Analysis

  • max time kernel
    899s
  • max time network
    902s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4828
    • C:\Users\Admin\AppData\Local\Temp\zounyy.exe
      "C:\Users\Admin\AppData\Local\Temp\zounyy.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:708
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\zounyy.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2716
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'zounyy.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4336
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\zounyy.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3644
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zounyy" /tr "C:\Users\Admin\AppData\Roaming\zounyy.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3840
    • C:\Users\Admin\AppData\Local\Temp\rqvdwj.exe
      "C:\Users\Admin\AppData\Local\Temp\rqvdwj.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2872
    • C:\Users\Admin\AppData\Local\Temp\slinlt.exe
      "C:\Users\Admin\AppData\Local\Temp\slinlt.exe"
      2⤵
      • Executes dropped EXE
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\wrlbpd.exe
      "C:\Users\Admin\AppData\Local\Temp\wrlbpd.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wrlbpd" /tr "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1936
      • C:\Users\Admin\AppData\Local\Temp\gvxrnm.exe
        "C:\Users\Admin\AppData\Local\Temp\gvxrnm.exe"
        3⤵
        • Executes dropped EXE
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\heovsu.exe
        "C:\Users\Admin\AppData\Local\Temp\heovsu.exe"
        3⤵
        • Executes dropped EXE
        PID:2192
      • C:\Users\Admin\AppData\Local\Temp\nivako.exe
        "C:\Users\Admin\AppData\Local\Temp\nivako.exe"
        3⤵
        • Executes dropped EXE
        PID:1404
      • C:\Users\Admin\AppData\Local\Temp\biatls.exe
        "C:\Users\Admin\AppData\Local\Temp\biatls.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "biatls" /tr "C:\Users\Admin\AppData\Roaming\biatls.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4976
        • C:\Users\Admin\AppData\Local\Temp\hwpilu.exe
          "C:\Users\Admin\AppData\Local\Temp\hwpilu.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:4052
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hwpilu" /tr "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3768
          • C:\Users\Admin\AppData\Local\Temp\jcbabc.exe
            "C:\Users\Admin\AppData\Local\Temp\jcbabc.exe"
            5⤵
            • Executes dropped EXE
            PID:3220
          • C:\Users\Admin\AppData\Local\Temp\nxvmuv.exe
            "C:\Users\Admin\AppData\Local\Temp\nxvmuv.exe"
            5⤵
            • Executes dropped EXE
            PID:4424
          • C:\Users\Admin\AppData\Local\Temp\gykvds.exe
            "C:\Users\Admin\AppData\Local\Temp\gykvds.exe"
            5⤵
            • Executes dropped EXE
            PID:2880
          • C:\Users\Admin\AppData\Local\Temp\mqxneb.exe
            "C:\Users\Admin\AppData\Local\Temp\mqxneb.exe"
            5⤵
            • Executes dropped EXE
            PID:644
          • C:\Users\Admin\AppData\Local\Temp\xizmfs.exe
            "C:\Users\Admin\AppData\Local\Temp\xizmfs.exe"
            5⤵
              PID:3880
            • C:\Users\Admin\AppData\Local\Temp\takcuj.exe
              "C:\Users\Admin\AppData\Local\Temp\takcuj.exe"
              5⤵
                PID:4948
              • C:\Users\Admin\AppData\Local\Temp\afsads.exe
                "C:\Users\Admin\AppData\Local\Temp\afsads.exe"
                5⤵
                  PID:1536
                • C:\Users\Admin\AppData\Local\Temp\ustaah.exe
                  "C:\Users\Admin\AppData\Local\Temp\ustaah.exe"
                  5⤵
                    PID:5076
                  • C:\Users\Admin\AppData\Local\Temp\hokyxb.exe
                    "C:\Users\Admin\AppData\Local\Temp\hokyxb.exe"
                    5⤵
                      PID:2724
                    • C:\Users\Admin\AppData\Local\Temp\avxads.exe
                      "C:\Users\Admin\AppData\Local\Temp\avxads.exe"
                      5⤵
                        PID:2812
                      • C:\Users\Admin\AppData\Local\Temp\casdst.exe
                        "C:\Users\Admin\AppData\Local\Temp\casdst.exe"
                        5⤵
                          PID:1016
                        • C:\Users\Admin\AppData\Local\Temp\ldebvx.exe
                          "C:\Users\Admin\AppData\Local\Temp\ldebvx.exe"
                          5⤵
                            PID:3776
                          • C:\Users\Admin\AppData\Local\Temp\zlnfsm.exe
                            "C:\Users\Admin\AppData\Local\Temp\zlnfsm.exe"
                            5⤵
                              PID:3212
                            • C:\Users\Admin\AppData\Local\Temp\hxireq.exe
                              "C:\Users\Admin\AppData\Local\Temp\hxireq.exe"
                              5⤵
                                PID:1544
                              • C:\Users\Admin\AppData\Local\Temp\ivcicy.exe
                                "C:\Users\Admin\AppData\Local\Temp\ivcicy.exe"
                                5⤵
                                • Checks computer location settings
                                • Drops startup file
                                • Adds Run key to start application
                                PID:1040
                                • C:\Windows\System32\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ivcicy" /tr "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                  6⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1640
                                • C:\Users\Admin\AppData\Local\Temp\jrsvvj.exe
                                  "C:\Users\Admin\AppData\Local\Temp\jrsvvj.exe"
                                  6⤵
                                    PID:4896
                                  • C:\Users\Admin\AppData\Local\Temp\vmkewk.exe
                                    "C:\Users\Admin\AppData\Local\Temp\vmkewk.exe"
                                    6⤵
                                      PID:5084
                                    • C:\Users\Admin\AppData\Local\Temp\eogovq.exe
                                      "C:\Users\Admin\AppData\Local\Temp\eogovq.exe"
                                      6⤵
                                        PID:2816
                                      • C:\Users\Admin\AppData\Local\Temp\evujik.exe
                                        "C:\Users\Admin\AppData\Local\Temp\evujik.exe"
                                        6⤵
                                          PID:3212
                                        • C:\Users\Admin\AppData\Local\Temp\rhzfgk.exe
                                          "C:\Users\Admin\AppData\Local\Temp\rhzfgk.exe"
                                          6⤵
                                            PID:1976
                                          • C:\Users\Admin\AppData\Local\Temp\vhjhdo.exe
                                            "C:\Users\Admin\AppData\Local\Temp\vhjhdo.exe"
                                            6⤵
                                              PID:1144
                                            • C:\Users\Admin\AppData\Local\Temp\caggat.exe
                                              "C:\Users\Admin\AppData\Local\Temp\caggat.exe"
                                              6⤵
                                                PID:1644
                                              • C:\Users\Admin\AppData\Local\Temp\tulxlf.exe
                                                "C:\Users\Admin\AppData\Local\Temp\tulxlf.exe"
                                                6⤵
                                                  PID:4300
                                                • C:\Users\Admin\AppData\Local\Temp\oihmui.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\oihmui.exe"
                                                  6⤵
                                                    PID:3768
                                                • C:\Users\Admin\AppData\Local\Temp\lzcaxc.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\lzcaxc.exe"
                                                  5⤵
                                                    PID:4448
                                                  • C:\Users\Admin\AppData\Local\Temp\zrazpw.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\zrazpw.exe"
                                                    5⤵
                                                      PID:3340
                                                    • C:\Users\Admin\AppData\Local\Temp\dgtmzl.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\dgtmzl.exe"
                                                      5⤵
                                                        PID:4548
                                                      • C:\Users\Admin\AppData\Local\Temp\ovclsg.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\ovclsg.exe"
                                                        5⤵
                                                          PID:3140
                                                        • C:\Users\Admin\AppData\Local\Temp\kkvbvx.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\kkvbvx.exe"
                                                          5⤵
                                                            PID:5112
                                                          • C:\Users\Admin\AppData\Local\Temp\qcbfpv.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\qcbfpv.exe"
                                                            5⤵
                                                              PID:2524
                                                            • C:\Users\Admin\AppData\Local\Temp\vzokfb.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\vzokfb.exe"
                                                              5⤵
                                                                PID:852
                                                              • C:\Users\Admin\AppData\Local\Temp\mhhmoy.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\mhhmoy.exe"
                                                                5⤵
                                                                  PID:5072
                                                                • C:\Users\Admin\AppData\Local\Temp\xvwqug.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\xvwqug.exe"
                                                                  5⤵
                                                                    PID:4896
                                                                  • C:\Users\Admin\AppData\Local\Temp\vahwpn.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\vahwpn.exe"
                                                                    5⤵
                                                                      PID:3880
                                                                    • C:\Users\Admin\AppData\Local\Temp\hxvcin.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\hxvcin.exe"
                                                                      5⤵
                                                                        PID:2684
                                                                    • C:\Users\Admin\AppData\Local\Temp\nergie.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\nergie.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4452
                                                                    • C:\Users\Admin\AppData\Local\Temp\jgznup.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\jgznup.exe"
                                                                      4⤵
                                                                      • Checks computer location settings
                                                                      • Drops startup file
                                                                      • Executes dropped EXE
                                                                      • Adds Run key to start application
                                                                      PID:3524
                                                                      • C:\Windows\System32\schtasks.exe
                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jgznup" /tr "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                        5⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:3004
                                                                      • C:\Users\Admin\AppData\Local\Temp\tptnvm.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\tptnvm.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        PID:472
                                                                      • C:\Users\Admin\AppData\Local\Temp\qrmsvg.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\qrmsvg.exe"
                                                                        5⤵
                                                                          PID:4596
                                                                        • C:\Users\Admin\AppData\Local\Temp\nqqcec.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\nqqcec.exe"
                                                                          5⤵
                                                                            PID:4540
                                                                          • C:\Users\Admin\AppData\Local\Temp\srdynq.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\srdynq.exe"
                                                                            5⤵
                                                                            • Checks computer location settings
                                                                            • Drops startup file
                                                                            • Adds Run key to start application
                                                                            PID:4388
                                                                            • C:\Windows\System32\schtasks.exe
                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "srdynq" /tr "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                              6⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:4912
                                                                            • C:\Users\Admin\AppData\Local\Temp\jupaeq.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\jupaeq.exe"
                                                                              6⤵
                                                                                PID:220
                                                                              • C:\Users\Admin\AppData\Local\Temp\ixcmvb.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\ixcmvb.exe"
                                                                                6⤵
                                                                                  PID:4940
                                                                                • C:\Users\Admin\AppData\Local\Temp\dfvrvz.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\dfvrvz.exe"
                                                                                  6⤵
                                                                                    PID:3196
                                                                                  • C:\Users\Admin\AppData\Local\Temp\tyccsz.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\tyccsz.exe"
                                                                                    6⤵
                                                                                      PID:3916
                                                                                    • C:\Users\Admin\AppData\Local\Temp\hqcgdn.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\hqcgdn.exe"
                                                                                      6⤵
                                                                                        PID:1244
                                                                                      • C:\Users\Admin\AppData\Local\Temp\yuwrhe.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\yuwrhe.exe"
                                                                                        6⤵
                                                                                          PID:4500
                                                                                        • C:\Users\Admin\AppData\Local\Temp\kskchh.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\kskchh.exe"
                                                                                          6⤵
                                                                                            PID:3712
                                                                                          • C:\Users\Admin\AppData\Local\Temp\afqinu.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\afqinu.exe"
                                                                                            6⤵
                                                                                              PID:3844
                                                                                            • C:\Users\Admin\AppData\Local\Temp\bzlmdn.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\bzlmdn.exe"
                                                                                              6⤵
                                                                                                PID:448
                                                                                              • C:\Users\Admin\AppData\Local\Temp\khcqtn.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\khcqtn.exe"
                                                                                                6⤵
                                                                                                • Checks computer location settings
                                                                                                • Drops startup file
                                                                                                • Adds Run key to start application
                                                                                                PID:3484
                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "khcqtn" /tr "C:\Users\Admin\AppData\Roaming\khcqtn.exe"
                                                                                                  7⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1752
                                                                                                • C:\Users\Admin\AppData\Local\Temp\kiwvzb.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kiwvzb.exe"
                                                                                                  7⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Drops startup file
                                                                                                  • Adds Run key to start application
                                                                                                  PID:2656
                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "kiwvzb" /tr "C:\Users\Admin\AppData\Roaming\kiwvzb.exe"
                                                                                                    8⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1208
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dpihnx.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dpihnx.exe"
                                                                                                    8⤵
                                                                                                      PID:3916
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tfhtiq.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tfhtiq.exe"
                                                                                                      8⤵
                                                                                                        PID:1716
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\thubxb.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\thubxb.exe"
                                                                                                        8⤵
                                                                                                          PID:4036
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ldjsms.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ldjsms.exe"
                                                                                                          8⤵
                                                                                                            PID:852
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tdqvbf.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tdqvbf.exe"
                                                                                                          7⤵
                                                                                                            PID:4696
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\uvobjn.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\uvobjn.exe"
                                                                                                            7⤵
                                                                                                              PID:3584
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ajovpd.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ajovpd.exe"
                                                                                                              7⤵
                                                                                                                PID:3348
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\cleduj.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\cleduj.exe"
                                                                                                                7⤵
                                                                                                                  PID:4012
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tfnqvk.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tfnqvk.exe"
                                                                                                                  7⤵
                                                                                                                    PID:3284
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nbtooa.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nbtooa.exe"
                                                                                                                  6⤵
                                                                                                                    PID:2892
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\emxqhc.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\emxqhc.exe"
                                                                                                                    6⤵
                                                                                                                      PID:4696
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\orrubm.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\orrubm.exe"
                                                                                                                      6⤵
                                                                                                                        PID:5100
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\iyched.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\iyched.exe"
                                                                                                                        6⤵
                                                                                                                          PID:744
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\blrjhz.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\blrjhz.exe"
                                                                                                                          6⤵
                                                                                                                            PID:4036
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\buzxof.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\buzxof.exe"
                                                                                                                            6⤵
                                                                                                                              PID:5076
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\nlrqeb.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\nlrqeb.exe"
                                                                                                                              6⤵
                                                                                                                                PID:2796
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wlsiym.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wlsiym.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:896
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\niyjhh.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\niyjhh.exe"
                                                                                                                                5⤵
                                                                                                                                  PID:3816
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jecppw.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jecppw.exe"
                                                                                                                                  5⤵
                                                                                                                                    PID:1392
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bpuume.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\bpuume.exe"
                                                                                                                                    5⤵
                                                                                                                                      PID:1548
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dmeqob.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dmeqob.exe"
                                                                                                                                      5⤵
                                                                                                                                        PID:3068
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\obdpmn.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\obdpmn.exe"
                                                                                                                                        5⤵
                                                                                                                                          PID:3240
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gubdzn.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gubdzn.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:2844
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ngkejr.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ngkejr.exe"
                                                                                                                                            5⤵
                                                                                                                                              PID:4036
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\exatao.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\exatao.exe"
                                                                                                                                              5⤵
                                                                                                                                                PID:2284
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hyfyvb.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hyfyvb.exe"
                                                                                                                                                5⤵
                                                                                                                                                  PID:2192
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lxuwug.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lxuwug.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:2400
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dtsoiu.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dtsoiu.exe"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:980
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vyqhgf.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vyqhgf.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:4712
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\uydnmq.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\uydnmq.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:540
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\avaphn.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\avaphn.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:3904
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\iizarc.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\iizarc.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:1892
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\srmdap.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\srmdap.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:1296
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yppgyc.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\yppgyc.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:2936
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yarzew.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\yarzew.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:4740
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xylewz.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xylewz.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:2244
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\gomega.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\gomega.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:704
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ippvgz.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ippvgz.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:4668
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\njtrfm.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\njtrfm.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:1172
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lipnjo.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lipnjo.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:4564
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\apknug.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\apknug.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:4672
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\idnnov.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\idnnov.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1476
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bpqabq.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bpqabq.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:5040
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmqpvb.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tmqpvb.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:4372
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bwzeua.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bwzeua.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:3216
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pvxkne.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pvxkne.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:3828
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fuvjnc.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\fuvjnc.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:2404
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mzvxpq.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\mzvxpq.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:2808
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vlhzux.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vlhzux.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:2064
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xkuily.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\xkuily.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:3940
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hdjnys.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hdjnys.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:2940
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yrbmvg.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yrbmvg.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:5016
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vkzodv.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\vkzodv.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:5044
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gegjjj.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\gegjjj.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:3376
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\spbamc.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\spbamc.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1176
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kwixbj.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kwixbj.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:1424
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tzbcyx.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tzbcyx.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:1256
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ojqadk.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ojqadk.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:1980
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xjgzch.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xjgzch.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:3628
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ryuzui.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ryuzui.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:1908
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ryfycy.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ryfycy.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:64
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yyipve.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\yyipve.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:4036
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nhvvjf.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nhvvjf.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:1784
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mxgfzd.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\mxgfzd.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:1436
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cdfiyl.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cdfiyl.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:4984
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\njnvzv.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\njnvzv.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:3812
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\spmrsv.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\spmrsv.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:4604
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dmjfdg.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dmjfdg.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:1288
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rmujiv.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rmujiv.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:4128
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ohjryh.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ohjryh.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:1640
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jtjpfb.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jtjpfb.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:4720
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\esizcu.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\esizcu.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:1480
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tuekcm.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tuekcm.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1784
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\uwzyqm.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\uwzyqm.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:3812
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qebshr.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qebshr.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:3200
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mbrehz.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mbrehz.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:4824
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\lnhhak.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\lnhhak.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:4524
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yrkapn.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\yrkapn.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2824
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qdewwb.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qdewwb.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:852
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hkcxyb.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hkcxyb.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:3400
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\amlqnb.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\amlqnb.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:1624
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\donfzo.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\donfzo.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:2016
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\fnwpay.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\fnwpay.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:2648
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cqonbd.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cqonbd.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4012
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mqepxw.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\mqepxw.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1612
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wopfgo.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wopfgo.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:844
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yheixb.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\yheixb.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:2712
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\aldqqj.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\aldqqj.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:3140
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\frkdvi.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\frkdvi.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:4812
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mmlhdx.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mmlhdx.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:704
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xoqqik.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xoqqik.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:4680
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zzhiqs.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zzhiqs.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:5116
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\flzlyo.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\flzlyo.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:4976
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\srnakn.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\srnakn.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:2588
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xdvdqe.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xdvdqe.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3048
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cnooln.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cnooln.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:4932
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lfajmm.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\lfajmm.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:348
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\sxzrhm.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\sxzrhm.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:1896
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zfshle.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zfshle.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:4620
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vravqi.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vravqi.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:1116
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xtahzc.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xtahzc.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:4240
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\oqalat.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\oqalat.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:632
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\njfaim.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\njfaim.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:2160
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ofvidl.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ofvidl.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:1216
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mubjtt.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mubjtt.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:2436
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mporlt.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\mporlt.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:4108
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\llywcq.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\llywcq.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:840
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mnfyuc.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\mnfyuc.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:1640
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zujohl.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zujohl.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:4664
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\moppve.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\moppve.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:4988
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\afxgzk.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\afxgzk.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:2872
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\evxmpw.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\evxmpw.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:2056
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ordfvq.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ordfvq.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:3416
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gnzzky.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\gnzzky.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2812
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kyidfw.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kyidfw.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2156
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dvqtwx.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dvqtwx.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:1912
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tgouuy.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tgouuy.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:3584
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fmfmzq.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fmfmzq.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:4592
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\hhtzjh.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\hhtzjh.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:3200
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\fbuzva.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\fbuzva.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:3332
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\baqait.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\baqait.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:3584
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fuuglp.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fuuglp.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:4580
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\blsbux.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\blsbux.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:1732
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\syzsvx.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\syzsvx.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                                                                                                                    • Drops startup file
                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                    PID:2892
                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "syzsvx" /tr "C:\Users\Admin\AppData\Roaming\syzsvx.exe"
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                      PID:64
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dpohib.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dpohib.exe"
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                        PID:5024
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yjmtci.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yjmtci.exe"
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:1192
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\chqhue.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\chqhue.exe"
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:4944
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\demiou.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\demiou.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:4468
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ctlnst.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ctlnst.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:3024
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\iedlge.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\iedlge.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:564
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2360
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1044
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3224
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3244
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2064
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2864
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4768
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2088
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2716
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4192
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2824
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1528
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1480
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3284
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4156
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4688
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4240
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4348
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:412
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4488
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:544
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3352
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4836
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4820
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:5032
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3212
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:744
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:752
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:4816
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:2880
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:4596
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:3164
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:4548
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:1232
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:1752
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:1360
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:628
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:4804
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:472
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:4892
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:5036
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:4932
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:4812
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:4224
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2692
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:3408
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:4944
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2500
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ivcicy.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:4576
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:2912
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:4024
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:224
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:3880
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2392
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:852
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:324
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ivcicy.exe
                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:1972
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\khcqtn.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\khcqtn.exe"
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:1472
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:2400
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\khcqtn.exe
                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\khcqtn.exe"
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:5060
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:4680
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:1908
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:1524
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:1304
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3224
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:224
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ivcicy.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2692
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\kiwvzb.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\kiwvzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:4144
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:1264
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\khcqtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\khcqtn.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:684
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:2032
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:3068
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:4944
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:4916
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\kiwvzb.exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\kiwvzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:1640
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:2800
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1484
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ivcicy.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1612
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\syzsvx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\syzsvx.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3804
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1712
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2200
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:400
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\khcqtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\khcqtn.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1176
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1732
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1032
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\syzsvx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\syzsvx.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:252
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\kiwvzb.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\kiwvzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1476
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1392
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1372
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ivcicy.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:1248
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ivcicy.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\ivcicy.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:784
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\srdynq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\srdynq.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:400
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\wrlbpd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\wrlbpd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2816
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\khcqtn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\khcqtn.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2524
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hwpilu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\hwpilu.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:740
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\zounyy.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\zounyy.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4772
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\biatls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\biatls.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4736
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\syzsvx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\syzsvx.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:412
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\kiwvzb.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\kiwvzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4656
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jgznup.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\jgznup.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4524
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3664

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3eb3833f769dd890afc295b977eab4b4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e857649b037939602c72ad003e5d3698695f436f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c67441dfa09f61bca500bb43407c56b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5a56cf7cbeb48c109e2128c31b681fac3959157b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  63082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f5ffc5fcfe9f4b27eeaf116938c9419a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  aaa5146bb86f1ed3e20498c880e42b42c1500e8a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c68ad1b03fddb6c9f685e54e82ae618ee321a22a774b6afef615b2a87a5c3624

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c1adb8992a39234149575259c888586ccaeeb60096bc6792b6c7faf9fb012a8058cd4e3f8b0f425165e375cb2b739965a18278e4d5c877376c26f85d63257656

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fcdtdt4b.a2l.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\biatls.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hwpilu.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ivcicy.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jgznup.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\khcqtn.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kiwvzb.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\njtrfm.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\srdynq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\syzsvx.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wrlbpd.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zounyy.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/708-33-0x00000000009F0000-0x00000000009FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1040-1447-0x0000000000690000-0x00000000006BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1560-261-0x0000000000D90000-0x0000000000DC0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2360-15-0x00007FF9761D0000-0x00007FF976C92000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2360-17-0x00007FF9761D0000-0x00007FF976C92000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2656-1973-0x0000000000710000-0x000000000073E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2716-35-0x0000024B9BD50000-0x0000024B9BD72000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2892-2191-0x0000000000540000-0x000000000056E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3184-127-0x0000000000220000-0x000000000024E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3484-1689-0x0000000000170000-0x000000000019E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3524-462-0x0000000000F30000-0x0000000000F5C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4128-603-0x00000000007B0000-0x00000000007BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4388-785-0x00000000000F0000-0x000000000011C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4984-381-0x00000000007F0000-0x000000000081E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5000-10-0x00007FF9761D0000-0x00007FF976C92000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5000-1-0x0000000000B30000-0x0000000000B46000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5000-0-0x00007FF9761D3000-0x00007FF9761D5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5000-11-0x00007FF9761D3000-0x00007FF9761D5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5000-12-0x00007FF9761D0000-0x00007FF976C92000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB