpl.exe"
                  6⤵
                    PID:1696
                  • C:\Users\Admin\AppData\Local\Temp\vhjvwq.exe
                    "C:\Users\Admin\AppData\Local\Temp\vhjvwq.exe"
                    6⤵
                      PID:3020
                    • C:\Users\Admin\AppData\Local\Temp\oyeroh.exe
                      "C:\Users\Admin\AppData\Local\Temp\oyeroh.exe"
                      6⤵
                        PID:2364
                      • C:\Users\Admin\AppData\Local\Temp\jfyxjj.exe
                        "C:\Users\Admin\AppData\Local\Temp\jfyxjj.exe"
                        6⤵
                          PID:1292
                        • C:\Users\Admin\AppData\Local\Temp\bbcsvk.exe
                          "C:\Users\Admin\AppData\Local\Temp\bbcsvk.exe"
                          6⤵
                            PID:352
                          • C:\Users\Admin\AppData\Local\Temp\bhdayz.exe
                            "C:\Users\Admin\AppData\Local\Temp\bhdayz.exe"
                            6⤵
                              PID:2024
                            • C:\Users\Admin\AppData\Local\Temp\drhgog.exe
                              "C:\Users\Admin\AppData\Local\Temp\drhgog.exe"
                              6⤵
                                PID:2912
                              • C:\Users\Admin\AppData\Local\Temp\ciywdm.exe
                                "C:\Users\Admin\AppData\Local\Temp\ciywdm.exe"
                                6⤵
                                  PID:2384
                                • C:\Users\Admin\AppData\Local\Temp\mqhqfy.exe
                                  "C:\Users\Admin\AppData\Local\Temp\mqhqfy.exe"
                                  6⤵
                                    PID:2676
                                  • C:\Users\Admin\AppData\Local\Temp\sojaqn.exe
                                    "C:\Users\Admin\AppData\Local\Temp\sojaqn.exe"
                                    6⤵
                                      PID:996
                                    • C:\Users\Admin\AppData\Local\Temp\icmztp.exe
                                      "C:\Users\Admin\AppData\Local\Temp\icmztp.exe"
                                      6⤵
                                        PID:3004
                                      • C:\Users\Admin\AppData\Local\Temp\mozfnx.exe
                                        "C:\Users\Admin\AppData\Local\Temp\mozfnx.exe"
                                        6⤵
                                          PID:1532
                                        • C:\Users\Admin\AppData\Local\Temp\zdrsva.exe
                                          "C:\Users\Admin\AppData\Local\Temp\zdrsva.exe"
                                          6⤵
                                            PID:1488
                                          • C:\Users\Admin\AppData\Local\Temp\lexqfe.exe
                                            "C:\Users\Admin\AppData\Local\Temp\lexqfe.exe"
                                            6⤵
                                              PID:2836
                                            • C:\Users\Admin\AppData\Local\Temp\dkcfhk.exe
                                              "C:\Users\Admin\AppData\Local\Temp\dkcfhk.exe"
                                              6⤵
                                                PID:2296
                                              • C:\Users\Admin\AppData\Local\Temp\pcauyl.exe
                                                "C:\Users\Admin\AppData\Local\Temp\pcauyl.exe"
                                                6⤵
                                                  PID:2444
                                                • C:\Users\Admin\AppData\Local\Temp\tcoiko.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\tcoiko.exe"
                                                  6⤵
                                                    PID:1432
                                                • C:\Users\Admin\AppData\Local\Temp\kaoesx.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\kaoesx.exe"
                                                  5⤵
                                                    PID:2336
                                                  • C:\Users\Admin\AppData\Local\Temp\awoatv.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\awoatv.exe"
                                                    5⤵
                                                      PID:2772
                                                    • C:\Users\Admin\AppData\Local\Temp\gowqwn.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\gowqwn.exe"
                                                      5⤵
                                                        PID:2504
                                                      • C:\Users\Admin\AppData\Local\Temp\lfvlpd.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\lfvlpd.exe"
                                                        5⤵
                                                          PID:1704
                                                        • C:\Users\Admin\AppData\Local\Temp\hfumej.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\hfumej.exe"
                                                          5⤵
                                                            PID:2544
                                                          • C:\Users\Admin\AppData\Local\Temp\gpuyko.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\gpuyko.exe"
                                                            5⤵
                                                              PID:2936
                                                            • C:\Users\Admin\AppData\Local\Temp\wihgii.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\wihgii.exe"
                                                              5⤵
                                                                PID:2332
                                                              • C:\Users\Admin\AppData\Local\Temp\phxdpg.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\phxdpg.exe"
                                                                5⤵
                                                                  PID:2696
                                                                • C:\Users\Admin\AppData\Local\Temp\dwqtfw.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\dwqtfw.exe"
                                                                  5⤵
                                                                  • Drops startup file
                                                                  • Adds Run key to start application
                                                                  PID:2440
                                                                  • C:\Windows\System32\schtasks.exe
                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dwqtfw" /tr "C:\Users\Admin\AppData\Roaming\dwqtfw.exe"
                                                                    6⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:1644
                                                                  • C:\Users\Admin\AppData\Local\Temp\jfzyji.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\jfzyji.exe"
                                                                    6⤵
                                                                    • Drops startup file
                                                                    • Adds Run key to start application
                                                                    PID:1052
                                                                    • C:\Windows\System32\schtasks.exe
                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jfzyji" /tr "C:\Users\Admin\AppData\Roaming\jfzyji.exe"
                                                                      7⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1564
                                                                    • C:\Users\Admin\AppData\Local\Temp\ncefyk.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\ncefyk.exe"
                                                                      7⤵
                                                                        PID:2304
                                                                      • C:\Users\Admin\AppData\Local\Temp\vyxhda.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\vyxhda.exe"
                                                                        7⤵
                                                                          PID:2532
                                                                        • C:\Users\Admin\AppData\Local\Temp\alkxdn.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\alkxdn.exe"
                                                                          7⤵
                                                                            PID:2280
                                                                          • C:\Users\Admin\AppData\Local\Temp\ycktzx.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\ycktzx.exe"
                                                                            7⤵
                                                                              PID:852
                                                                            • C:\Users\Admin\AppData\Local\Temp\mjdbpa.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\mjdbpa.exe"
                                                                              7⤵
                                                                                PID:2172
                                                                              • C:\Users\Admin\AppData\Local\Temp\hgzetp.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\hgzetp.exe"
                                                                                7⤵
                                                                                  PID:1908
                                                                              • C:\Users\Admin\AppData\Local\Temp\ssxegp.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\ssxegp.exe"
                                                                                6⤵
                                                                                  PID:1288
                                                                                • C:\Users\Admin\AppData\Local\Temp\owrilf.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\owrilf.exe"
                                                                                  6⤵
                                                                                    PID:968
                                                                                  • C:\Users\Admin\AppData\Local\Temp\hlmmnr.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\hlmmnr.exe"
                                                                                    6⤵
                                                                                    • Drops startup file
                                                                                    • Adds Run key to start application
                                                                                    PID:1784
                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hlmmnr" /tr "C:\Users\Admin\AppData\Roaming\hlmmnr.exe"
                                                                                      7⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:2740
                                                                                    • C:\Users\Admin\AppData\Local\Temp\jzcgvp.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\jzcgvp.exe"
                                                                                      7⤵
                                                                                        PID:1548
                                                                                      • C:\Users\Admin\AppData\Local\Temp\hzpuhk.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\hzpuhk.exe"
                                                                                        7⤵
                                                                                          PID:1700
                                                                                        • C:\Users\Admin\AppData\Local\Temp\nnires.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\nnires.exe"
                                                                                          7⤵
                                                                                            PID:2944
                                                                                          • C:\Users\Admin\AppData\Local\Temp\dcnfgd.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\dcnfgd.exe"
                                                                                            7⤵
                                                                                              PID:2340
                                                                                          • C:\Users\Admin\AppData\Local\Temp\ojsubn.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\ojsubn.exe"
                                                                                            6⤵
                                                                                              PID:1652
                                                                                            • C:\Users\Admin\AppData\Local\Temp\szgurb.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\szgurb.exe"
                                                                                              6⤵
                                                                                                PID:2160
                                                                                              • C:\Users\Admin\AppData\Local\Temp\prfjix.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\prfjix.exe"
                                                                                                6⤵
                                                                                                  PID:2316
                                                                                                • C:\Users\Admin\AppData\Local\Temp\vdwibs.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vdwibs.exe"
                                                                                                  6⤵
                                                                                                    PID:2848
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kilmbl.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kilmbl.exe"
                                                                                                    6⤵
                                                                                                      PID:2448
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uzllwm.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\uzllwm.exe"
                                                                                                    5⤵
                                                                                                      PID:2348
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\doseue.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\doseue.exe"
                                                                                                      5⤵
                                                                                                        PID:1660
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aieiuo.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\aieiuo.exe"
                                                                                                        5⤵
                                                                                                          PID:876
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gfxnvh.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gfxnvh.exe"
                                                                                                          5⤵
                                                                                                            PID:2924
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\feqnih.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\feqnih.exe"
                                                                                                            5⤵
                                                                                                              PID:2328
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\smkydk.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\smkydk.exe"
                                                                                                              5⤵
                                                                                                                PID:2384
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dklvct.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dklvct.exe"
                                                                                                                5⤵
                                                                                                                  PID:1864
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\plnscg.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\plnscg.exe"
                                                                                                                  5⤵
                                                                                                                    PID:1696
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bvccnz.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\bvccnz.exe"
                                                                                                                    5⤵
                                                                                                                      PID:1100
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zhedgs.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zhedgs.exe"
                                                                                                                      5⤵
                                                                                                                        PID:2644
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vpfkmh.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vpfkmh.exe"
                                                                                                                        5⤵
                                                                                                                          PID:1780
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vhtetz.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vhtetz.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1592
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\grabrg.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\grabrg.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:2644
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\merxoy.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\merxoy.exe"
                                                                                                                        4⤵
                                                                                                                          PID:1548
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lagflo.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\lagflo.exe"
                                                                                                                          4⤵
                                                                                                                            PID:2164
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dmkgjq.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dmkgjq.exe"
                                                                                                                            4⤵
                                                                                                                              PID:2280
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ruqmlo.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ruqmlo.exe"
                                                                                                                              4⤵
                                                                                                                                PID:376
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\chbkqa.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\chbkqa.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:1288
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fddvuj.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\fddvuj.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:2680
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pfogzo.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\pfogzo.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:2848
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\upveag.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\upveag.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:1604
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\oaikjx.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\oaikjx.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:2844
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\patduh.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\patduh.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:2208
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wbjgah.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wbjgah.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:268
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kiraqd.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\kiraqd.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:284
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bkvcsv.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bkvcsv.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:2312
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\sxhvvp.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\sxhvvp.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1772
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\suugfu.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\suugfu.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2868
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qmlhkx.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\qmlhkx.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1852
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\eopnur.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\eopnur.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:1284
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pokejy.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pokejy.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2952
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bnhykw.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bnhykw.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:1172
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zbgtnf.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zbgtnf.exe"
                                                                                                                                                              4⤵
                                                                                                                                                              • Drops startup file
                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                              PID:2544
                                                                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zbgtnf" /tr "C:\Users\Admin\AppData\Roaming\zbgtnf.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:376
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ursxbk.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ursxbk.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:2520
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ttwrla.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ttwrla.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:2340
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ggqjkg.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ggqjkg.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:912
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nedxkd.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nedxkd.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:1864
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\staxxd.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\staxxd.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:3008
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gfdpfh.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gfdpfh.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:1064
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fsouir.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fsouir.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:2868
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\mgwqmu.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\mgwqmu.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:1288
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ymuagr.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ymuagr.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Drops startup file
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:2044
                                                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ymuagr" /tr "C:\Users\Admin\AppData\Roaming\ymuagr.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                          PID:584
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lwbtna.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\lwbtna.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:2504
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jptabv.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jptabv.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:2908
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gswgfr.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gswgfr.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:592
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xunxaq.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\xunxaq.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1968
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hbvkpg.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hbvkpg.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1908
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ivwjoo.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ivwjoo.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:2712
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dwxlsx.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dwxlsx.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:2972
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ipnfla.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ipnfla.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:2028
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ngxpje.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ngxpje.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:2716
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\povkml.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\povkml.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:552
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ezzmsg.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ezzmsg.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:2208
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\yxdhci.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\yxdhci.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:1588
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tlbpol.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\tlbpol.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:3012
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cbpvwi.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cbpvwi.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:2412
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\islsua.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\islsua.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:604
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\stkmgt.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\stkmgt.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:2116
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xwwhho.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xwwhho.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1736
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wfepwy.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wfepwy.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:2808
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\dzzkhl.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\dzzkhl.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:2056
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vjdqez.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vjdqez.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:2676
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ugccpi.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ugccpi.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:2860
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yheiss.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yheiss.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:892
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ovubyq.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ovubyq.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:1700
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\etwmou.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\etwmou.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:552
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ailzqx.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ailzqx.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:1864
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qgrxma.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\qgrxma.exe"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:1976
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zvhjyq.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zvhjyq.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:3060
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jyqhse.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jyqhse.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1760
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\amidjz.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\amidjz.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:2056
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\idmble.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\idmble.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:2120
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\osukal.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\osukal.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:2040
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\szajio.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\szajio.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:2080
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\rwtxkk.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\rwtxkk.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:2636
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bfnrqa.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bfnrqa.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:532
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ludvsc.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ludvsc.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:2080
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\eyjdvg.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\eyjdvg.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:1544
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wzxfot.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wzxfot.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1680
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\eqdumn.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\eqdumn.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:2392
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fktcag.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fktcag.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:2812
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qwctyg.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\qwctyg.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:3056
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\hxhxfk.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\hxhxfk.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:532
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\eobnbl.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\eobnbl.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:1820
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mvqunz.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mvqunz.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:480
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xriqqh.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xriqqh.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1656
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jbxdny.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jbxdny.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:2860
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ecarxr.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ecarxr.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:2672
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lglspy.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lglspy.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:820
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lrjhpe.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lrjhpe.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:2896
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qvjcwh.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qvjcwh.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:1548
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\yrhand.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\yrhand.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:2052
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\nbbcjz.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\nbbcjz.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:568
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\oecjey.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\oecjey.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:2868
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kvyyjg.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kvyyjg.exe"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:2312
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wrgqpo.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wrgqpo.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3056
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pybsif.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pybsif.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2924
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cgoeqr.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cgoeqr.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1348
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\akluja.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\akluja.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2284
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mutljb.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\mutljb.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2988
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kgmtzm.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kgmtzm.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2792
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kogjcj.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kogjcj.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2796
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pfraaj.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pfraaj.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1328
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\orntke.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\orntke.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2604
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bbhgev.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bbhgev.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3008
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ueozic.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ueozic.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:264
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tihcub.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tihcub.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:948
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lrhcfe.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lrhcfe.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:2452
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\iltkws.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\iltkws.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2700
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\oqwhsx.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\oqwhsx.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:2784
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\edkkoy.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\edkkoy.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:2228
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\upxpgs.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\upxpgs.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:2684
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bmwmit.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bmwmit.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:544
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xzwdys.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xzwdys.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:2004
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ckhvls.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ckhvls.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2228
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fmqkxq.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\fmqkxq.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:1056
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\racihp.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\racihp.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:2932
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hsebik.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hsebik.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2344
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vbhdjt.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vbhdjt.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:1060
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bbfrid.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bbfrid.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:1532
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rydeku.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rydeku.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:3052
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\brogui.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\brogui.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:2572
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\qprgvf.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\qprgvf.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:2012
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\obcwzj.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\obcwzj.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:2444
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kccxiv.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kccxiv.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:2660
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\karyri.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\karyri.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:2592
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lcikzq.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lcikzq.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:600
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wphzmu.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wphzmu.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:1644
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bvgadh.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bvgadh.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:600
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\buytui.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\buytui.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:3044
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                                                                                                              taskeng.exe {20B7E42C-15FE-48F2-85FA-A8F320CD2A47} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                                              PID:2576
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1672
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2312
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1432
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1332
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2168
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:3044
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1652
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1712
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2920
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:700
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2868
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2288
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1804
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1100
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1632
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2948
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1960
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1632
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2680
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2340
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2400
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:2024
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                PID:1604
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                PID:1248
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                PID:2056
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                PID:2236
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                PID:1596
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:2696
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:2896
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                      PID:1800
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                        PID:1960
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                          PID:2236
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                            PID:2364
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                              PID:560
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                PID:848
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                  PID:2336
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                    PID:1800
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                      PID:788
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                        PID:1608
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                          PID:1744
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                            PID:1916
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                              PID:2464
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                PID:1760
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                  PID:1688
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                    PID:2488
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                      PID:1868
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2168
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                          PID:788
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                            PID:1800
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                              PID:2896
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                PID:1288
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:1920
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2416
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:2740
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:1028
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:1908
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:640
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:2624
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:1652
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:2208
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:3008
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2316
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:2052
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:2788
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:2520
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2804
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:1788
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:2172
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:392
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zbgtnf.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\zbgtnf.exe
                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:1000
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2632
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:600
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:376
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2160
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:2624
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:624
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2848
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1432
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2516
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zbgtnf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\zbgtnf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1960
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:1036
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1652
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1060
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1068
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2040
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3052
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2904
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:788
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2076
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2304
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zbgtnf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\zbgtnf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2728
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\hlmmnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2412
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\dwqtfw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1984
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\cdflob.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2264
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\agbikz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2096
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\rbfvdq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1564
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\jfzyji.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:1036
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\mnhrbq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:572
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ymuagr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1748
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\velkpm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2000
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1652

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\agbikz.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bbhgev.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dmkgjq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dwqtfw.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gwovpl.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jfzyji.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ncefyk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rbfvdq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\velkpm.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ymuagr.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yrhand.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bcd9f6f53ce79706f0b57ec4a587b832

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  372c5ca91da6098d346c309d335305aec7d2c184

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  909f4c1a9d01d427872f63b56420f663c16f08c603343ec9410cf67fdc5702a0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eb23f5965a4bf8d92d5d88442126f2fcb41394fd1cb25f7b902d05af4453070853ec9857e8aba002e56fbb8b22c5dac8d322ff88bf55b634755734792b4dfe22

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/264-271-0x0000000000960000-0x000000000098C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/268-311-0x0000000001060000-0x000000000106E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/376-374-0x0000000000060000-0x000000000008C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/532-383-0x0000000000800000-0x000000000082C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/592-290-0x0000000000D80000-0x0000000000D8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/700-170-0x0000000000060000-0x0000000000076000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/768-22-0x0000000001210000-0x000000000121E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/884-240-0x00000000003F0000-0x000000000041C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/948-304-0x0000000000FB0000-0x0000000000FBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1100-235-0x0000000001220000-0x000000000124E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1168-287-0x0000000000DC0000-0x0000000000DCE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1248-297-0x00000000001B0000-0x00000000001E0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1288-409-0x00000000012B0000-0x00000000012BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1288-183-0x0000000000FE0000-0x0000000001010000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1328-206-0x00000000012D0000-0x00000000012FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1332-117-0x0000000000EA0000-0x0000000000ECE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1348-113-0x0000000000DD0000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1432-68-0x0000000000240000-0x0000000000256000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1544-436-0x0000000000320000-0x000000000032E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1548-318-0x0000000001210000-0x000000000121E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1592-259-0x0000000001030000-0x000000000105C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1600-75-0x0000000000E30000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1632-234-0x0000000000380000-0x0000000000396000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1652-175-0x00000000011D0000-0x0000000001200000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1672-16-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1712-172-0x0000000000320000-0x000000000034E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1724-348-0x0000000001120000-0x000000000114C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1760-244-0x0000000000100000-0x000000000012C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1800-394-0x0000000000270000-0x00000000002A0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1908-344-0x0000000001240000-0x000000000124E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1908-41-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1908-40-0x000000001B800000-0x000000001BAE2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1968-317-0x00000000003E0000-0x00000000003EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2024-296-0x0000000000FE0000-0x000000000100C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2028-405-0x0000000000CE0000-0x0000000000CEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2040-321-0x00000000009C0000-0x00000000009CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-196-0x00000000008B0000-0x00000000008DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2056-265-0x0000000000290000-0x00000000002BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2056-298-0x0000000001290000-0x00000000012BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2060-205-0x0000000000840000-0x000000000086E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2080-337-0x0000000000370000-0x000000000037E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2080-412-0x0000000000310000-0x000000000031E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-301-0x00000000011A0000-0x00000000011AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2160-108-0x0000000000A60000-0x0000000000A6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2164-334-0x0000000000A10000-0x0000000000A1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2168-119-0x00000000009A0000-0x00000000009AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2228-386-0x0000000000EA0000-0x0000000000ECC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2228-329-0x0000000000E10000-0x0000000000E1E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2236-101-0x0000000000830000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2280-352-0x00000000003C0000-0x00000000003EC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2284-133-0x0000000000290000-0x000000000029E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2296-128-0x0000000001170000-0x000000000117E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2312-67-0x00000000008D0000-0x00000000008DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2336-365-0x0000000000AE0000-0x0000000000B0C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2372-141-0x0000000000AF0000-0x0000000000B20000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2400-279-0x00000000000E0000-0x00000000000F6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2420-0-0x000007FEF4F63000-0x000007FEF4F64000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2420-10-0x000007FEF4F60000-0x000007FEF594C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2420-11-0x000007FEF4F63000-0x000007FEF4F64000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2420-12-0x000007FEF4F60000-0x000007FEF594C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2420-1-0x0000000000E60000-0x0000000000E76000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2452-324-0x0000000000E20000-0x0000000000E2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2504-251-0x0000000001340000-0x000000000136C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2504-424-0x0000000000220000-0x000000000022E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2604-226-0x00000000009B0000-0x00000000009DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2636-369-0x0000000000320000-0x000000000034C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2644-295-0x0000000000DF0000-0x0000000000DFE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2644-420-0x0000000001130000-0x000000000113E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2680-433-0x0000000000940000-0x000000000094E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2680-278-0x0000000001260000-0x000000000128E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2684-415-0x0000000000E60000-0x0000000000E6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2700-340-0x0000000000830000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2712-360-0x0000000000D80000-0x0000000000DAC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2716-428-0x0000000000260000-0x000000000026E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2772-400-0x0000000000FD0000-0x0000000000FDE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2784-356-0x0000000001270000-0x000000000129C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2792-160-0x0000000000210000-0x0000000000240000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2796-188-0x00000000002E0000-0x0000000000310000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2804-34-0x0000000000B70000-0x0000000000B7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2808-215-0x0000000000E00000-0x0000000000E2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2868-233-0x0000000000D10000-0x0000000000D3E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2868-155-0x0000000000BF0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2896-395-0x0000000000FE0000-0x000000000100C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2908-268-0x0000000000F00000-0x0000000000F2C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2916-29-0x00000000026E0000-0x00000000026E8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2916-28-0x000000001B750000-0x000000001BA32000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2920-176-0x00000000012D0000-0x00000000012DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2924-96-0x00000000003B0000-0x00000000003BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2948-280-0x0000000000E90000-0x0000000000EBC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2972-380-0x0000000000210000-0x000000000023C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2988-146-0x0000000000820000-0x0000000000850000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3008-248-0x0000000000FA0000-0x0000000000FCC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3020-54-0x0000000000D70000-0x0000000000D7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3044-121-0x00000000010A0000-0x00000000010B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3056-89-0x0000000000E00000-0x0000000000E2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3060-223-0x00000000003A0000-0x00000000003CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB